Windows 8 June 2017 Security Updates

critical Nessus Plugin ID 100788

Synopsis

The remote Windows host is affected by multiple vulnerabilities.

Description

The remote Windows 8 host is missing a security update. It is, therefore, affected by the following vulnerabilities :

- A remote code execution vulnerability exists in Microsoft Internet Explorer due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website, to execute arbitrary code in the context of the current user. (CVE-2017-0222)

- An information disclosure vulnerability exists in the Microsoft Server Message Block 1.0 (SMBv1) server when handling certain requests. An unauthenticated, remote attacker can exploit this, via a specially crafted packet, to disclose sensitive information.
(CVE-2017-0267)

- A remote code execution vulnerability exists in Windows due to improper handling of shortcuts. An unauthenticated, remote attacker can exploit this, by convincing a user to insert a removable drive containing a malicious shortcut and binary, to automatically execute arbitrary code in the context of the current user. (CVE-2017-8464)

- A remote code execution vulnerability exists in Windows OLE due to improper validation of user-supplied input.
An unauthenticated, remote attacker can exploit this, by convincing a user to visit a specially crafted website or to open a specially crafted file or email message, to execute arbitrary code in the context of the current user. (CVE-2017-8487)

- A remote code execution vulnerability exists in the Windows Search functionality due to improper handling of objects in memory. An unauthenticated, remote attacker can exploit this, via a specially crafted SMB message, to execute arbitrary code. (CVE-2017-8543)

Solution

Microsoft has released emergency patches for Windows 8. Apply security updates KB4022839, KB4019623, and KB4018271

See Also

https://support.microsoft.com/en-us/help/4012598/title

http://www.nessus.org/u?ba79a274

http://www.nessus.org/u?d15161da

http://www.nessus.org/u?00067ec3

http://www.nessus.org/u?5470f743

Plugin Details

Severity: Critical

ID: 100788

File Name: smb_nt_ms17_jun_windows8.nasl

Version: 1.12

Type: local

Agent: windows

Published: 6/14/2017

Updated: 5/25/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.5

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2017-8543

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/13/2017

Vulnerability Publication Date: 5/9/2017

CISA Known Exploited Vulnerability Due Dates: 6/14/2022, 8/10/2022, 8/25/2022

Exploitable With

CANVAS (CANVAS)

Metasploit (LNK Code Execution Vulnerability)

Reference Information

CVE: CVE-2017-0222, CVE-2017-0267, CVE-2017-8464, CVE-2017-8487, CVE-2017-8543

BID: 98127, 98259, 98818, 98824, 99013

MSFT: MS17-4018271, MS17-4019623, MS17-4022839

MSKB: 4018271, 4019623, 4022839