First published: Fri May 26 2017(Updated: )
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, and Windows Server 2016, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability", a different vulnerability than CVE-2017-8540 and CVE-2017-8541.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Forefront Security for SharePoint | ||
Microsoft Malware Protection Engine | <=1.1.13704.0 | |
Microsoft Windows Defender | ||
Microsoft Exchange Server | =2013 | |
Microsoft Exchange Server | =2016 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1511 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1703 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.1 | ||
Microsoft Windows RT | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8538 has been categorized as a critical severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2017-8538, ensure that your Microsoft Malware Protection Engine is updated to a version higher than 1.1.13704.0.
CVE-2017-8538 affects Microsoft Defender and Microsoft Forefront running on various versions of Windows including Windows 7 SP1 and Windows Server 2016.
The impact of CVE-2017-8538 includes the risk of remote code execution which could allow attackers to take control of affected systems.
Currently, the best workaround for CVE-2017-8538 is to keep your software updated and implement security best practices.