Security and Quality Rollup for .NET Framework (Sep 2017)

high Nessus Plugin ID 103137

Synopsis

The remote Windows host has a software framework installed that is affected by a security feature bypass vulnerability.

Description

The .NET Framework installation on the remote host is missing a security update. It is, therefore, affected by the following vulnerability:

- A remote code execution vulnerability exists when Microsoft .NET Framework processes untrusted input. An attacker who successfully exploited this vulnerability in software using the .NET framework could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
(CVE-2017-8759)

Solution

Microsoft has released a set of patches for Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, and 4.7

See Also

http://www.nessus.org/u?39028b0b

http://www.nessus.org/u?a9b7377f

Plugin Details

Severity: High

ID: 103137

File Name: smb_nt_ms17_sep_4041083.nasl

Version: 1.15

Type: local

Agent: windows

Published: 9/12/2017

Updated: 11/30/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.8

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2017-8759

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:.net_framework

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/12/2017

Vulnerability Publication Date: 9/12/2017

CISA Known Exploited Vulnerability Due Dates: 5/3/2022

Exploitable With

CANVAS (CANVAS)

Core Impact

Reference Information

CVE: CVE-2017-8759

BID: 100742

MSFT: MS17-4038781, MS17-4038782, MS17-4038783, MS17-4038788, MS17-4041083, MS17-4041084, MS17-4041085, MS17-4041086, MS17-4041090, MS17-4041091, MS17-4041092, MS17-4041093

MSKB: 4038781, 4038782, 4038783, 4038788, 4041083, 4041084, 4041085, 4041090, 4041091, 4041092, 4041093