Zero-day vulnerability in Windows

Buffer overflow
CVE-2017-0176

The vulnerability was disclosed by the Shadow Brokers hacking team.

Known malware:

EsteemAudit

Vulnerability details

Advisory: SB2017051217 - Buffer overflow in Microsoft Windows RDP for Windows XP/2003

Vulnerable component: Windows

CVE-ID: CVE-2017-0176

CVSSv3 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C

CWE-ID: CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer

Description:

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the Smart Card authentication code in gpkcsp.dll within Windows Remote Desktop services. A remote attacker can send specially crafted packets to the vulnerable system, trigger buffer overflow and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to gain complete control over the affected system.

Note: this vulnerability was publicly disclosed by the Shadow Brokers hacking team along with a fully functional exploit known as "тАЬEsteemAudit".

The vulnerability is being exploited in the wild.


Latest references in media:

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.