CVE-2017-0290 – Microsoft Security Essentials / SCEP (Microsoft Windows 8/8.1/10 / Windows Server) - 'MsMpEng' Remote Type Confusion
https://notcve.org/view.php?id=CVE-2017-0290
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016 does not properly scan a specially crafted file leading to memory corruption, aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability." El motor de protección de malware de Microsoft que se ejecuta en Microsoft Forefront y Microsoft Defender en Microsoft Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607 y 1703 , y Windows Server 2016 no analiza correctamente un archivo especialmente diseñado que provoca daños en la memoria, también conocido como "Vulnerabilidad de ejecución remota de código de Microsoft Malware Protection Engine". • https://www.exploit-db.com/exploits/41975 https://github.com/homjxi0e/CVE-2017-0290- http://www.securityfocus.com/bid/98330 http://www.securitytracker.com/id/1038419 http://www.securitytracker.com/id/1038420 https://0patch.blogspot.si/2017/05/0patching-worst-windows-remote-code.html https://arstechnica.com/information-technology/2017/05/windows-defender-nscript-remote-vulnerability https://bugs.chromium.org/p/project-zero/issues/detail?id=1252 https://portal.msrc.microsoft.com/en-US/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2013-3154
https://notcve.org/view.php?id=CVE-2013-3154
The signature-update functionality in Windows Defender on Microsoft Windows 7 and Windows Server 2008 R2 relies on an incorrect pathname, which allows local users to gain privileges via a Trojan horse application in the %SYSTEMDRIVE% top-level directory, aka "Microsoft Windows 7 Defender Improper Pathname Vulnerability." La funcionalidad de actualización de firma en Windows Defender en Microsoft Windows 7 y Windows Server 2008 R2 se basa en una ruta de acceso incorrecta, permite a usuarios locales conseguir privilegios a través de una aplicación de caballo de Troya en el directorio %SYSTEMDRIVE%, también conocido como "Microsoft Windows 7 Defender Improper Pathname Vulnerability". • http://blogs.technet.com/b/srd/archive/2013/07/09/assessing-risk-for-the-july-2013-security-updates.aspx http://www.us-cert.gov/ncas/alerts/TA13-190A https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-058 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17253 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2013-0078
https://notcve.org/view.php?id=CVE-2013-0078
The Microsoft Antimalware Client in Windows Defender on Windows 8 and Windows RT uses an incorrect pathname for MsMpEng.exe, which allows local users to gain privileges via a crafted application, aka "Microsoft Antimalware Improper Pathname Vulnerability." El Microsoft Antimalware Client en Windows Defender en Windows 8 y Windows RT utiliza un nombre incorrecto de ruta para MsMpEng.exe, lo que permite a usuarios locales elevar sus privilegios a través de una aplicación manipulada. Aka "Microsoft Antimalware Improper Pathname Vulnerability." • http://www.us-cert.gov/ncas/alerts/TA13-100A https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-034 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16293 • CWE-20: Improper Input Validation •
CVE-2010-5165
https://notcve.org/view.php?id=CVE-2010-5165
Race condition in Malware Defender 2.6.0 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute ** EN DISPUTA ** Condición de carrera en Malware Defender v2.6.0 sobre Windows XP permite a usuarios locales evitar manejadores de kernel-mode hook, y ejecutar código malicioso que podría ser bloquedo por un manejador pero no por un detector de malware signature-based, a través de ciertos cambios en memoria user-space durante la ejecución de hook-handler , también conocido por argument-switch attack o ataque KHOBE. Nota: este problema está en disputa por terceras partes. • http://archives.neohapsis.com/archives/bugtraq/2010-05/0026.html http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0066.html http://countermeasures.trendmicro.eu/you-just-cant-trust-a-drunk http://matousec.com/info/advisories/khobe-8.0-earthquake-for-windows-desktop-security-software.php http://matousec.com/info/articles/khobe-8.0-earthquake-for-windows-desktop-security-software.php http://www.f-secure.com/weblog/archives/00001949.html http://www.osvdb.org/67660 http://www.securit • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2011-0037
https://notcve.org/view.php?id=CVE-2011-0037
Microsoft Malware Protection Engine before 1.1.6603.0, as used in Microsoft Malicious Software Removal Tool (MSRT), Windows Defender, Security Essentials, Forefront Client Security, Forefront Endpoint Protection 2010, and Windows Live OneCare, allows local users to gain privileges via a crafted value of an unspecified user registry key. Microsoft Malware Protection Engine anterior a v1.1.6603.0, tal como se utilizó en Microsoft Malicious Software Removal Tool (MSRT), Windows Defender, Security Essentials, Forefront Client Security, Forefront Endpoint Protection 2010, y Windows Live OneCare, permite a usuarios locales conseguir privilegios a través de un valor manipulado de una clave de registro de usuario sin especificar • http://secunia.com/advisories/43468 http://securitytracker.com/id?1025117 http://www.microsoft.com/technet/security/advisory/2491888.mspx http://www.securityfocus.com/bid/46540 http://www.vupen.com/english/advisories/2011/0486 https://exchange.xforce.ibmcloud.com/vulnerabilities/65626 • CWE-20: Improper Input Validation •