This host is missing an important security
update according to Microsoft Security Updates released for Microsoft Malware
Protection Engine dated 12/06/2017
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.812238");
script_version("2023-07-14T16:09:27+0000");
script_cve_id("CVE-2017-11937", "CVE-2017-11940");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2023-07-14 16:09:27 +0000 (Fri, 14 Jul 2023)");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2018-10-30 16:27:00 +0000 (Tue, 30 Oct 2018)");
script_tag(name:"creation_date", value:"2017-12-08 11:29:03 +0530 (Fri, 08 Dec 2017)");
script_name("Microsoft Malware Protection Engine on Windows Defender Multiple Remote Code Execution Vulnerabilities");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2017 Greenbone AG");
script_family("Windows");
script_dependencies("smb_reg_service_pack.nasl");
script_require_ports(139, 445);
script_mandatory_keys("SMB/WindowsVersion");
script_xref(name:"URL", value:"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11937");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/102070");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/102104");
script_xref(name:"URL", value:"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11940");
script_tag(name:"summary", value:"This host is missing an important security
update according to Microsoft Security Updates released for Microsoft Malware
Protection Engine dated 12/06/2017");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple flaws exist when the Microsoft
Malware Protection Engine does not properly scan a specially crafted file,
leading to memory corruption.");
script_tag(name:"impact", value:"Successful exploitation will allow an
attacker who successfully exploited this vulnerability to execute arbitrary
code in the security context of the LocalSystem account and take control of
the system. An attacker could then:
- install programs
- view, change, or delete data
- create new accounts with full user rights.");
script_tag(name:"affected", value:"- Microsoft Windows Defender on Microsoft Windows 8.1
- Microsoft Windows 7 SP1
- Microsoft Windows 10 x32/x64
- Microsoft Windows Server 2016 x64
- Microsoft Windows 10 Version 1511 x32/x64
- Microsoft Windows 10 Version 1607 x32/x64
- Microsoft Windows 10 Version 1703 x32/x64
- Microsoft Windows 10 Version 1709 x32/x64");
script_tag(name:"solution", value:"Run the Windows Update to update the malware
protection engine to the latest version available. Typically, no action is
required as the built-in mechanism for the automatic detection and deployment
of updates will apply the update itself.");
script_tag(name:"qod_type", value:"registry");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");
if(hotfix_check_sp(win7:2, win7x64:2, win8_1:1, win8_1x64:1, win10:1, win10x64:1, win2016:1) <= 0)
exit(0);
key = "SOFTWARE\Microsoft\Windows Defender";
if(!registry_key_exists(key:key))
exit(0);
check_key = key + "\Signature Updates";
check_item = "EngineVersion";
def_version = registry_get_sz(key:check_key, item:check_item);
if(!def_version || def_version !~ "^[0-9.]{2,}")
exit(0);
##Last version of the Microsoft Malware Protection Engine affected by this vulnerability Version 1.1.14306.0
##First version of the Microsoft Malware Protection Engine with this vulnerability addressed 1.1.14405.2
if(version_is_less(version:def_version, test_version:"1.1.14405.2")) {
report = report_fixed_ver(installed_version:def_version, fixed_version:"1.1.14405.2", reg_checked:check_key + "!" + check_item);
security_message(port:0, data:report);
exit(0);
}
exit(99);