CVE-2017-8759

Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to execute code remotely via a malicious document or application, aka ".NET Framework Remote Code Execution Vulnerability."
References
Link Resource
http://www.securityfocus.com/bid/100742 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/100742 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039324 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039324 Broken Link Third Party Advisory VDB Entry
https://github.com/bhdresh/CVE-2017-8759 Exploit Third Party Advisory
https://github.com/bhdresh/CVE-2017-8759 Exploit Third Party Advisory
https://github.com/GitHubAssessments/CVE_Assessments_01_2020 Third Party Advisory
https://github.com/GitHubAssessments/CVE_Assessments_01_2020 Third Party Advisory
https://github.com/nccgroup/CVE-2017-8759 Exploit Third Party Advisory
https://github.com/nccgroup/CVE-2017-8759 Exploit Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759 Patch Vendor Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759 Patch Vendor Advisory
https://www.exploit-db.com/exploits/42711/ Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/42711/ Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
OR cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
OR cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*

History

10 Feb 2025, 15:15

Type Values Removed Values Added
References (EXPLOIT-DB) https://www.exploit-db.com/exploits/42711/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/42711/ - Third Party Advisory, VDB Entry
References (MISC) https://github.com/nccgroup/CVE-2017-8759 - Exploit, Third Party Advisory () https://github.com/nccgroup/CVE-2017-8759 - Exploit, Third Party Advisory
References (MISC) https://github.com/GitHubAssessments/CVE_Assessments_01_2020 - Third Party Advisory () https://github.com/GitHubAssessments/CVE_Assessments_01_2020 - Third Party Advisory
References (CONFIRM) https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759 - Patch, Vendor Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8759 - Patch, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/100742 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100742 - Broken Link, Third Party Advisory, VDB Entry
References (SECTRACK) http://www.securitytracker.com/id/1039324 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039324 - Broken Link, Third Party Advisory, VDB Entry
References (MISC) https://github.com/bhdresh/CVE-2017-8759 - Exploit, Third Party Advisory () https://github.com/bhdresh/CVE-2017-8759 - Exploit, Third Party Advisory

24 Jul 2024, 17:11

Type Values Removed Values Added
CPE cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
First Time Microsoft windows 7
Microsoft windows 10 1703
Microsoft windows 10 1507
Microsoft windows 8.1
Microsoft windows 10 1511
Microsoft windows Server 2012
Microsoft windows Server 2016
Microsoft windows Rt 8.1
Microsoft windows Server 2008
Microsoft windows 10 1607
CWE CWE-20 NVD-CWE-noinfo
References (SECTRACK) http://www.securitytracker.com/id/1039324 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1039324 - Broken Link, Third Party Advisory, VDB Entry
References (MISC) https://github.com/nccgroup/CVE-2017-8759 - (MISC) https://github.com/nccgroup/CVE-2017-8759 - Exploit, Third Party Advisory
References (BID) http://www.securityfocus.com/bid/100742 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/100742 - Broken Link, Third Party Advisory, VDB Entry
References (MISC) https://github.com/GitHubAssessments/CVE_Assessments_01_2020 - (MISC) https://github.com/GitHubAssessments/CVE_Assessments_01_2020 - Third Party Advisory
References (MISC) https://github.com/bhdresh/CVE-2017-8759 - (MISC) https://github.com/bhdresh/CVE-2017-8759 - Exploit, Third Party Advisory

Information

Published : 2017-09-13 01:29

Updated : 2025-03-13 21:00


NVD link : CVE-2017-8759

Mitre link : CVE-2017-8759


JSON object : View

Products Affected

microsoft

  • windows_7
  • windows_8.1
  • windows_10_1607
  • windows_10_1703
  • windows_rt_8.1
  • windows_10_1511
  • windows_server_2016
  • windows_server_2012
  • .net_framework
  • windows_10_1507
  • windows_server_2008