Hyper-V in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 does not properly validate vSMB packet data, which allows attackers to execute arbitrary code on a target OS, aka "Hyper-V vSMB Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0021.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/96699 | vdb entry third party advisory |
http://www.securitytracker.com/id/1037999 | vdb entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0095 | patch vendor advisory |