
====================================================================

                              CERT-Renater

                 Note d'Information No. 2017/VULN069
_____________________________________________________________________

DATE                : 15/03/2017

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Windows versions 8.1, Server 2012, RT 8.1, 10,
                                        Server 2016.

=====================================================================
KB4010319
https://technet.microsoft.com/en-us/library/security/MS17-009
____________________________________________________________________

Microsoft Security Bulletin MS17-009: Security Update for Microsoft
Windows PDF Library (4010319)

Bulletin Number: MS17-009

Bulletin Title: Security Update for Microsoft Windows PDF Library

Severity: Critical

KB Article: 4010319

Version: 1.0

Published Date: 14/03/17

Executive Summary

This security update resolves a vulnerability in Microsoft Windows. The
vulnerability could allow remote code execution if a user views
specially crafted PDF content online or opens a specially crafted PDF
document.

This security update is rated Critical for all supported editions of
Windows 8.1, Windows Server 2012, Windows RT 8.1, Windows Server 2012
R2, Windows 10, and Windows Server 2016. For more information, see the
Affected Software and Vulnerability Severity Ratings section.

The security update addresses the vulnerablity by correcting how
affected systems handle objects in memory. For more information about
the vulnerability, see the Vulnerability Information section.

For more information about this update, see Microsoft Knowledge Base
Article 4010319.

Affected Software

Windows 8.1
Windows Server 2012
Windows Server 2012 R2
Windows RT 8.1
Windows 10
Windows Server 2016

Note Please see the Security Update Guide for a new approach to
consuming the security update information. You can customize your views
and create affected software spreadsheets, as well as download data via
a restful API. For more information, please see the Security Updates
Guide FAQ. As a reminder, the Security Updates Guide will be replacing
security bulletins. Please see our blog post, Furthering our commitment
to security updates, for more details.

Update FAQ

The PDF Library vulnerability discussed in this bulletin is also
discussed in the Microsoft Edge bulletin being released in March. To be
protected from the vulnerability, do I need to install multiple updates
for my particular system and Microsoft Edge configuration?

No. Customers running Windows 10 systems only need to install the one
cumulative update for their system to be protected from CVE-2017-0023.
The PDF library vulnerability also appears in the Microsoft Edge
bulletin (MS17-007) because on Windows 10 systems the security fix for
this vulnerability resides in the Microsoft Edge component that is
shipping in the cumulative update.

Vulnerability Information

Microsoft PDF Memory Corruption Vulnerability CVE 2017-0023

A remote code execution vulnerability exists when Microsoft Windows PDF
Library improperly handles objects in memory. The vulnerability could
corrupt memory in a way that enables an attacker to execute arbitrary
code in the context of the current user. An attacker who successfully
exploited the vulnerability could gain the same user rights as the
current user. If the current user is logged on with administrative user
rights, an attacker could take control of an affected system. An
attacker could then install programs; view, change, or delete data; or
create new accounts with full user rights.

To exploit the vulnerability on Windows 10 systems with Microsoft Edge
set as the default browser, an attacker could host a specially crafted
website that contains malicious PDF content and then convince users to
view the website.
The attacker could also take advantage of compromised websites, or
websites that accept or host user-provided content or advertisements,
by adding specially crafted PDF content to such sites. Only Windows 10
systems with Microsoft Edge set as the default browser can be
compromised simply by viewing a website. The browsers for all other
affected operating systems do not automatically render PDF content, so
an attacker would have no way to force users to view attacker-
controlled content. Instead, an attacker would have to convince users
to open a specially crafted PDF document, typically by way of
an enticement in an email or instant message or by way of an email
attachment.

The update addresses the vulnerability by modifying how affected
systems handle objects in memory.

Mitigating Factors

Microsoft has not identified any mitigating factors for this
vulnerability.

Workarounds

Microsoft has not identified any workarounds for this vulnerability.

Security Update Deployment

For Security Update Deployment information, see the Microsoft Knowledge
Base article referenced here in the Executive Summary.

Acknowledgments

Microsoft recognizes the efforts of those in the security community who
help us protect customers through coordinated vulnerability disclosure.
See Acknowledgments for more information.

Disclaimer

The information provided in the Microsoft Knowledge Base is provided
"as is" without warranty of any kind. Microsoft disclaims all
warranties, either express or implied, including the warranties of
merchantability and fitness for a particular purpose. In no event shall
Microsoft Corporation or its suppliers be liable for any damages
whatsoever including direct, indirect, incidental, consequential, loss
of business profits or special damages, even if Microsoft Corporation
or its suppliers have been advised of the possibility of such damages.
Some states do not allow the exclusion or limitation of liability for
consequential or incidental damages so the foregoing limitation
may not apply.

==========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================



