Windows 10: Security Update for Microsoft Malware Protection Engine

Page 1 of 2 12 LastLast
  1. Brink's Avatar
    Posts : 32,279
    64-bit Windows 10 Pro build 18242
       09 May 2017 #1

    Security Update for Microsoft Malware Protection Engine




    Microsoft Security Advisory 4022344

    Security Update for Microsoft Malware Protection Engine
    Published: May 8, 2017
    Version: 1.0

    Executive Summary

    Microsoft is releasing this security advisory to inform customers that an update to the Microsoft Malware Protection Engine addresses a security vulnerability that was reported to Microsoft.

    The update addresses a vulnerability that could allow remote code execution if the Microsoft Malware Protection Engine scans a specially crafted file. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system.

    The Microsoft Malware Protection Engine ships with several Microsoft antimalware products. See the Affected Software section for a list of affected products. Updates to the Microsoft Malware Protection Engine are installed along with the updated malware definitions for the affected products. Administrators of enterprise installations should follow their established internal processes to ensure that the definition and engine updates are approved in their update management software, and that clients consume the updates accordingly.

    Typically, no action is required of enterprise administrators or end users to install updates for the Microsoft Malware Protection Engine, because the built-in mechanism for the automatic detection and deployment of updates will apply the update within 48 hours of release. The exact time frame depends on the software used, Internet connection, and infrastructure configuration...

    Advisory Details

    Issue References

    For more information about this issue, see the following references:

    References Identification
    Last version of the Microsoft Malware Protection Engine affected by this vulnerability Version 1.1.13701.0
    First version of the Microsoft Malware Protection Engine with this vulnerability addressed Version 1.1.13704.0

    *If your version of the Microsoft Malware Protection Engine is equal to or greater than this version, then you are not affected by this vulnerability and do not need to take any further action. For more information on how to verify the engine version number that your software is currently using, see the section, "Verifying Update Installation", in Microsoft Knowledge Base Article 2510781.

    Affected Software

    The following software versions or editions are affected. Versions or editions that are not listed are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.

    Antimalware Software Microsoft Malware Protection Engine Remote Code Execution Vulnerability- CVE-2017-0290
    Microsoft Forefront Endpoint Protection 2010 Critical
    Remote Code Execution
    Microsoft Endpoint Protection Critical
    Remote Code Execution
    Microsoft Forefront Security for SharePoint Service Pack 3 Critical
    Remote Code Execution
    Microsoft System Center Endpoint Protection Critical
    Remote Code Execution
    Microsoft Security Essentials Critical
    Remote Code Execution
    Windows Defender for Windows 7 Critical
    Remote Code Execution
    Windows Defender for Windows 8.1 Critical
    Remote Code Execution
    Windows Defender for Windows RT 8.1 Critical
    Remote Code Execution
    Windows Defender for Windows 10, Windows 10 1511, Windows 10 1607, Windows Server 2016, Windows 10 1703 Critical
    Remote Code Execution
    Windows Intune Endpoint Protection Critical
    Remote Code Execution

    Exploitability Index

    The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

    How do I use this table?

    Use this table to learn about the likelihood of code execution and denial of service exploits within 30 days of security bulletin release, for each of the security updates that you may need to install. Review each of the assessments below, in accordance with your specific configuration, to prioritize your deployment of this month's updates. For more information about what these ratings mean, and how they are determined, please see Microsoft Exploitability Index.

    In the columns below, "Latest Software Release" refers to the subject software, and "Older Software Releases" refers to all older, supported releases of the subject software, as listed in the "Affected Software" and "Non-Affected Software" tables in the bulletin.

    CVE ID Vulnerability Title Exploitability Assessment for
    Latest Software Release
    Exploitability Assessment for
    Older Software Release
    Denial of Service
    Exploitability Assessment
    CVE-2017-0290 Scripting Engine Memory Corruption Vulnerability 2 - Exploitation Less Likely 2 - Exploitation Less Likely Not applicable

    Advisory FAQ

    Is Microsoft releasing a Security Bulletin to address this vulnerability?
    No. Microsoft is releasing this informational security advisory to inform customers that an update to the Microsoft Malware Protection Engine addresses a security vulnerability that was reported to Microsoft.

    Typically, no action is required of enterprise administrators or end users to install this update.

    Why is no action required to install this update?
    In response to a constantly changing threat landscape, Microsoft frequently updates malware definitions and the Microsoft Malware Protection Engine. In order to be effective in helping protect against new and prevalent threats, antimalware software must be kept up to date with these updates in a timely manner.

    For enterprise deployments as well as end users, the default configuration in Microsoft antimalware software helps ensure that malware definitions and the Microsoft Malware Protection Engine are kept up to date automatically. Product documentation also recommends that products are configured for automatic updating.

    Best practices recommend that customers regularly verify whether software distribution, such as the automatic deployment of Microsoft Malware Protection Engine updates and malware definitions, is working as expected in their environment.

    How often are the Microsoft Malware Protection Engine and malware definitions updated?
    Microsoft typically releases an update for the Microsoft Malware Protection Engine once a month or as needed to protect against new threats. Microsoft also typically updates the malware definitions three times daily and can increase the frequency when needed.

    Depending on which Microsoft antimalware software is used and how it is configured, the software may search for engine and definition updates every day when connected to the Internet, up to multiple times daily. Customers can also choose to manually check for updates at any time.

    How can I install the update?
    Refer to the section, Suggested Actions, for details on how to install this update.

    What is the Microsoft Malware Protection Engine?
    The Microsoft Malware Protection Engine, mpengine.dll, provides the scanning, detection, and cleaning capabilities for Microsoft antivirus and antispyware software.

    Does this update contain any additional security-related changes to functionality?
    Yes. In addition to the changes that are listed for this vulnerability, this update includes defense-in-depth updates to help improve security-related features.

    Where can I find more information about Microsoft antimalware technology?
    For more information, visit the Microsoft Malware Protection Center website.

    Microsoft Malware Protection Engine Remote Code Execution Vulnerability - CVE-2017-0290

    A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file leading to memory corruption.

    An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

    To exploit this vulnerability, a specially crafted file must be scanned by an affected version of the Microsoft Malware Protection Engine. There are many ways that an attacker could place a specially crafted file in a location that is scanned by the Microsoft Malware Protection Engine. For example, an attacker could use a website to deliver a specially crafted file to the victim's system that is scanned when the website is viewed by the user. An attacker could also deliver a specially crafted file via an email message or in an Instant Messenger message that is scanned when the file is opened. In addition, an attacker could take advantage of websites that accept or host user-provided content, to upload a specially crafted file to a shared location that is scanned by the Malware Protection Engine running on the hosting server.

    If the affected antimalware software has real-time protection turned on, the Microsoft Malware Protection Engine will scan files automatically, leading to exploitation of the vulnerability when the specially crafted file scanned. If real-time scanning is not enabled, the attacker would need to wait until a scheduled scan occurs in order for the vulnerability to be exploited. All systems running an affected version of antimalware software are primarily at risk.

    The update addresses the vulnerability by correcting the manner in which the Microsoft Malware Protection Engine scans specially crafted files.

    Microsoft received information about this vulnerability through coordinated vulnerability disclosure.

    Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers when this security advisory was originally issued.


    Suggested Actions

    Verify that the update is installed
    Customers should verify that the latest version of the Microsoft Malware Protection Engine and definition updates are being actively downloaded and installed for their Microsoft antimalware products.

    For more information on how to verify the version number for the Microsoft Malware Protection Engine that your software is currently using, see the section, "Verifying Update Installation", in Microsoft Knowledge Base Article 2510781.

    For affected software, verify that the Microsoft Malware Protection Engine version is 1.1.13704.0 or later.

    If necessary, install the update
    Administrators of enterprise antimalware deployments should ensure that their update management software is configured to automatically approve and distribute engine updates and new malware definitions. Enterprise administrators should also verify that the latest version of the Microsoft Malware Protection Engine and definition updates are being actively downloaded, approved and deployed in their environment.

    For end-users, the affected software provides built-in mechanisms for the automatic detection and deployment of this update. For these customers, the update will be applied within 48 hours of its availability. The exact time frame depends on the software used, Internet connection, and infrastructure configuration. End users that do not wish to wait can manually update their antimalware software.

    For more information on how to manually update the Microsoft Malware Protection Engine and malware definitions, refer to Microsoft Knowledge Base Article 2510781.

    Acknowledgments

    Microsoft thanks the following for working with us to help protect customers:



    Other Information

    Microsoft Active Protections Program (MAPP)

    To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections websites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners.

    Feedback

    Support

    Disclaimer
    The information provided in this advisory is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

    Revisions
    • V1.0 (May 8, 2017): Advisory published.


    Read more: Microsoft Security Advisory 4022344
    Last edited by Brink; 09 May 2017 at 13:48.
      My ComputersSystem Spec

  2. f14tomcat's Avatar
    Posts : 36,209
    Triple boot - Win 10 Pro, Win 10 Pro Insider (2) - (and a sprinkling of VMs)
       09 May 2017 #1

    Just as a reference, this is as of 10:00am today. Go to Update and Security and open Windows Defender.

    Windows 10 - 15063.250

    Click image for larger version. 

Name:	2017-05-09_10h06_17.png 
Views:	4 
Size:	87.9 KB 
ID:	134216
      My ComputersSystem Spec

  3. Wiley Coyote's Avatar
    Posts : 850
    Windows 10 Home x64 Version 1803 (OS Build 17134.319)
       09 May 2017 #2

    I just ran an update. You have a later Antimalware version than me. All else is the same. Must be you are on 10 Pro.
      My ComputersSystem Spec

  4. f14tomcat's Avatar
    Posts : 36,209
    Triple boot - Win 10 Pro, Win 10 Pro Insider (2) - (and a sprinkling of VMs)
       09 May 2017 #3

    CWGilley said: View Post
    I just ran an update. You have a later Antimalware version than me. All else is the same. Must be you are on 10 Pro.
    Clayton,

    That's why I posted 15063.250 at the top. If you hold down the windows key and press R (Win key+R) and type WINVER, you will see the version you're on, which should match what's shown on the defender screen.
      My ComputersSystem Spec

  5. Bree's Avatar
    Posts : 8,569
    10 Home x64 (1803) (10 Pro on 2nd pc)
       09 May 2017 #4

    CWGilley said: View Post
    I just ran an update. You have a later Antimalware version than me. All else is the same. Must be you are on 10 Pro.
    No, I'm on Windows 10 Home version 1703, os build 15063.250 and it too shows Engine version: 1.1.13704.0 - the version which has this vulnerability addressed.

    From the Advisory...
    For more information about this issue, see the following references:
    References Identification
    Last version of the Microsoft Malware Protection Engine affected by this vulnerability Version 1.1.13701.0
    First version of the Microsoft Malware Protection Engine with this vulnerability addressed Version 1.1.13704.0
      My ComputersSystem Spec

  6. Wiley Coyote's Avatar
    Posts : 850
    Windows 10 Home x64 Version 1803 (OS Build 17134.319)
       09 May 2017 #5

    AH, CU Update 1703. I'm still waiting for Windows Update to take me there. Not that I'm in any hurry.
      My ComputersSystem Spec

  7. f14tomcat's Avatar
    Posts : 36,209
    Triple boot - Win 10 Pro, Win 10 Pro Insider (2) - (and a sprinkling of VMs)
       09 May 2017 #6

    Bree said: View Post
    No, I'm on Windows 10 Home version 1703, os build 15063.250 and it too shows Engine version: 1.1.13704.0 - the version which has this vulnerability addressed.

    From the Advisory...
    Think he was confused by the Antimalware vs Engine versions. He probably show Antimalware as 14393.
      My ComputersSystem Spec

  8. Bree's Avatar
    Posts : 8,569
    10 Home x64 (1803) (10 Pro on 2nd pc)
       09 May 2017 #7

    CWGilley said: View Post
    AH, CU Update 1703. I'm still waiting for Windows Update to take me there. Not that I'm in any hurry.
    My Anniversary Update system, 10 Pro version 1607, 14393.1066 also has the 1.1.13704.0 engine.
      My ComputersSystem Spec

  9. Wiley Coyote's Avatar
    Posts : 850
    Windows 10 Home x64 Version 1803 (OS Build 17134.319)
       09 May 2017 #8

    Click image for larger version. 

Name:	134218Capture.PNG 
Views:	110 
Size:	16.6 KB 
ID:	134218

    Click image for larger version. 

Name:	$Capture.PNG 
Views:	110 
Size:	27.6 KB 
ID:	134219
      My ComputersSystem Spec

  10. f14tomcat's Avatar
    Posts : 36,209
    Triple boot - Win 10 Pro, Win 10 Pro Insider (2) - (and a sprinkling of VMs)
       09 May 2017 #9

    CWGilley said: View Post
    Click image for larger version. 

Name:	134218Capture.PNG 
Views:	110 
Size:	16.6 KB 
ID:	134218

    Click image for larger version. 

Name:	$Capture.PNG 
Views:	110 
Size:	27.6 KB 
ID:	134219
    Clayton, you're fine. All is where it should be.
      My ComputersSystem Spec


 
Page 1 of 2 12 LastLast

Related Threads
Source: Security Update Guide ushers in a new era of Microsoft updates See also: Security Update Guide
Wow, looks like this is a really old update... why am I getting this now? I'm on 14393.576 otherwise 114201
Source: Windows 10: protection, detection, and response against recent Depriz malware attacks Microsoft Malware Protection Center
Windows 10: Security and Identity Protection for the Modern World Windows 10: Security and Identity Protection for the Modern World A Guy
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

Designer Media Ltd
All times are GMT -5. The time now is 17:36.
Find Us