Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-8167

EPSS 0.39% · P60
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-8167

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka "Windows Common Log File System Driver Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows Common Log File System驱动程序权限许可和访问控制问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows 7等都是美国微软(Microsoft)公司发布的操作系统。Windows Common Log File System(CLFS)driver是其中的一个通用日志文件系统驱动程序。 Microsoft Windows CLFS驱动程序存在提权漏洞,该漏洞源于程序没有正确的处理内存中的对象。攻击者可通过登录系统并运行特制的应用程序利用该漏洞以提升的权限执行代码。以下系统版本受到影响:Microsoft Windows 7,Windows Server 2012 R2,Wi
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MicrosoftWindows 7 32-bit Systems Service Pack 1 -
MicrosoftWindows Server 2012 R2 (Server Core installation) -
MicrosoftWindows RT 8.1 Windows RT 8.1 -
MicrosoftWindows Server 2008 32-bit Systems Service Pack 2 -
MicrosoftWindows Server 2012 (Server Core installation) -
MicrosoftWindows 8.1 32-bit systems -
MicrosoftWindows Server 2016 (Server Core installation) -
MicrosoftWindows Server 2008 R2 Itanium-Based Systems Service Pack 1 -
MicrosoftWindows 10 32-bit Systems -
MicrosoftWindows 10 Servers version 1709 (Server Core Installation) -

II. Public POCs for CVE-2018-8167

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-8167

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2018-05-09 · 60 CVEs total

CVE-2018-8152Microsoft Exchange Server 权限许可和访问控制问题漏洞
CVE-2018-8178Microsoft ChakraCore、Edge和Internet Explorer 缓冲区错误漏洞
CVE-2018-8173Microsoft InfoPath 缓冲区错误漏洞
CVE-2018-8170Microsoft Windows kernel image 权限许可和访问控制问题漏洞
CVE-2018-8168Microsoft SharePoint Enterprise Server和SharePoint Server 权限许可和访问控制漏洞
CVE-2018-8174Microsoft Windows VBScript引擎缓冲区错误漏洞
CVE-2018-8156Microsoft SharePoint Server和Project Server 权限许可和访问控制漏洞
CVE-2018-8155Microsoft SharePoint Enterprise Server和SharePoint Foundation 权限许可和访问控制漏洞
CVE-2018-8154Microsoft Exchange 缓冲区错误漏洞
CVE-2018-8153Microsoft Exchange Server 输入验证错误漏洞
CVE-2018-8157Microsoft Office 缓冲区错误漏洞
CVE-2018-8151Microsoft Exchange 信息泄露漏洞
CVE-2018-8150Microsoft Office Outlook 安全漏洞
CVE-2018-8149Microsoft SharePoint Server 权限许可和访问控制漏洞
CVE-2018-8148Microsoft Excel 缓冲区错误漏洞
CVE-2018-8147Microsoft Excel 缓冲区错误漏洞
CVE-2018-8145Microsoft ChakraCore、Edge和Internet Explorer 信息泄露漏洞
CVE-2018-8141Microsoft Windows Kernel 信息泄露漏洞
CVE-2018-8139Microsoft ChakraCore和Microsoft Windows Edge 缓冲区错误漏洞
CVE-2018-8137Microsoft ChakraCore和Edge 缓冲区错误漏洞

Showing top 20 of 60 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2018-8167

No comments yet


Leave a comment