Vulnerability Change Records for CVE-2018-0986

Change History

CWE Remap 8/24/2020 1:37:01 PM

Action Type Old Value New Value
Changed CWE
CWE-119
CWE-787

CVE Modified by Microsoft Corporation 4/05/2018 9:29:09 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.securityfocus.com/bid/103593 [No Types Assigned]
Added Reference

								
							
							
						
http://www.securitytracker.com/id/1040631 [No Types Assigned]

CVE Modified by Microsoft Corporation 4/12/2018 9:29:08 PM

Action Type Old Value New Value
Changed Description
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, 1709 and Windows Server 2016, Windows Server, version 1709, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to remote code execution. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability".
A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file, leading to memory corruption, aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability." This affects Windows Defender, Windows Intune Endpoint Protection, Microsoft Security Essentials, Microsoft System Center Endpoint Protection, Microsoft Exchange Server, Microsoft System Center, Microsoft Forefront Endpoint Protection.

CVE Modified by Microsoft Corporation 4/07/2018 9:29:00 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://www.exploit-db.com/exploits/44402/ [No Types Assigned]

Reanalysis 8/03/2018 8:19:41 AM

Action Type Old Value New Value
Changed CPE Configuration
AND
     OR
          *cpe:2.3:a:microsoft:windows_defender:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
AND
     OR
          *cpe:2.3:a:microsoft:windows_defender:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*

Reanalysis 4/09/2020 9:15:42 AM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:microsoft:exchange_server:2013:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:exchange_server:2016:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:security_essentials:-:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:microsoft:exchange_server:2013:-:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:exchange_server:2016:-:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:security_essentials:-:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:microsoft:forefront_endpoint_protection_2010:-:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:intune_endpoint_protection:*:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_2012_endpoint_protection:*:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_2012_r2_endpoint_protection:*:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_endpoint_protection:*:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:microsoft:forefront_endpoint_protection_2010:-:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:intune_endpoint_protection:-:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_2012_endpoint_protection:*:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_2012_r2_endpoint_protection:*:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_endpoint_protection:*:*:*:*:*:*:*:*
Removed CVSS V3
NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Changed Reference Type
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0986 Vendor Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0986 Patch, Vendor Advisory
Changed Reference Type
https://www.exploit-db.com/exploits/44402/ Exploit, Third Party Advisory
https://www.exploit-db.com/exploits/44402/ Exploit, Third Party Advisory, VDB Entry