U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2017-9073

Change History

Initial Analysis by NIST 5/31/2017 2:14:56 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:microsoft:windows_server_2003:*:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2003:-:sp1:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:gold:embedded:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:gold:home:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:gold:media_center:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:gold:professional:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:gold:tablet_pc:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp1:embedded:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp1:home:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp1:media_center:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp1:professional:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp1:tablet_pc:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp2:embedded:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp2:home:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp2:media_center:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp2:professional:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp2:tablet_pc:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp3:embedded:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp3:home:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp3:media_center:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp3:professional:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_xp:-:sp3:tablet_pc:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Added CVSS V3

								
							
							
						
AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
CWE-119
Changed Reference Type
http://www.securityfocus.com/bid/98550 No Types Assigned
http://www.securityfocus.com/bid/98550 Third Party Advisory, VDB Entry
Changed Reference Type
https://blog.fortinet.com/2017/05/11/deep-analysis-of-esteemaudit No Types Assigned
https://blog.fortinet.com/2017/05/11/deep-analysis-of-esteemaudit Exploit, Technical Description, Third Party Advisory
Changed Reference Type
https://blogs.technet.microsoft.com/msrc/2017/04/14/protecting-customers-and-evaluating-risk/ No Types Assigned
https://blogs.technet.microsoft.com/msrc/2017/04/14/protecting-customers-and-evaluating-risk/ Vendor Advisory