Microsoft Security Bulletin MS17-008 - Critical
Security Update for Windows Hyper-V (4013082)
Published: March 14, 2017
Version: 1.0
Executive Summary
This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an authenticated attacker on a guest operating system runs a specially crafted application that causes the Hyper-V host operating system to execute arbitrary code. Customers who have not enabled the Hyper-V role are not affected.
This security update is rated Critical for all supported editions of Windows. For more information, see the Affected Software section.
The security update addresses the vulnerabilities by correcting how Hyper-V validates guest operating system user input. For more information about the vulnerabilities, see the Vulnerability Information section.
For more information about this update, see Microsoft Knowledge Base Article 4013082.
Affected Software and Vulnerability Severity Ratings
The following software versions or editions are affected. Versions or editions that are not listed are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.
The following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the March bulletin summary.
Microsoft Software (Table 1 of 2)
Operating System | Hyper-V vSMB Remote Code Execution Vulnerability - CVE-2017-0021 | Microsoft Hyper-V Network Switch Denial of Service Vulnerability - CVE-2017-0051 | Hyper-V Denial of Service Vulnerability - CVE-2017-0074 | Hyper-V Remote Code Execution Vulnerability - CVE-2017-0075 | Hyper-V Denial of Service Vulnerabilities: CVE-2017-0076 CVE-2017-0097 CVE-2017-0099 | Updates Replaced |
---|---|---|---|---|---|---|
Windows Server 2008 | ||||||
Windows Server 2008 for x64-based Systems Service Pack 2 (3211306) | Not applicable | Not applicable | Not applicable | Critical Remote Code Execution | Important Denial of Service | None |
Windows 7 | ||||||
Windows 7 for x64-based Systems Service Pack 1 (4012212) Security Only[1] | Not applicable | Not applicable | Not applicable | Critical Remote Code Execution | Important Denial of Service | None |
Windows 7 for x64-based Systems Service Pack 1 (4012215) Monthly Rollup[1] | Not applicable | Not applicable | Not applicable | Critical Remote Code Execution | Important Denial of Service | 3212646 |
Windows Server 2008 R2 | ||||||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (4012212) Security Only[1] | Not applicable | Not applicable | Not applicable | Critical Remote Code Execution | Important Denial of Service | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (4012215) Monthly Rollup[1] | Not applicable | Not applicable | Not applicable | Critical Remote Code Execution | Important Denial of Service | 3212646 |
Windows 8.1 | ||||||
Windows 8.1 for x64-based Systems (4012213) Security Only[1] | Not applicable | Not applicable | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | None |
Windows 8.1 for x64-based Systems (4012216) Monthly Rollup[1] | Not applicable | Not applicable | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | 3205401 |
Windows Server 2012 and Windows Server 2012 R2 | ||||||
Windows Server 2012 (4012214) Security Only[1] | Not applicable | Not applicable | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | None |
Windows Server 2012 (4012217) Monthly Rollup[1] | Not applicable | Not applicable | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | 3205409 |
Windows Server 2012 R2 (4012213) Security Only[1] | Not applicable | Not applicable | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | None |
Windows Server 2012 R2 (4012216) Monthly Rollup[1] | Not applicable | Not applicable | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | 3205401 |
Windows 10 | ||||||
Windows 10 for x64-based Systems[2](4012606) | Not applicable | Not applicable | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | 3210720 |
Windows 10 Version 1511 for x64-based Systems[2](4013198) | Not applicable | Not applicable | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | 3210721 |
Windows 10 Version 1607 for x64-based Systems[2](4013429) | Critical Remote Code Execution | Important Denial of Service | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | 3213986 |
Windows Server 2016 | ||||||
Windows Server 2016 for x64-based Systems[2](4013429) | Critical Remote Code Execution | Important Denial of Service | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | 3213986 |
Server Core installation option | ||||||
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) (3211306) | Not applicable | Not applicable | Not applicable | Critical Remote Code Execution | Important Denial of Service | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (4012212) Security Only[1] | Not applicable | Not applicable | Not applicable | Critical Remote Code Execution | Important Denial of Service | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (4012215) Monthly Rollup[1] | Not applicable | Not applicable | Not applicable | Critical Remote Code Execution | Important Denial of Service | 3212646 |
Windows Server 2012 (Server Core installation) (4012214) Security Only[1] | Not applicable | Not applicable | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | None |
Windows Server 2012 (Server Core installation) (4012217) Monthly Rollup[1] | Not applicable | Not applicable | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | 3205409 |
Windows Server 2012 R2 (Server Core installation) (4012213) Security Only[1] | Not applicable | Not applicable | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | None |
Windows Server 2012 R2 (Server Core installation) (4012216) Monthly Rollup[1] | Not applicable | Not applicable | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | 3205401 |
Windows Server 2016 for x64-based Systems[2](Server Core installation) (4013429) | Critical Remote Code Execution | Important Denial of Service | Important Denial of Service | Critical Remote Code Execution | Important Denial of Service | 3213986 |
Microsoft Software (Table 2 of 2)
Operating System | Hyper-V vSMB Remote Code Execution Vulnerability - CVE-2017-0095 | Hyper-V Information Disclosure Vulnerability - CVE-2017-0096 | Hyper-V Denial of Service Vulnerability - CVE-2017-0098 | Hyper-V Remote Code Execution Vulnerability - CVE-2017-0109 | Updates Replaced |
---|---|---|---|---|---|
Windows Server 2008 | |||||
Windows Server 2008 for x64-based Systems Service Pack 2 (3211306) | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | None |
Windows 7 | |||||
Windows 7 for x64-based Systems Service Pack 1 (4012212) Security Only[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | None |
Windows 7 for x64-based Systems Service Pack 1 (4012215) Monthly Rollup[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | 3212646 |
Windows Server 2008 R2 | |||||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (4012212) Security Only[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (4012215) Monthly Rollup[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | 3212646 |
Windows 8.1 | |||||
Windows 8.1 for x64-based Systems (4012213) Security Only[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | None |
Windows 8.1 for x64-based Systems (4012216) Monthly Rollup[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | 3205401 |
Windows Server 2012 and Windows Server 2012 R2 | |||||
Windows Server 2012 (4012214) Security Only[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | None |
Windows Server 2012 (4012217) Monthly Rollup[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | 3205409 |
Windows Server 2012 R2 (4012213) Security Only[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | None |
Windows Server 2012 R2 (4012216) Monthly Rollup[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | 3205401 |
Windows 10 | |||||
Windows 10 for x64-based Systems[2](4012606) | Important Remote Code Execution | Important Information Disclosure | Important Denial of Service | Critical Remote Code Execution | 3210720 |
Windows 10 Version 1511 for x64-based Systems[2](4013198) | Important Remote Code Execution | Important Information Disclosure | Important Denial of Service | Critical Remote Code Execution | 3210721 |
Windows 10 Version 1607 for x64-based Systems[2](4013429) | Important Remote Code Execution | Important Information Disclosure | Important Denial of Service | Critical Remote Code Execution | 3213986 |
Windows Server 2016 | |||||
Windows Server 2016 for x64-based Systems[2](4013429) | Important Remote Code Execution | Important Information Disclosure | Important Denial of Service | Critical Remote Code Execution | 3213986 |
Server Core installation option | |||||
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) (3211306) | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (4012212) Security Only[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) (4012215) Monthly Rollup[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | 3212646 |
Windows Server 2012 (Server Core installation) (4012214) Security Only[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | None |
Windows Server 2012 (Server Core installation) (4012217) Monthly Rollup[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | 3205409 |
Windows Server 2012 R2 (Server Core installation) (4012213) Security Only[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | None |
Windows Server 2012 R2 (Server Core installation) (4012216) Monthly Rollup[1] | Not applicable | Important Information Disclosure | Not applicable | Critical Remote Code Execution | 3205401 |
Windows Server 2016 for x64-based Systems[2](Server Core installation) (4013429) | Important Remote Code Execution | Important Information Disclosure | Important Denial of Service | Critical Remote Code Execution | 3213986 |
[1]Beginning with the October 2016 release, Microsoft is changing the update servicing model for Windows 7, Windows Server 2008 R2, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2. For more information, please see this Microsoft TechNet article.
[2]Windows 10 and Windows Server 2016 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the Microsoft Update Catalog. Please note that effective December 13, 2016, Windows 10 and Windows Server 2016 details for the Cumulative Updates will be documented in Release Notes. Please refer to the Release Notes for OS Build numbers, Known Issues, and affected file list information.
*The Updates Replaced column shows only the latest update in any chain of superseded updates. For a comprehensive list of updates replaced, go to the Microsoft Update Catalog, search for the update KB number, and then view update details (updates replaced information is provided on the PackageDetails tab).
Update FAQ
I do not have Hyper-V enabled, why am I being offered this update?
The vulnerable code exists in the affected software that is listed in the affected software table. As a defense-in-depth measure, and to ensure that systems are protected if Hyper-V is enabled, the update is applicable to all supported products and versions that contain the vulnerable code.
Vulnerability Information
Multiple Hyper-V Denial of Service Vulnerabilities
Multiple denial of service vulnerabilities exist when the Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit these vulnerabilities, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash.
To exploit these vulnerabilities, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application.
The security update addresses these vulnerabilities by preventing out-of-bound memory access.
The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list:
Vulnerability title | CVE number | Publicly disclosed | Exploited |
---|---|---|---|
Microsoft Hyper-V Network Switch Denial of Service Vulnerability | CVE-2017-0051 | No | No |
Hyper-V Denial of Service Vulnerability | CVE-2017-0074 | No | No |
Hyper-V Denial of Service Vulnerability | CVE-2017-0076 | No | No |
Hyper-V Denial of Service Vulnerability | CVE-2017-0097 | Yes | No |
Hyper-V Denial of Service Vulnerability | CVE-2017-0098 | No | No |
Hyper-V Denial of Service Vulnerability | CVE-2017-0099 | No | No |
Mitigating Factors
The following mitigating factors may be helpful in your situation:
- Customers who have not enabled the Hyper-V role are not affected.
Workarounds
Microsoft has not identified any workarounds for these vulnerabilities.
Multiple Hyper-V vSMB Remote Code Execution Vulnerabilities
Multiple remote code execution vulnerabilities exist when Windows Hyper-V on a host server fails to properly validate vSMB packet data. An attacker who successfully exploited these vulnerabilities could execute arbitrary code on a target operating system.
To exploit these vulnerabilities, an attacker running inside a virtual machine could run a specially crafted application that could cause the Hyper-V host operating system to execute arbitrary code.
The update addresses the vulnerabilities by correcting how Windows Hyper-V validates vSMB packet data.
The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list:
Vulnerability title | CVE number | Publicly disclosed | Exploited |
---|---|---|---|
Hyper-V vSMB Remote Code Execution Vulnerability | CVE-2017-0021 | No | No |
Hyper-V vSMB Remote Code Execution Vulnerability | CVE-2017-0095 | No | No |
Mitigating Factors
The following mitigating factors may be helpful in your situation:
- Customers who have not enabled the Hyper-V role are not affected.
Workarounds
Microsoft has not identified any workarounds for these vulnerabilities.
Multiple Hyper-V Remote Code Execution Vulnerabilities
Multiple remote code execution vulnerabilities exist when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit these vulnerabilities, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code
An attacker who successfully exploited these vulnerabilities could execute arbitrary code on the host operating system.
The security update addresses these vulnerabilities by correcting how Hyper-V validates guest operating system user input.
The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list:
Vulnerability title | CVE number | Publicly disclosed | Exploited |
---|---|---|---|
Hyper-V Remote Code Execution Vulnerability | CVE-2017-0075 | No | No |
Hyper-V Remote Code Execution Vulnerability | CVE-2017-0109 | No | No |
Mitigating Factors
The following mitigating factors may be helpful in your situation:
- Customers who have not enabled the Hyper-V role are not affected.
Workarounds
Microsoft has not identified any workarounds for these vulnerabilities.
Hyper-V Information Disclosure Vulnerability - CVE-2017-0096
An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information.
An attacker who successfully exploited the vulnerability could gain access to information on the Hyper-V host operating system.
The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list:
Vulnerability title | CVE number | Publicly disclosed | Exploited |
---|---|---|---|
Hyper-V Information Disclosure Vulnerability | CVE-2017-0096 | No | No |
Mitigating Factors
The following mitigating factors may be helpful in your situation:
- Customers who have not enabled the Hyper-V role are not affected.
Workarounds
Microsoft has not identified any workarounds for this vulnerability.
Security Update Deployment
For Security Update Deployment information, see the Microsoft Knowledge Base article referenced in the Executive Summary.
Acknowledgments
Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure. See Acknowledgments for more information.
Disclaimer
The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Revisions
- V1.0 (March 14, 2017): Bulletin published.
Page generated 2017-03-16 11:18-07:00.