[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2017-8699Date: (C)2017-09-14   (M)2024-03-06


Windows Shell in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to run arbitrary code in the context of the current user, due to the way that Windows Shell validates file copy destinations, aka "Windows Shell Remote Code Execution Vulnerability".

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.0CVSS Score : 7.6
Exploit Score: 1.0Exploit Score: 4.9
Impact Score: 5.9Impact Score: 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: NETWORK
Attack Complexity: HIGHAccess Complexity: HIGH
Privileges Required: NONEAuthentication: NONE
User Interaction: REQUIREDConfidentiality: COMPLETE
Scope: UNCHANGEDIntegrity: COMPLETE
Confidentiality: HIGHAvailability: COMPLETE
Integrity: HIGH 
Availability: HIGH 
  
Reference:
BID-100783
SECTRACK-1039331
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8699

CPE    9
cpe:/o:microsoft:windows_10:1511
cpe:/o:microsoft:windows_server_2016
cpe:/o:microsoft:windows_8.1
cpe:/o:microsoft:windows_10:1703
...
CWE    1
CWE-20
OVAL    12
oval:org.secpod.oval:def:42028
oval:org.secpod.oval:def:42033
oval:org.secpod.oval:def:42032
oval:org.secpod.oval:def:42036
...

© SecPod Technologies