Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2017-8686: Windows DHCP Server Remote Code Execution Vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2017-8686: Windows DHCP Server Remote Code Execution Vulnerability

Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
09/12/2017
Created
07/25/2018
Added
09/12/2017
Modified
11/18/2021

Description

A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP failover server. An attacker who successfully exploited the vulnerability could either run arbitrary code on the DHCP failover server or cause the DHCP service to become nonresponsive. To exploit the vulnerability, an attacker could send a specially crafted packet to a DHCP server. However, the DHCP server must be set to failover mode for the attack to succeed. The security update addresses the vulnerability by correcting how DHCP failover servers handle network packets.

Solution(s)

  • msft-kb4038782-397ff69f-657f-4029-9329-b2c00bd6a6a8
  • msft-kb4038782-e895239d-88ad-4ac3-b68f-8abb6b489d19
  • msft-kb4038782-e8a8e193-de5d-413d-990a-76d355b5fb5e
  • msft-kb4038786-2ac4d3a4-287f-4f33-bb61-b7b81245f55b
  • msft-kb4038786-6c356cec-ee0d-458a-9561-daba4b9d324a
  • msft-kb4038786-793b7e3e-090e-472e-b275-b520b5832a77
  • msft-kb4038793-8c3d7238-564c-4ed3-ae6f-e3d9881f6f5f
  • msft-kb4038793-9516efa8-6493-43de-979c-ebf2aa89aa69
  • msft-kb4038793-d97e9753-f904-44d9-87a2-35cbf248aef4

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;