CVE-2018-0986

A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file, leading to memory corruption, aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability." This affects Windows Defender, Windows Intune Endpoint Protection, Microsoft Security Essentials, Microsoft System Center Endpoint Protection, Microsoft Exchange Server, Microsoft System Center, Microsoft Forefront Endpoint Protection.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:exchange_server:2013:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:exchange_server:2016:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:security_essentials:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:microsoft:forefront_endpoint_protection_2010:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:intune_endpoint_protection:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_endpoint_protection:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_endpoint_protection:2012:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_endpoint_protection:2012:r2:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:microsoft:windows_defender:-:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*

History

21 Nov 2024, 03:39

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/103593 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103593 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040631 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040631 - Third Party Advisory, VDB Entry
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0986 - Patch, Vendor Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0986 - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/44402/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/44402/ - Exploit, Third Party Advisory, VDB Entry

09 Sep 2021, 13:34

Type Values Removed Values Added
CPE cpe:2.3:a:microsoft:system_center_2012_endpoint_protection:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_2012_r2_endpoint_protection:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_endpoint_protection:2012:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_endpoint_protection:2012:r2:*:*:*:*:*:*

Information

Published : 2018-04-04 17:29

Updated : 2024-11-21 03:39


NVD link : CVE-2018-0986

Mitre link : CVE-2018-0986

CVE.ORG link : CVE-2018-0986


JSON object : View

Products Affected

microsoft

  • windows_server_2016
  • windows_8.1
  • windows_defender
  • intune_endpoint_protection
  • security_essentials
  • exchange_server
  • windows_rt_8.1
  • windows_10
  • system_center_endpoint_protection
  • forefront_endpoint_protection_2010
  • windows_7
  • windows_server_2008
  • windows_server_2012
CWE
CWE-787

Out-of-bounds Write