Zero-day Vulnerability Database

Change view

Zero-day vulnerabilities discovered: 9

Remote code execution in Windows Search service
CVE-2017-8543

Buffer overflow

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to boundary error when Windows Search handles objects in memory. A remote unauthenticated attacker can send specially crafted messages to the Windows Search service and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note: this vulnerability is being actively exploited in the wild.

Software: Windows

Remote code execution when processing .LNK files in Microsoft Windows
CVE-2017-8464

Improper input validation

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to an error when processing .LNK files. A remote attacker can create a specially crafted .LNK file and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.

Note: the vulnerability is being actively exploited in the wild.

Software: Windows

Buffer overflow in Microsoft Windows RDP for Windows XP/2003
CVE-2017-0176

Buffer overflow

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the Smart Card authentication code in gpkcsp.dll within Windows Remote Desktop services. A remote attacker can send specially crafted packets to the vulnerable system, trigger buffer overflow and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to gain complete control over the affected system.

Note: this vulnerability was publicly disclosed by the Shadow Brokers hacking team along with a fully functional exploit known as "“EsteemAudit".

The vulnerability is being exploited in the wild.


i

The vulnerability was disclosed by the Shadow Brokers hacking team.

Software: Windows

Known/fameous malware:

EsteemAudit

The vulnerability was disclosed by the Shadow Brokers hacking team.

Two remote code execution vulnerabilities when processing EPS files in Microsoft Office
CVE-2017-0262

Type confusion

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a type confusion error when processing EPS wiles within Microsoft Office documents. A remote unauthenticated attacker can create a specially crafted document, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current victim.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note: this vulnerability is being actively exploited in the wild.

i

The vulnerability was used by APT28 team along with another zero-day CVE-2017-0263.

Software: Microsoft Office

Known/fameous malware:

GAMEFISH

The vulnerability was used by APT28 team along with another zero-day CVE-2017-0263.

Multiple vulnerabilities in Win32.sys in Microsoft Windows
CVE-2017-0263

Elevation of privilege

The vulnerability allows a local user to elevate privileges on the system.

The vulnerability exists due to boundary error in Win32k.sys driver. A local user can escalate privileges on the system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note: this vulnerability is being actively exploited.

i

The vulnerability was used by APT28 team along with another zero-day CVE-2017-0262.

Software: Windows

Known/fameous malware:

GAMEFISH

The vulnerability was used by APT28 team along with another zero-day CVE-2017-0262.

Multiple vulnerabilities in Microsoft Internet Explorer
CVE-2017-0222

Memory corruption

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error. A remote attacker can create a specially crafted website, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability results in arbitrary code execution.

Note: the vulnerability is being actively exploited.

Software: Microsoft Internet Explorer

Two remote code execution vulnerabilities when processing EPS files in Microsoft Office
CVE-2017-0261

Use-after-free

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a use-after-free error when processing EPS images within Microsoft Office files. A remote attacker can create a specially crafted Office file with malicious EPS image, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may allow an attacker to compromise vulnerable system.

Note: this vulnerability is being actively exploited in the wild.

i

The vulnerability was used by Turla and an unknown financially motivated actor.

Software: Microsoft Office

Known/fameous malware:

SHIRIME
NETWIRE

The vulnerability was used by Turla and an unknown financially motivated actor.

Multiple vulnerabilities in Microsoft Internet Explorer
CVE-2017-0210

Cross-domain scripting

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability is caused by incorrect filtration of input data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim’s browser in security context of another domain.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.

Note: this vulnerability is being exploited in the wild.

Software: Microsoft Internet Explorer

Remote code execution in Microsoft Office
CVE-2017-0199

Improper input validation

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A remote unauthenticated attacker can create a specially crafted Office document, trick the victim into opening it with Microsoft Office or WordPad and execute arbitrary code on the target system with privileges of the current user.

Successful exploitation of this vulnerability may result in compromise vulnerable system.

Note: the vulnerability is being actively exploited.

i

The detected samples are organized as Word files containing Dridex botnet ID 7500 (more specially, RTF files with “.doc†extension name). The exploit works on all Microsoft Office versions, including the latest Office 2016 running on Windows 10. The earliest attack dates to late January, according to McAfee.
According to FireEye, the malware leveraging this vulnerability was used to target Russian-speaking victims. As early as Jan. 25, 2017, lure documents referencing a Russian Ministry of Defense decree and a manual allegedly published in the "Donetsk People's Republic" exploited CVE-2017-0199 to deliver FINSPY payloads.

This vulnerability was also used by Patya.A ransomware in malware outbreak on 27 June, 2017 as one of the attack vectors.

Software: Microsoft Office

Known/fameous malware:

Malware.Binary.Rtf
Dridex botnet
FINSPY
LATENTBOT
Petya.A

The detected samples are organized as Word files containing Dridex botnet ID 7500 (more specially, RTF files with “.doc†extension name). The exploit works on all Microsoft Office versions, including the latest Office 2016 running on Windows 10. The earliest attack dates to late January, according to McAfee.
According to FireEye, the malware leveraging this vulnerability was used to target Russian-speaking victims. As early as Jan. 25, 2017, lure documents referencing a Russian Ministry of Defense decree and a manual allegedly published in the "Donetsk People's Republic" exploited CVE-2017-0199 to deliver FINSPY payloads.

This vulnerability was also used by Patya.A ransomware in malware outbreak on 27 June, 2017 as one of the attack vectors.