First published: Fri May 26 2017(Updated: )
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to denial of service. aka "Microsoft Malware Protection Engine Denial of Service Vulnerability", a different vulnerability than CVE-2017-8535, CVE-2017-8536, CVE-2017-8539, and CVE-2017-8542.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Defender | ||
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1511 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2016 | ||
Microsoft System Center Endpoint Protection | ||
Microsoft Exchange Server | =2013 | |
Microsoft Exchange Server | =2016 | |
Microsoft Forefront Endpoint Protection | ||
Microsoft Forefront Endpoint Protection | =2010 | |
Microsoft Security Essentials | ||
Microsoft System Center Endpoint Protection | ||
Microsoft Windows intune endpoint Protection |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8537 is classified as a critical severity vulnerability that can lead to remote code execution.
To fix CVE-2017-8537, ensure that you have the latest updates installed for Microsoft Malware Protection Engine.
CVE-2017-8537 affects Microsoft Windows Defender, Microsoft Forefront Endpoint Protection, and several versions of Windows and Exchange Server.
Yes, CVE-2017-8537 can be exploited remotely if the vulnerable software is accessible over the network.
CVE-2017-8537 was identified and disclosed with a patch available, which means it is not considered a zero-day vulnerability.