SB2017041201 - Multiple vulnerabilities in Microsoft Hyper-V
Published: April 11, 2017 Updated: April 12, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 13 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2017-0162)
The vulnerability allows a remote authenticated attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation by Windows Hyper-V Network Switch on a host server. A remote authenticated attacker can run a specially crafted application on a guest operating system and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in compromise vulnerable system.
2) Improper input validation (CVE-ID: CVE-2017-0163)
The vulnerability allows a remote authenticated attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation by Windows Hyper-V Network Switch on a host server. A remote authenticated attacker can run a specially crafted application on a guest operating system and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in compromise vulnerable system.
3) Improper input validation (CVE-ID: CVE-2017-0180)
The vulnerability allows a remote authenticated attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation by Windows Hyper-V Network Switch on a host server. A remote authenticated attacker can run a specially crafted application on a guest operating system and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in compromise vulnerable system.
4) Improper input validation (CVE-ID: CVE-2017-0181)
The vulnerability allows a remote authenticated attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation by Windows Hyper-V Network Switch on a host server. A remote authenticated attacker can run a specially crafted application on a guest operating system and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability may result in compromise vulnerable system.
5) Improper input validation (CVE-ID: CVE-2017-0178)
The vulnerability allows a remote authenticated attacker to cause DoS conditions.
The vulnerability exists due to improper input validation by Windows Hyper-V Network Switch on a host server. A remote authenticated attacker can run a specially crafted application on a guest operating system and cause a host machine to crash.
Successful exploitation of this vulnerability may result in denial of service.
6) Improper input validation (CVE-ID: CVE-2017-0179)
The vulnerability allows a remote authenticated attacker to cause DoS conditions.
The vulnerability exists due to improper input validation by Windows Hyper-V Network Switch on a host server. A remote authenticated attacker can run a specially crafted application on a guest operating system and cause a host machine to crash.
Successful exploitation of this vulnerability may result in denial of service.
7) Improper input validation (CVE-ID: CVE-2017-0182)
The vulnerability allows a remote authenticated attacker to cause DoS conditions.
The vulnerability exists due to improper input validation by Windows Hyper-V Network Switch on a host server. A remote authenticated attacker can run a specially crafted application on a guest operating system and cause a host machine to crash.
Successful exploitation of this vulnerability may result in denial of service.
8) Improper input validation (CVE-ID: CVE-2017-0183)
The vulnerability allows a remote authenticated attacker to cause DoS conditions.
The vulnerability exists due to improper input validation by Windows Hyper-V Network Switch on a host server. A remote authenticated attacker can run a specially crafted application on a guest operating system and cause a host machine to crash.
Successful exploitation of this vulnerability may result in denial of service.
9) Improper input validation (CVE-ID: CVE-2017-0184)
The vulnerability allows a remote authenticated attacker to cause DoS conditions.
The vulnerability exists due to improper input validation by Windows Hyper-V Network Switch on a host server. A remote authenticated attacker can run a specially crafted application on a guest operating system and cause a host machine to crash.
Successful exploitation of this vulnerability may result in denial of service.
10) Improper input validation (CVE-ID: CVE-2017-0185)
The vulnerability allows a remote authenticated attacker to cause DoS conditions.
The vulnerability exists due to improper input validation by Windows Hyper-V Network Switch on a host server. A remote authenticated attacker can run a specially crafted application on a guest operating system and cause a host machine to crash.
Successful exploitation of this vulnerability may result in denial of service.
11) Improper input validation (CVE-ID: CVE-2017-0186)
The vulnerability allows a remote authenticated attacker to cause DoS conditions.
The vulnerability exists due to improper input validation by Windows Hyper-V Network Switch on a host server. A remote authenticated attacker can run a specially crafted application on a guest operating system and cause a host machine to crash.
Successful exploitation of this vulnerability may result in denial of service.
12) Information disclosure (CVE-ID: CVE-2017-0168)
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.
The vulnerability exists due to improper input validation by Windows Hyper-V Network Switch on a host server. A remote authenticated attacker can run a specially crafted application on a guest operating system and access important data.
Successful exploitation of this vulnerability may result in information disclosure.
13) Information disclosure (CVE-ID: CVE-2017-0169)
The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.
The vulnerability exists due to improper input validation by Windows Hyper-V Network Switch on a host server. A remote authenticated attacker can run a specially crafted application on a guest operating system and access important data.
Successful exploitation of this vulnerability may result in information disclosure.
Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0162
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0163
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0180
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0181
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0178
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0179
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0182
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0183
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0184
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0185
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0186
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0168
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0169