The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Microsoft Windows Vista

vulnerability CVE-2017-3058 CVE-2017-3059 CVE-2017-3060

Adobe Flash Player: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Adobe Flash Player.
Impacted products: Flash Player, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, Windows Vista, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity: 4/4.
Consequences: user access/rights, data reading, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 7.
Creation date: 12/04/2017.
Revisions dates: 12/04/2017, 17/05/2017.
Identifiers: 1174, 1211, APSB17-10, CERTFR-2017-AVI-105, CVE-2017-3058, CVE-2017-3059, CVE-2017-3060, CVE-2017-3061, CVE-2017-3062, CVE-2017-3063, CVE-2017-3064, RHSA-2017:0934-01, SUSE-SU-2017:0990-1, VIGILANCE-VUL-22420, ZDI-17-245, ZDI-17-246, ZDI-17-247, ZDI-17-248, ZDI-17-278, ZDI-17-279.

Description of the vulnerability

An attacker can use several vulnerabilities of Adobe Flash Player.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2017-0290

Microsoft Malware Protection Engine: code execution

Synthesis of the vulnerability

An attacker can send a malicious document or invite the victim to read a malicious document, in order to run code during the analysis by Microsoft Malware Protection Engine.
Impacted products: Forefront Endpoint Protection, Forefront Security for Exchange Server, System Center Endpoint Protection, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 4/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights.
Provenance: document.
Creation date: 09/05/2017.
Revision date: 09/05/2017.
Identifiers: 1252, 4022344, CERTFR-2017-ALE-009, CERTFR-2017-AVI-151, CVE-2017-0290, VIGILANCE-VUL-22655.

Description of the vulnerability

The Microsoft Malware Protection Engine product analyzes files, searching for malware. It is used in several Microsoft security products (Windows Defender, Microsoft Security Essentials, etc.).

However, when a malicious file is analyzed, code runs with LocalSystem privileges in mpengine.dll.

An attacker can therefore send a malicious document or invite the victim to read a malicious document, in order to run code during the analysis by Microsoft Malware Protection Engine.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2017-0058 CVE-2017-0155 CVE-2017-0156

Windows: vulnerabilities of April 2017

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.
Impacted products: Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 4/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, data reading, data creation/edition, data deletion, denial of service on server, denial of service on service, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 28.
Creation date: 12/04/2017.
Revisions dates: 12/04/2017, 14/04/2017, 19/04/2017.
Identifiers: 1078, 1079, 1093, 1192, CERTFR-2017-AVI-109, CVE-2017-0058, CVE-2017-0155, CVE-2017-0156, CVE-2017-0158, CVE-2017-0159, CVE-2017-0162, CVE-2017-0163, CVE-2017-0164, CVE-2017-0165, CVE-2017-0166, CVE-2017-0167, CVE-2017-0168, CVE-2017-0169, CVE-2017-0178, CVE-2017-0179, CVE-2017-0180, CVE-2017-0181, CVE-2017-0182, CVE-2017-0183, CVE-2017-0184, CVE-2017-0185, CVE-2017-0186, CVE-2017-0188, CVE-2017-0189, CVE-2017-0191, CVE-2017-0192, CVE-2017-0199, CVE-2017-0211, VIGILANCE-VUL-22413, ZDI-17-284, ZDI-17-285.

Description of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.

The document located in information sources was generated by Vigil@nce from the Microsoft database. It contains details for each product.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2017-0001 CVE-2017-0005 CVE-2017-0007

Windows: vulnerabilities of March 2017

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.
Impacted products: IIS, Windows 10, Windows 2003, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, Windows Vista, Windows XP.
Severity: 4/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, data reading, data creation/edition, denial of service on server, denial of service on service.
Provenance: internet client.
Number of vulnerabilities in this bulletin: 82.
Creation date: 14/03/2017.
Revision date: 22/03/2017.
Identifiers: 1019, 1021, 1022, 1023, 1025, 1027, 1028, 1029, 1030, 1031, 1042, 1052, 1053, 1054, 3208223, 4010318, 4010319, 4010320, 4010321, 4013074, 4013075, 4013076, 4013078, 4013081, 4013082, 4013083, 4013389, 993, CERTFR-2017-AVI-082, CERTFR-2017-AVI-154, CVE-2017-0001, CVE-2017-0005, CVE-2017-0007, CVE-2017-0008, CVE-2017-0014, CVE-2017-0016, CVE-2017-0021, CVE-2017-0022, CVE-2017-0023, CVE-2017-0024, CVE-2017-0025, CVE-2017-0026, CVE-2017-0039, CVE-2017-0042, CVE-2017-0043, CVE-2017-0045, CVE-2017-0047, CVE-2017-0050, CVE-2017-0051, CVE-2017-0055, CVE-2017-0056, CVE-2017-0057, CVE-2017-0060, CVE-2017-0061, CVE-2017-0062, CVE-2017-0063, CVE-2017-0072, CVE-2017-0073, CVE-2017-0074, CVE-2017-0075, CVE-2017-0076, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, CVE-2017-0081, CVE-2017-0082, CVE-2017-0083, CVE-2017-0084, CVE-2017-0085, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, CVE-2017-0090, CVE-2017-0091, CVE-2017-0092, CVE-2017-0095, CVE-2017-0096, CVE-2017-0097, CVE-2017-0098, CVE-2017-0099, CVE-2017-0100, CVE-2017-0101, CVE-2017-0102, CVE-2017-0103, CVE-2017-0104, CVE-2017-0108, CVE-2017-0109, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, CVE-2017-0128, CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0147, CVE-2017-0148, MS17-008, MS17-009, MS17-010, MS17-011, MS17-012, MS17-013, MS17-016, MS17-017, MS17-018, MS17-019, MS17-020, MS17-021, MS17-022, VIGILANCE-VUL-22132, ZDI-17-168.

Description of the vulnerability

An attacker can use several vulnerabilities of Microsoft products.

The document located in information sources was generated by Vigil@nce from the Microsoft database. It contains details for each product.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2017-2997 CVE-2017-2998 CVE-2017-2999

Adobe Flash Player: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Adobe Flash Player.
Impacted products: Flash Player, IIS, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, Windows Vista, RHEL, SUSE Linux Enterprise Desktop, SLES.
Severity: 4/4.
Consequences: user access/rights, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 7.
Creation date: 14/03/2017.
Revision date: 22/03/2017.
Identifiers: 3208223, 4010318, 4010319, 4010320, 4010321, 4013074, 4013075, 4013076, 4013078, 4013081, 4013082, 4013083, 4013389, 4014329, APSB17-07, CERTFR-2017-AVI-077, CVE-2017-2997, CVE-2017-2998, CVE-2017-2999, CVE-2017-3000, CVE-2017-3001, CVE-2017-3002, CVE-2017-3003, MS17-008, MS17-009, MS17-010, MS17-011, MS17-012, MS17-013, MS17-016, MS17-017, MS17-018, MS17-019, MS17-020, MS17-021, MS17-022, MS17-023, RHSA-2017:0526-01, SUSE-SU-2017:0703-1, VIGILANCE-VUL-22122, ZDI-17-174, ZDI-17-175, ZDI-17-176, ZDI-17-177, ZDI-17-178, ZDI-17-179, ZDI-17-287.

Description of the vulnerability

Several vulnerabilities were announced in Adobe Flash Player.

An attacker can generate a buffer overflow, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2997]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2998]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-2999]

An attacker can predict a random, in order to obtain sensitive information. [severity:2/4; CVE-2017-3000]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-3001, ZDI-17-174, ZDI-17-175, ZDI-17-176, ZDI-17-177, ZDI-17-178, ZDI-17-179]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-3002]

An attacker can force the usage of a freed memory area, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2017-3003]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2016-3216 CVE-2016-3219 CVE-2016-3220

Microsoft Windows: three vulnerabilities via Graphics Component

Synthesis of the vulnerability

An attacker can use several vulnerabilities via Graphics Component of Microsoft Windows.
Impacted products: Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights, data reading.
Provenance: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 15/06/2016.
Revisions dates: 21/06/2016, 15/02/2017.
Identifiers: 3164036, 779, 785, 992, CERTFR-2016-AVI-206, CVE-2016-3216, CVE-2016-3219, CVE-2016-3220, MS16-074, VIGILANCE-VUL-19887.

Description of the vulnerability

Several vulnerabilities were announced in Microsoft Windows.

An attacker can get nformation useful to bypass ASLR. [severity:3/4; CVE-2016-3216]

An attacker can corrupt an object in memory, in order to get kernel privileges. [severity:3/4; 779, CVE-2016-3219]

An attacker can bypass security features via ATMFD.dll, in order to escalate his privileges. [severity:3/4; 785, CVE-2016-3220]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2017-0038

Microsoft Windows: information disclosure via gdi32.dll

Synthesis of the vulnerability

A local attacker can trigger a read only buffer overflow via gdi32.dll of Microsoft Windows via a data structure of type EMR_SETDIBITSTODEVICE, in order to get sensitive information.
Impacted products: IIS, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 15/02/2017.
Identifiers: 3208223, 4010318, 4010319, 4010320, 4010321, 4013074, 4013075, 4013076, 4013078, 4013081, 4013082, 4013083, 4013389, 992, CERTFR-2017-ALE-002, CVE-2017-0038, MS17-008, MS17-009, MS17-010, MS17-011, MS17-012, MS17-013, MS17-016, MS17-017, MS17-018, MS17-019, MS17-020, MS17-021, MS17-022, VIGILANCE-VUL-21837.

Description of the vulnerability

A local attacker can trigger a read only buffer overflow via gdi32.dll of Microsoft Windows via a data structure of type EMR_SETDIBITSTODEVICE, in order to get sensitive information.

The bulletin VIGILANCE-VUL-19887 indicates a similar vulnerability (CVE-2016-3216), which has been fixed as annouced in MS16-074.
Full Vigil@nce bulletin... (Free trial)

vulnerability 21760

Windows: memory corruption via SMB Tree Connect Response

Synthesis of the vulnerability

An attacker can generate a memory corruption via SMB Tree Connect Response on a Windows client, in order to trigger a denial of service, and possibly to run code.
Impacted products: Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, denial of service on server, denial of service on service, denial of service on client.
Provenance: intranet server.
Creation date: 03/02/2017.
Identifiers: VIGILANCE-VUL-21760, VU#867968.

Description of the vulnerability

The Windows system can connect to a remote share, using the SMB/CIFS protocol.

When a SMB client connects, it sends a SMB2 TREE_CONNECT Request message to the server. It then returns a SMB2 TREE_CONNECT Response message to the client. However, if this message contains too many data, the client memory is corrupted.

An attacker can therefore generate a memory corruption via SMB Tree Connect Response on a Windows client, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2017-0004

Windows: denial of service via LSASS

Synthesis of the vulnerability

An attacker can generate a fatal error via LSASS (Local Security Authority Subsystem Service) of Windows, in order to trigger a denial of service.
Impacted products: Windows 2008 R0, Windows 2008 R2, Windows 7, Windows Vista.
Severity: 1/4.
Consequences: denial of service on server, denial of service on service.
Provenance: user shell.
Creation date: 11/01/2017.
Identifiers: 3216771, CERTFR-2017-AVI-010, CVE-2017-0004, MS17-004, VIGILANCE-VUL-21543.

Description of the vulnerability

An attacker can generate a fatal error via LSASS (Local Security Authority Subsystem Service) of Windows, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2014-0282 CVE-2014-1762 CVE-2014-1764

Internet Explorer: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Internet Explorer.
Impacted products: IE, Windows 2003, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 4/4.
Consequences: user access/rights.
Provenance: document.
Number of vulnerabilities in this bulletin: 4.
Creation date: 10/06/2014.
Revision date: 20/12/2016.
Identifiers: 2969262, CERTFR-2014-AVI-266, CVE-2014-0282, CVE-2014-1762, CVE-2014-1764, CVE-2014-1766, CVE-2014-1769, CVE-2014-1771, CVE-2014-1772, CVE-2014-1773, CVE-2014-1774, CVE-2014-1775, CVE-2014-1777, CVE-2014-1778, CVE-2014-1779, CVE-2014-1780, CVE-2014-1781, CVE-2014-1782, CVE-2014-1783, CVE-2014-1784, CVE-2014-1785, CVE-2014-1786, CVE-2014-1788, CVE-2014-1789, CVE-2014-1790, CVE-2014-1791, CVE-2014-1792, CVE-2014-1794, CVE-2014-1795, CVE-2014-1796, CVE-2014-1797, CVE-2014-1799, CVE-2014-1800, CVE-2014-1802, CVE-2014-1803, CVE-2014-1804, CVE-2014-1805, CVE-2014-2753, CVE-2014-2754, CVE-2014-2755, CVE-2014-2756, CVE-2014-2757, CVE-2014-2758, CVE-2014-2759, CVE-2014-2760, CVE-2014-2761, CVE-2014-2763, CVE-2014-2764, CVE-2014-2765, CVE-2014-2766, CVE-2014-2767, CVE-2014-2768, CVE-2014-2769, CVE-2014-2770, CVE-2014-2771, CVE-2014-2772, CVE-2014-2773, CVE-2014-2775, CVE-2014-2776, CVE-2014-2777, CVE-2014-2782, MS14-035, VIGILANCE-VUL-14876, ZDI-14-174, ZDI-14-175, ZDI-14-176, ZDI-14-177, ZDI-14-178, ZDI-14-179, ZDI-14-180, ZDI-14-181, ZDI-14-182, ZDI-14-183, ZDI-14-184, ZDI-14-185, ZDI-14-186, ZDI-14-212, ZDI-14-213, ZDI-14-226, ZDI-14-227, ZDI-14-237, ZDI-14-259, ZDI-14-260, ZDI-14-270, ZDI-14-354, ZDI-14-357, ZDI-14-366, ZDI-14-367.

Description of the vulnerability

Several vulnerabilities were announced in Internet Explorer.

An attacker can use a TLS Certificate Renegotiation, in order to obtain sensitive information. [severity:2/4; CVE-2014-1771]

An attacker can read local files, in order to obtain sensitive information. [severity:2/4; CVE-2014-1777]

An attacker can use three vulnerabilities, in order to escalate his privileges. [severity:2/4; CVE-2014-1764, CVE-2014-1778, CVE-2014-2777]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to execute code. [severity:4/4; CVE-2014-0282, CVE-2014-1762, CVE-2014-1766, CVE-2014-1769, CVE-2014-1772, CVE-2014-1773, CVE-2014-1774, CVE-2014-1775, CVE-2014-1779, CVE-2014-1780, CVE-2014-1781, CVE-2014-1782, CVE-2014-1783, CVE-2014-1784, CVE-2014-1785, CVE-2014-1786, CVE-2014-1788, CVE-2014-1789, CVE-2014-1790, CVE-2014-1791, CVE-2014-1792, CVE-2014-1794, CVE-2014-1795, CVE-2014-1796, CVE-2014-1797, CVE-2014-1799, CVE-2014-1800, CVE-2014-1802, CVE-2014-1803, CVE-2014-1804, CVE-2014-1805, CVE-2014-2753, CVE-2014-2754, CVE-2014-2755, CVE-2014-2756, CVE-2014-2757, CVE-2014-2758, CVE-2014-2759, CVE-2014-2760, CVE-2014-2761, CVE-2014-2763, CVE-2014-2764, CVE-2014-2765, CVE-2014-2766, CVE-2014-2767, CVE-2014-2768, CVE-2014-2769, CVE-2014-2770, CVE-2014-2771, CVE-2014-2772, CVE-2014-2773, CVE-2014-2775, CVE-2014-2776, CVE-2014-2782, ZDI-14-174, ZDI-14-175, ZDI-14-176, ZDI-14-177, ZDI-14-178, ZDI-14-179, ZDI-14-180, ZDI-14-181, ZDI-14-182, ZDI-14-183, ZDI-14-184, ZDI-14-185, ZDI-14-186, ZDI-14-212, ZDI-14-213, ZDI-14-226, ZDI-14-227, ZDI-14-237, ZDI-14-259, ZDI-14-260, ZDI-14-270, ZDI-14-354, ZDI-14-357, ZDI-14-366, ZDI-14-367]
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.