CVE-2018-8544 (CNNVD-201811-353)

HIGH 有利用代码
中文标题:
Microsoft VBScript引擎安全漏洞
英文标题:
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in ...
CVSS分数: 8.8
发布时间: 2018-11-14 01:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Microsoft Windows Server 2019等都是美国微软(Microsoft)公司发布的一系列操作系统。VBScript(全称Visual Basic Script)engine是其中的一个VB脚本语言引擎。 Microsoft VBScript引擎中对内存对象的处理方式存在安全漏洞。远程攻击者可利用该漏洞在当前用户的上下文中执行任意代码,损坏内存。以下系统版本受到影响:Microsoft Windows Server 2019,Windows Server 2016,Windows Server 2012 R2,Windows Server 2012,Windows Server 2008 R2 SP1,Windows Server 2008 SP2,Windows Server版本1803,Windows Server版本1709,Windows RT 8.1,Windows 8.1,Windows 7 SP1,Windows 10版本1809,Windows 10版本1803,Windows 10版本1709,Windows 10版本1703,Windows 10版本1607,Windows 10。

英文描述:

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

CWE类型:
CWE-416
标签:
dos windows Google Security Research
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Microsoft Windows 7 32-bit Systems Service Pack 1 - - cpe:2.3:a:microsoft:windows_7:32-bit_systems_service_pack_1:*:*:*:*:*:*:*
Microsoft Windows 7 x64-based Systems Service Pack 1 - - cpe:2.3:a:microsoft:windows_7:x64-based_systems_service_pack_1:*:*:*:*:*:*:*
Microsoft Windows Server 2012 R2 (Server Core installation) - - cpe:2.3:a:microsoft:windows_server_2012_r2:(server_core_installation):*:*:*:*:*:*:*
Microsoft Windows RT 8.1 Windows RT 8.1 - - cpe:2.3:a:microsoft:windows_rt_8.1:windows_rt_8.1:*:*:*:*:*:*:*
Microsoft Windows Server 2008 32-bit Systems Service Pack 2 - - cpe:2.3:a:microsoft:windows_server_2008:32-bit_systems_service_pack_2:*:*:*:*:*:*:*
Microsoft Windows Server 2008 32-bit Systems Service Pack 2 (Server Core installation) - - cpe:2.3:a:microsoft:windows_server_2008:32-bit_systems_service_pack_2_(server_core_installation):*:*:*:*:*:*:*
Microsoft Windows Server 2008 Itanium-Based Systems Service Pack 2 - - cpe:2.3:a:microsoft:windows_server_2008:itanium-based_systems_service_pack_2:*:*:*:*:*:*:*
Microsoft Windows Server 2008 x64-based Systems Service Pack 2 - - cpe:2.3:a:microsoft:windows_server_2008:x64-based_systems_service_pack_2:*:*:*:*:*:*:*
Microsoft Windows Server 2008 x64-based Systems Service Pack 2 (Server Core installation) - - cpe:2.3:a:microsoft:windows_server_2008:x64-based_systems_service_pack_2_(server_core_installation):*:*:*:*:*:*:*
Microsoft Windows Server 2019 (Server Core installation) - - cpe:2.3:a:microsoft:windows_server_2019:(server_core_installation):*:*:*:*:*:*:*
Microsoft Windows Server 2012 (Server Core installation) - - cpe:2.3:a:microsoft:windows_server_2012:(server_core_installation):*:*:*:*:*:*:*
Microsoft Windows 8.1 32-bit systems - - cpe:2.3:a:microsoft:windows_8.1:32-bit_systems:*:*:*:*:*:*:*
Microsoft Windows 8.1 x64-based systems - - cpe:2.3:a:microsoft:windows_8.1:x64-based_systems:*:*:*:*:*:*:*
Microsoft Windows Server 2016 (Server Core installation) - - cpe:2.3:a:microsoft:windows_server_2016:(server_core_installation):*:*:*:*:*:*:*
Microsoft Windows Server 2008 R2 Itanium-Based Systems Service Pack 1 - - cpe:2.3:a:microsoft:windows_server_2008_r2:itanium-based_systems_service_pack_1:*:*:*:*:*:*:*
Microsoft Windows Server 2008 R2 x64-based Systems Service Pack 1 - - cpe:2.3:a:microsoft:windows_server_2008_r2:x64-based_systems_service_pack_1:*:*:*:*:*:*:*
Microsoft Windows Server 2008 R2 x64-based Systems Service Pack 1 (Server Core installation) - - cpe:2.3:a:microsoft:windows_server_2008_r2:x64-based_systems_service_pack_1_(server_core_installation):*:*:*:*:*:*:*
Microsoft Windows 10 32-bit Systems - - cpe:2.3:a:microsoft:windows_10:32-bit_systems:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1607 for 32-bit Systems - - cpe:2.3:a:microsoft:windows_10:version_1607_for_32-bit_systems:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1607 for x64-based Systems - - cpe:2.3:a:microsoft:windows_10:version_1607_for_x64-based_systems:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1703 for 32-bit Systems - - cpe:2.3:a:microsoft:windows_10:version_1703_for_32-bit_systems:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1703 for x64-based Systems - - cpe:2.3:a:microsoft:windows_10:version_1703_for_x64-based_systems:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1709 for 32-bit Systems - - cpe:2.3:a:microsoft:windows_10:version_1709_for_32-bit_systems:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1709 for ARM64-based Systems - - cpe:2.3:a:microsoft:windows_10:version_1709_for_arm64-based_systems:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1709 for x64-based Systems - - cpe:2.3:a:microsoft:windows_10:version_1709_for_x64-based_systems:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1803 for 32-bit Systems - - cpe:2.3:a:microsoft:windows_10:version_1803_for_32-bit_systems:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1803 for ARM64-based Systems - - cpe:2.3:a:microsoft:windows_10:version_1803_for_arm64-based_systems:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1803 for x64-based Systems - - cpe:2.3:a:microsoft:windows_10:version_1803_for_x64-based_systems:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1809 for 32-bit Systems - - cpe:2.3:a:microsoft:windows_10:version_1809_for_32-bit_systems:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1809 for ARM64-based Systems - - cpe:2.3:a:microsoft:windows_10:version_1809_for_arm64-based_systems:*:*:*:*:*:*:*
Microsoft Windows 10 Version 1809 for x64-based Systems - - cpe:2.3:a:microsoft:windows_10:version_1809_for_x64-based_systems:*:*:*:*:*:*:*
Microsoft Windows 10 x64-based Systems - - cpe:2.3:a:microsoft:windows_10:x64-based_systems:*:*:*:*:*:*:*
Microsoft Windows 10 Servers version 1709 (Server Core Installation) - - cpe:2.3:a:microsoft:windows_10_servers:version_1709__(server_core_installation):*:*:*:*:*:*:*
Microsoft Windows 10 Servers version 1803 (Server Core Installation) - - cpe:2.3:a:microsoft:windows_10_servers:version_1803__(server_core_installation):*:*:*:*:*:*:*
microsoft windows_10 - - - cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
microsoft windows_10 1607 - - cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
microsoft windows_10 1703 - - cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
microsoft windows_10 1709 - - cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
microsoft windows_10 1803 - - cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*
microsoft windows_10 1809 - - cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*
microsoft windows_7 - - - cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
microsoft windows_8.1 - - - cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
microsoft windows_rt_8.1 - - - cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
microsoft windows_server_2008 - - - cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
microsoft windows_server_2008 r2 - - cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*
microsoft windows_server_2012 - - - cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
microsoft windows_server_2012 r2 - - cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
microsoft windows_server_2016 - - - cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
microsoft windows_server_2016 1709 - - cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*
microsoft windows_server_2016 1803 - - cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*
microsoft windows_server_2019 - - - cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
1042118 vdb-entry
cve.org
访问
105787 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
45923 exploit
cve.org
访问
ExploitDB EDB-45923 EXPLOIT
exploitdb
访问
Download Exploit EDB-45923 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2018-8544 ADVISORY
cve.org
访问
CVSS评分详情
8.8
HIGH
CVSS向量: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS版本: 3.0
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2018-11-14 01:00:00
修改时间:
2024-08-05 07:02:25
创建时间:
2025-11-11 15:35:22
更新时间:
2025-11-11 16:49:35
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2018-8544 2025-11-11 15:19:55 2025-11-11 07:35:22
NVD nvd_CVE-2018-8544 2025-11-11 14:56:00 2025-11-11 07:43:56
CNNVD cnnvd_CNNVD-201811-353 2025-11-11 15:10:07 2025-11-11 07:54:07
EXPLOITDB exploitdb_EDB-45923 2025-11-11 15:05:51 2025-11-11 08:49:35
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:49:35
references_count: 4 → 7; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 4 -> 7
  • tags_count: 0 -> 3
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:54:07
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-201811-353; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-201811-353
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:56
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 8.8; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 34 → 51; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 8.8
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • cvss_version: NOT_EXTRACTED -> 3.0
  • affected_products_count: 34 -> 51
  • data_sources: ['cve'] -> ['cve', 'nvd']