Page 11 of 59 results (0.005 seconds)

CVSS: 5.5EPSS: 0%CPEs: 19EXPL: 1

The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8536, CVE-2017-8537, CVE-2017-8539, and CVE-2017-8542. El Motor de Protección de Malware de Microsoft se ejecuta en Microsoft Forefront y Microsoft Defender en Microsoft Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607 y 1703 y Windows Server 2016, Microsoft Exchange Server 2013 y 2016, no analiza apropiadamente un archivo especialmente creado que conlleva a la denegación de servicio. También se conoce como "Microsoft Malware Protection Engine Denial of Service Vulnerability", una vulnerabilidad diferente de los CVE-2017-8536, CVE-2017-8537, CVE-2017-8539 y CVE-2017-8542. Through fuzzing, a number of ways to crash the Microsoft MsMpEng service has been been discovered. • https://www.exploit-db.com/exploits/42081 http://www.securityfocus.com/bid/98702 http://www.securitytracker.com/id/1038571 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8535 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-369: Divide By Zero CWE-476: NULL Pointer Dereference CWE-674: Uncontrolled Recursion •

CVSS: 9.3EPSS: 94%CPEs: 23EXPL: 1

The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability", a different vulnerability than CVE-2017-8538 and CVE-2017-8541. El Motor de Protección de Malware de Microsoft ejecutado en Microsoft Forefront y Microsoft Defender en Microsoft Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows versión 8.1, Windows Server 2012 versión Gold y R2, Windows RT versión 8.1, Windows 10 versiones Gold, 1511, 1607 y 1703 y Windows Server 2016, Microsoft Exchange Server 2013 y 2016, no analiza apropiadamente un archivo especialmente diseñado conllevando a una corrupción de memoria. también se conoce como "Microsoft Malware Protection Engine Remote Code Execution Vulnerability", una vulnerabilidad diferente de CVE-2017-8538 y CVE-2017-8541. The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability". • https://www.exploit-db.com/exploits/42088 http://www.securityfocus.com/bid/98703 http://www.securitytracker.com/id/1038571 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8540 • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 19EXPL: 1

The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8535, CVE-2017-8537, CVE-2017-8539, and CVE-2017-8542. El Motor de Protección de Malware de Microsoft ejecutándose en Microsoft Forefront y Microsoft Defender en Microsoft Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607 y 1703 y Windows Server 2016, Microsoft Exchange Server 2013 y 2016, no analiza apropiadamente un archivo especialmente creado que conlleva a la denegación de servicio. También se conoce como "Microsoft Malware Protection Engine Denial of Service Vulnerability", una vulnerabilidad diferente de los CVE-2017-8535, CVE-2017-8537, CVE-2017-8539 y CVE-2017-8542. Through fuzzing, a number of ways to crash the Microsoft MsMpEng service has been been discovered. • https://www.exploit-db.com/exploits/42081 http://www.securityfocus.com/bid/98708 http://www.securitytracker.com/id/1038571 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8536 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-369: Divide By Zero CWE-476: NULL Pointer Dereference CWE-674: Uncontrolled Recursion •

CVSS: 5.0EPSS: 1%CPEs: 10EXPL: 0

The Network Threat Protection module in the Manager component in Symantec Endpoint Protection (SEP) 11.0.600x through 11.0.700x on Windows Server 2003 allows remote attackers to cause a denial of service (web-server outage, or daemon crash or hang) via a flood of packets that triggers automated blocking of network traffic. El módulo Network Threat Protection en Manager component en Symantec Endpoint Protection (SEP) v11.0.600x hasta v11.0.700x en Windows Server 2003 permite a atacantes remotos causar una denegación de servicio (bloqueo de la aplicación) a través de una inundación de paquetes automatizados. • http://osvdb.org/82147 http://secunia.com/advisories/49221 http://www.kb.cert.org/vuls/id/149070 http://www.securityfocus.com/bid/50358 http://www.securitytracker.com/id?1027092 http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2012&suid=20120522_00 •

CVSS: 4.3EPSS: 97%CPEs: 29EXPL: 0

The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations. El analizador de archivos TAR en Avira AntiVir versión 7.11.1.163, Antiy Labs AVL SDK versión 2.0.3.7, avast! antivirus versiones 4.8.1351.0 y 5.0.677.0, AVG Anti-Virus versión 10.0.0.1190, Bitdefender versión 7.2, Quick Heal (también se conoce como Cat QuickHeal) versión 11.00, ClamAV versión 0.96.4, Command Antivirus versión 5.2.11.5, Emsisoft Anti-Malware versión 5.1.0.1, eSafe versión 7.0.17.0, F-Prot antivirus versión 4.6.2.117, G Data AntiVirus versión 21, Ikarus Virus Utilities T3 Command Line Scanner versión 1.1.97.0, Jiangmin Antivirus versión 13.0.900, K7 AntiVirus versión 9.77.3565, Kaspersky Anti-Virus versión 7.0.0.125, McAfee Anti-Virus Scanning Engine versión 5.400.0.1158, McAfee Gateway (anteriormente Webwasher) versión 2010.1C, Antimalware Engine versión 1.1.6402.0 en Microsoft Security Essentials versión 2.0, NOD32 Antivirus versión 5795, Norman Antivirus versión 6.06.12 , PC Tools AntiVirus versión 7.0.3.5, Rising Antivirus versión 22.83.00.03, AVEngine versión 20101.3.0.103 en Symantec Endpoint Protection versión 11, Trend Micro AntiVirus versión 9.120.0.1004, Trend Micro HouseCall versión 9.120.0.1004, VBA32 versión 3.12.14.2 y VirusBuster versión 13.6.151.0 , permite a los atacantes remotos omitir la detección de malware por medio de una entrada de archivo TAR con un campo de longitud que supera el tamaño total del archivo TAR. • http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00002.html http://osvdb.org/80389 http://osvdb.org/80391 http://osvdb.org/80392 http://osvdb.org/80393 http://osvdb.org/80395 http://osvdb.org/80396 http://osvdb.org/80403 http://osvdb.org/80406 http://osvdb.org/80407 http://osvdb.org/80409 http://www.ieee-security.org/TC/SP2012/program.html http://www.mandriva.com/security/advisories?name=MDVSA-2012:094 http://www.securityfocus.com& • CWE-264: Permissions, Privileges, and Access Controls •