First published: Thu Jun 15 2017(Updated: )
A DCOM object in Helppane.exe in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016, when configured to run as the interactive user, allows an authenticated attacker to run arbitrary code in another user's session, aka "Windows COM Session Elevation of Privilege Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | =1511 | |
Windows 10 | =1607 | |
Windows 10 | =1703 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows | ||
Microsoft Windows | =rt | |
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =gold | |
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0298 is rated as critical due to its potential for remote code execution by an authenticated attacker.
To fix CVE-2017-0298, apply the latest security updates provided by Microsoft for the affected Windows versions.
CVE-2017-0298 affects multiple Windows platforms including Windows 7, 8.1, 10, and Windows Server versions up to 2016.
Yes, CVE-2017-0298 can be exploited remotely if the DCOM object is improperly configured.
Yes, exploitation of CVE-2017-0298 requires that the attacker be authenticated to the system.