Vulnerability Change Records for CVE-2018-0986

Change History

CVE Modified by Microsoft Corporation 4/07/2018 9:29:00 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
https://www.exploit-db.com/exploits/44402/ [No Types Assigned]

CVE Modified by Microsoft Corporation 4/12/2018 9:29:08 PM

Action Type Old Value New Value
Changed Description
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, 1709 and Windows Server 2016, Windows Server, version 1709, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to remote code execution. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability".
A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file, leading to memory corruption, aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability." This affects Windows Defender, Windows Intune Endpoint Protection, Microsoft Security Essentials, Microsoft System Center Endpoint Protection, Microsoft Exchange Server, Microsoft System Center, Microsoft Forefront Endpoint Protection.

Reanalysis 4/09/2020 9:15:42 AM

Action Type Old Value New Value
Changed CPE Configuration
OR
     *cpe:2.3:a:microsoft:exchange_server:2013:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:exchange_server:2016:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:security_essentials:-:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:microsoft:exchange_server:2013:-:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:exchange_server:2016:-:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:security_essentials:-:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:microsoft:forefront_endpoint_protection_2010:-:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:intune_endpoint_protection:*:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_2012_endpoint_protection:*:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_2012_r2_endpoint_protection:*:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_endpoint_protection:*:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:microsoft:forefront_endpoint_protection_2010:-:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:intune_endpoint_protection:-:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_2012_endpoint_protection:*:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_2012_r2_endpoint_protection:*:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_endpoint_protection:*:*:*:*:*:*:*:*
Removed CVSS V3
NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

								
						
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Changed Reference Type
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0986 Vendor Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0986 Patch, Vendor Advisory
Changed Reference Type
https://www.exploit-db.com/exploits/44402/ Exploit, Third Party Advisory
https://www.exploit-db.com/exploits/44402/ Exploit, Third Party Advisory, VDB Entry

CWE Remap 8/24/2020 1:37:01 PM

Action Type Old Value New Value
Changed CWE
CWE-119
CWE-787

CVE Modified by Microsoft Corporation 4/05/2018 9:29:09 PM

Action Type Old Value New Value
Added Reference

								
							
							
						
http://www.securityfocus.com/bid/103593 [No Types Assigned]
Added Reference

								
							
							
						
http://www.securitytracker.com/id/1040631 [No Types Assigned]

Initial Analysis 5/21/2018 9:21:02 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:microsoft:windows_defender:-:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_1709:-:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
          cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:microsoft:exchange_server:2013:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:exchange_server:2016:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:security_essentials:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:microsoft:forefront_endpoint_protection_2010:-:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:intune_endpoint_protection:*:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_2012_endpoint_protection:*:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_2012_r2_endpoint_protection:*:*:*:*:*:*:*:*
     *cpe:2.3:a:microsoft:system_center_endpoint_protection:*:*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Added CVSS V2 Metadata

								
							
							
						
Victim must voluntarily interact with attack mechanism
Added CVSS V3

								
							
							
						
AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
CWE-119
Changed Reference Type
http://www.securityfocus.com/bid/103593 No Types Assigned
http://www.securityfocus.com/bid/103593 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1040631 No Types Assigned
http://www.securitytracker.com/id/1040631 Third Party Advisory, VDB Entry
Changed Reference Type
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0986 No Types Assigned
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0986 Vendor Advisory
Changed Reference Type
https://www.exploit-db.com/exploits/44402/ No Types Assigned
https://www.exploit-db.com/exploits/44402/ Exploit, Third Party Advisory