First published: Fri Mar 17 2017(Updated: )
Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka "Hyper-V Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0109.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1511 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0075 is rated as important and can allow guest OS users to execute arbitrary code on the host OS.
To fix CVE-2017-0075, apply the latest security patches provided by Microsoft for your affected Windows version.
CVE-2017-0075 affects Windows Vista, Windows Server 2008, Windows 7, Windows 8.1, Windows 10, Windows Server 2012, and Windows Server 2016.
CVE-2017-0075 can be exploited through crafted applications that execute code on the host OS from a guest OS.
No specific workarounds are recommended for CVE-2017-0075; applying security updates is essential for mitigation.