
====================================================================

                              CERT-Renater

                 Note d'Information No. 2017/VULN064
_____________________________________________________________________

DATE                : 15/03/2017

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Windows versions Vista, 7, 8, Server 2008, 8.1,
               Server 2012, RT 8.1, 10, Server 2016 running Windows SMB.

=====================================================================
KB4013082
https://technet.microsoft.com/en-us/library/security/MS17-008
____________________________________________________________________

Microsoft Security Bulletin MS17-008: Security Update for Windows
Hyper-V (4013082)

Bulletin Number: MS17-008

Bulletin Title: Security Update for Windows Hyper-V

Severity: Critical

KB Article: 4013082

Version: 1.0

Published Date: 14/03/2017

Executive Summary

This security update resolves vulnerabilities in Microsoft Windows. The
most severe of the vulnerabilities could allow remote code execution if
an authenticated attacker on a guest operating system runs a specially
crafted application that causes the Hyper-V host operating system to
execute arbitrary code. Customers who have not enabled the Hyper-V role
are not affected.

This security update is rated Critical for all supported editions of
Windows.

For more information, see the Affected Software section.

The security update addresses the vulnerabilities by correcting how
Hyper-V validates guest operating system user input. For more
information about the vulnerabilities, see the Vulnerability
Information section.

For more information about this update, see Microsoft Knowledge Base
Article 4013082.

Affected Software

Windows Vista
Windows Server 2008
Windows 7
Windows Server 2008 R2
Windows 8.1
Windows Server 2012
Windows Server 2012 R2
Windows 10
Windows Server 2016

Update FAQ

I do not have Hyper-V enabled, why am I being offered this update?

The vulnerable code exists in the affected software that is listed in
the affected software table. As a defense-in-depth measure, and to
ensure that systems are protected if Hyper-V is enabled, the update is
applicable to all supported products and versions that contain the
vulnerable code.


Vulnerability Information

Multiple Hyper-V Denial of Service Vulnerabilities

Multiple denial of service vulnerabilities exist when Microsoft Hyper-V
Network Switch on a host server fails to properly validate input from a
privileged user on a guest operating system. To exploit these
vulnerabilities, an attacker who already has a privileged account on a
guest operating system, running as a virtual machine, could run a
specially crafted application that causes a host machine to crash.

To exploit these vulnerabilities an attacker who already has a
privileged account on a guest operating system, running as a virtual
machine, could run a specially crafted application.

The security update addresses these vulnerabilities by preventing
out-of-bound memory access.


Mitigating Factors

The following mitigating factors may be helpful in your situation:

Customers who have not enabled the Hyper-V role are not affected.

Workarounds

Microsoft has not identified any workarounds for these vulnerabilities.


Multiple Hyper-V vSMB Remote Code Execution Vulnerabilities

Multiple remote code execution vulnerabilities exist when Windows
Hyper-V on a host server fails to properly validate vSMB packet data.
An attacker who successfully exploited these vulnerabilities could
execute arbitrary code on a target operating system.

To exploit these vulnerabilities an attacker running inside a virtual
machine could run a specially crafted application that could cause the
Hyper-V host operating system to execute arbitrary code.

The update addresses the vulnerabilities by correcting how Windows
Hyper-V validates vSMB packet data.

Mitigating Factors

The following mitigating factors may be helpful in your situation:

Customers who have not enabled the Hyper-V role are not affected.

Workarounds

Microsoft has not identified any workarounds for these vulnerabilities.


Multiple Hyper-V Remote Code Execution Vulnerabilities

Multiple remote code execution vulnerabilities exist when Windows
Hyper-V on a host server fails to properly validate input from an
authenticated user on a guest operating system. To exploit these
vulnerabilities, an attacker could run a specially crafted application
on a guest operating system that could cause the Hyper-V host operating
system to execute arbitrary code

An attacker who successfully exploited these vulnerabilities could
execute arbitrary code on the host operating system.

The security update addresses these vulnerabilities by correcting how
Hyper-V validates guest operating system user input

Mitigating Factors

The following mitigating factors may be helpful in your situation:

Customers who have not enabled the Hyper-V role are not affected.

Workarounds

Microsoft has not identified any workarounds for these vulnerabilities.


Hyper-V Information Disclosure Vulnerability CVE-2017-0096

An information disclosure vulnerability exists when Windows Hyper-V on
a host operating system fails to properly validate input from an
authenticated user on a guest operating system. To exploit the
vulnerability, an attacker on a guest operating system could run a
specially crafted application that could cause the Hyper-V host
operating system to disclose memory information.

An attacker who successfully exploited the vulnerability could gain
access to information on the Hyper-V host operating system.

The security update addresses the vulnerability by correcting how
Hyper-V validates guest operating system user input.

Mitigating Factors

The following mitigating factors may be helpful in your situation:

Customers who have not enabled the Hyper-V role are not affected.

Workarounds

Microsoft has not identified any workarounds for this vulnerability.


Security Update Deployment

For Security Update Deployment information, see the Microsoft Knowledge
Base article referenced here in the Executive Summary.


Acknowledgments

Microsoft recognizes the efforts of those in the security community who
help us protect customers through coordinated vulnerability disclosure.
See Acknowledgments for more information.


Disclaimer

The information provided in the Microsoft Knowledge Base is provided
"as is" without warranty of any kind. Microsoft disclaims all
warranties, either express or implied, including the warranties of
merchantability and fitness for a particular purpose. In no event shall
Microsoft Corporation or its suppliers be liable for any damages
whatsoever including direct, indirect, incidental, consequential, loss
of business profits or special damages, even if Microsoft Corporation
or its suppliers have been advised of the possibility of such damages.
Some states do not allow the exclusion or limitation of liability for
consequential or incidental damages so the foregoing limitation
may not apply.

==========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================




