Microsoft XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT 8.1; Windows Server 2008 SP2 and R2 SP1; Windows Server 2012 Gold and R2; Windows Server 2016; and Windows Vista SP2 improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site, aka "Microsoft XML Information Disclosure Vulnerability."
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/96069 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038014 | |
https://0patch.blogspot.com/2017/09/exploit-kit-rendezvous-and-cve-2017-0022.html | |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0022 | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: microsoft
Published: 2017-03-17T00:00:00
Updated: 2017-09-27T16:57:01
Reserved: 2016-09-09T00:00:00
Link: CVE-2017-0022
JSON object: View
NVD Information
Status : Modified
Published: 2017-03-17T00:59:00.680
Modified: 2017-09-28T01:29:00.967
Link: CVE-2017-0022
JSON object: View
Redhat Information
No data.
CWE