[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Windows DLL Loading Remote Code Execution Vulnerability

ID: oval:org.secpod.oval:def:39419Date: (C)2017-03-16   (M)2022-10-10
Class: VULNERABILITYFamily: windows




A remote code execution vulnerability exists when Windows improperly validates input before loading dynamic link library (DLL) files. An attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.To exploit the vulnerability, an attacker must first gain access to the local system and have the ability to execute a malicious application.The security update addresses the vulnerability by correcting how Windows validates input before loading DLL files.

Platform:
Microsoft Windows 7
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Reference:
CVE-2017-0039
CVE    1
CVE-2017-0039
CPE    18
cpe:/o:microsoft:windows_server_2008:r2:sp1:x64
cpe:/o:microsoft:windows_server_2008:::x64
cpe:/o:microsoft:windows_server_2008:::x86
cpe:/o:microsoft:windows_7::sp1:x64
...

© SecPod Technologies