HTTP: Microsoft Windows Shell Zip File Remote Code Execution

This signature detects attempts to exploit a known vulnerability in the Windows Shell component of Microsoft Windows. Successful exploitation could allow the attacker to execute arbitrary code under the context of the current user.

Extended Description

Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how file copy destinations are validated, aka "Windows Shell Remote Code Execution Vulnerability".

Affected Products

Microsoft windows_server_2016

References

BugTraq: 103259

CVE: CVE-2018-0883

Short Name
HTTP:STC:DL:MS-WINSHELL-ZIP-RCE
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2018-0883 Code Execution File Microsoft Remote Shell Windows Zip bid:103259
Release Date
03/27/2018
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3717
False Positive
Unknown
Vendors

Microsoft

CVSS Score

7.6

Found a potential security threat?