MS17-008: Security Update for Windows Hyper-V (4013082)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host is affected multiple vulnerabilities.

Description :

The remote Windows host is missing a security update. It is,
therefore, affected by multiple vulnerabilities :

- Multiple remote code execution vulnerabilities exist due
to improper validation of vSMB packets. An attacker on a
guest operating system can exploit these
vulnerabilities, via a specially crafted application, to
execute arbitrary code on the host. (CVE-2017-0021,
CVE-2017-0095)

- Multiple denial of service vulnerabilities exist due to
improper validation of input from a privileged user on a
guest operating system. An attacker with a privileged
account on a guest operating system can exploit these
vulnerabilities, via a specially crafted application, to
crash the host machine. (CVE-2017-0051, CVE-2017-0074,
CVE-2017-0076, CVE-2017-0097, CVE-2017-0098,
CVE-2017-0099)

Note that customers who have not enabled the Hyper-V role are not
affected.

See also :

https://technet.microsoft.com/library/security/ms17-008

Solution :

Microsoft has released a set of patches for Windows 2008, 7, 2008 R2,
2012, 8.1, 2012 R2, 10 and 2016.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 6.7
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now