Microsoft Windows Search Remote Code Execution Vulnerability (CVE-2017-8543)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

It was possible to overflow an allocated buffer by sending crafted
windows search protocol packets.

Description :

By sending two malformed Windows Search Protocol packets over SMB,
Nessus was able to overflow an allocated buffer.

See also :

Solution :

Microsoft has released a set of patches for Windows 2008, 2008 R2, 2012,
8.1, RT 8.1, 2012 R2, 10, and 2016.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.4
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 102683 ()

Bugtraq ID: 98824

CVE ID: CVE-2017-8543

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now