Microsoft Windows Search Remote Code Execution Vulnerability (CVE-2017-8543)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

It was possible to overflow an allocated buffer by sending crafted
windows search protocol packets.

Description :

By sending two malformed Windows Search Protocol packets over SMB,
Nessus was able to overflow an allocated buffer.

See also :

http://www.nessus.org/u?33c94e8d

Solution :

Microsoft has released a set of patches for Windows 2008, 2008 R2, 2012,
8.1, RT 8.1, 2012 R2, 10, and 2016.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 102683 ()

Bugtraq ID: 98824

CVE ID: CVE-2017-8543

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now