Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-36759 (GCVE-0-2023-36759)
Vulnerability from cvelistv5 – Published: 2023-09-12 16:58 – Updated: 2025-10-30 18:17- CWE-822 - Untrusted Pointer Dereference
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Microsoft | Microsoft Visual Studio 2022 version 17.2 |
Affected:
17.2.0 , < 17.2.19
(custom)
|
||||||||||||||||||||||
|
||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:01:09.258Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "Visual Studio Elevation of Privilege Vulnerability",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"platforms": [
"Unknown"
],
"product": "Microsoft Visual Studio 2022 version 17.2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "17.2.19",
"status": "affected",
"version": "17.2.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "16.11.30",
"status": "affected",
"version": "16.11.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Microsoft Visual Studio 2022 version 17.4",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "17.4.11",
"status": "affected",
"version": "17.4.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Microsoft Visual Studio 2022 version 17.7",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "17.7.4",
"status": "affected",
"version": "17.7.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Microsoft Visual Studio 2022 version 17.6",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "17.6.7",
"status": "affected",
"version": "17.6.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.2.19",
"versionStartIncluding": "17.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.11.30",
"versionStartIncluding": "16.11.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.4.11",
"versionStartIncluding": "17.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.7.4",
"versionStartIncluding": "17.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.6.7",
"versionStartIncluding": "17.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2023-09-12T07:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "Visual Studio Elevation of Privilege Vulnerability"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-822",
"description": "CWE-822: Untrusted Pointer Dereference",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-30T18:17:56.444Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Visual Studio Elevation of Privilege Vulnerability",
"tags": [
"vendor-advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759"
}
],
"title": "Visual Studio Elevation of Privilege Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2023-36759",
"datePublished": "2023-09-12T16:58:29.748Z",
"dateReserved": "2023-06-27T15:11:59.867Z",
"dateUpdated": "2025-10-30T18:17:56.444Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"16.0\", \"versionEndExcluding\": \"16.11.30\", \"matchCriteriaId\": \"40434953-906B-453E-9F4C-46BF0F693E06\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"17.2.0\", \"versionEndExcluding\": \"17.2.19\", \"matchCriteriaId\": \"37E17676-8AD6-4FB1-8983-EB1CD4B888EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"17.4.0\", \"versionEndExcluding\": \"17.4.11\", \"matchCriteriaId\": \"B49C4225-E3D7-4FEF-AAB5-5866C897B6F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"17.6.0\", \"versionEndExcluding\": \"17.6.7\", \"matchCriteriaId\": \"B8C5B89F-287F-43BA-99B3-85B475B53CE2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"17.7.0\", \"versionEndExcluding\": \"17.7.4\", \"matchCriteriaId\": \"F041DA8F-B61D-4AF5-9248-22D68F38E74F\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Visual Studio Elevation of Privilege Vulnerability\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de Elevaci\\u00f3n de Privilegios en Visual Studio\"}]",
"id": "CVE-2023-36759",
"lastModified": "2024-11-21T08:10:32.297",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"secure@microsoft.com\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.9}]}",
"published": "2023-09-12T17:15:11.513",
"references": "[{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secure@microsoft.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-822\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-36759\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2023-09-12T17:15:11.513\",\"lastModified\":\"2024-11-21T08:10:32.297\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Visual Studio Elevation of Privilege Vulnerability\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de Elevaci\u00f3n de Privilegios en Visual Studio\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-822\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"16.0\",\"versionEndExcluding\":\"16.11.30\",\"matchCriteriaId\":\"40434953-906B-453E-9F4C-46BF0F693E06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.2.0\",\"versionEndExcluding\":\"17.2.19\",\"matchCriteriaId\":\"37E17676-8AD6-4FB1-8983-EB1CD4B888EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.4.0\",\"versionEndExcluding\":\"17.4.11\",\"matchCriteriaId\":\"B49C4225-E3D7-4FEF-AAB5-5866C897B6F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.6.0\",\"versionEndExcluding\":\"17.6.7\",\"matchCriteriaId\":\"B8C5B89F-287F-43BA-99B3-85B475B53CE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.7.0\",\"versionEndExcluding\":\"17.7.4\",\"matchCriteriaId\":\"F041DA8F-B61D-4AF5-9248-22D68F38E74F\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}"
}
}
GHSA-724G-5W99-H7CW
Vulnerability from github – Published: 2023-09-12 18:30 – Updated: 2024-04-04 07:37Visual Studio Elevation of Privilege Vulnerability
{
"affected": [],
"aliases": [
"CVE-2023-36759"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-09-12T17:15:11Z",
"severity": "MODERATE"
},
"details": "Visual Studio Elevation of Privilege Vulnerability",
"id": "GHSA-724g-5w99-h7cw",
"modified": "2024-04-04T07:37:31Z",
"published": "2023-09-12T18:30:21Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36759"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CNVD-2023-101685
Vulnerability from cnvd - Published: 2023-12-29目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36759
| Name | ['Microsoft Visual Studio 2022 17.2', 'Microsoft Visual Studio 2022 17.4', 'Microsoft Visual Studio 2022 17.6', 'Microsoft Visual Studio 2022 17.7'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2023-36759",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2023-36759"
}
},
"description": "Microsoft Visual Studio\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5f00\u53d1\u5de5\u5177\u5957\u4ef6\u7cfb\u5217\u4ea7\u54c1\uff0c\u4e5f\u662f\u4e00\u4e2a\u57fa\u672c\u5b8c\u6574\u7684\u5f00\u53d1\u5de5\u5177\u96c6\uff0c\u5b83\u5305\u62ec\u4e86\u6574\u4e2a\u8f6f\u4ef6\u751f\u547d\u5468\u671f\u4e2d\u6240\u9700\u8981\u7684\u5927\u90e8\u5206\u5de5\u5177\u3002 \n\nMicrosoft Visual Studio\u5b58\u5728\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6SYSTEM\u6743\u9650\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u8fd9\u4e2a\u5b89\u5168\u95ee\u9898\uff0c\u8bf7\u5230\u5382\u5546\u7684\u4e3b\u9875\u4e0b\u8f7d\uff1a\r\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36759",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2023-101685",
"openTime": "2023-12-29",
"patchDescription": "Microsoft Visual Studio\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5f00\u53d1\u5de5\u5177\u5957\u4ef6\u7cfb\u5217\u4ea7\u54c1\uff0c\u4e5f\u662f\u4e00\u4e2a\u57fa\u672c\u5b8c\u6574\u7684\u5f00\u53d1\u5de5\u5177\u96c6\uff0c\u5b83\u5305\u62ec\u4e86\u6574\u4e2a\u8f6f\u4ef6\u751f\u547d\u5468\u671f\u4e2d\u6240\u9700\u8981\u7684\u5927\u90e8\u5206\u5de5\u5177\u3002 \r\n\r\nMicrosoft Visual Studio\u5b58\u5728\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6SYSTEM\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Microsoft Visual Studio\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff08CNVD-2023-101685\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Microsoft Visual Studio 2022 17.2",
"Microsoft Visual Studio 2022 17.4",
"Microsoft Visual Studio 2022 17.6",
"Microsoft Visual Studio 2022 17.7"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2023-36759",
"serverity": "\u4e2d",
"submitTime": "2023-09-15",
"title": "Microsoft Visual Studio\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff08CNVD-2023-101685\uff09"
}
FKIE_CVE-2023-36759
Vulnerability from fkie_nvd - Published: 2023-09-12 17:15 - Updated: 2024-11-21 08:10| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759 | Patch, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | visual_studio_2019 | * | |
| microsoft | visual_studio_2022 | * | |
| microsoft | visual_studio_2022 | * | |
| microsoft | visual_studio_2022 | * | |
| microsoft | visual_studio_2022 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40434953-906B-453E-9F4C-46BF0F693E06",
"versionEndExcluding": "16.11.30",
"versionStartIncluding": "16.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37E17676-8AD6-4FB1-8983-EB1CD4B888EF",
"versionEndExcluding": "17.2.19",
"versionStartIncluding": "17.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B49C4225-E3D7-4FEF-AAB5-5866C897B6F1",
"versionEndExcluding": "17.4.11",
"versionStartIncluding": "17.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C5B89F-287F-43BA-99B3-85B475B53CE2",
"versionEndExcluding": "17.6.7",
"versionStartIncluding": "17.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F041DA8F-B61D-4AF5-9248-22D68F38E74F",
"versionEndExcluding": "17.7.4",
"versionStartIncluding": "17.7.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Visual Studio Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de Elevaci\u00f3n de Privilegios en Visual Studio"
}
],
"id": "CVE-2023-36759",
"lastModified": "2024-11-21T08:10:32.297",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "secure@microsoft.com",
"type": "Primary"
}
]
},
"published": "2023-09-12T17:15:11.513",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-822"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2023-36759
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-36759",
"id": "GSD-2023-36759"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-36759"
],
"details": "Visual Studio Elevation of Privilege Vulnerability",
"id": "GSD-2023-36759",
"modified": "2023-12-13T01:20:34.047214Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2023-36759",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microsoft Visual Studio 2022 version 17.2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "17.2.0",
"version_value": "17.2.19"
}
]
}
},
{
"product_name": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "16.11.0",
"version_value": "16.11.30"
}
]
}
},
{
"product_name": "Microsoft Visual Studio 2022 version 17.4",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "17.4.0",
"version_value": "17.4.11"
}
]
}
},
{
"product_name": "Microsoft Visual Studio 2022 version 17.7",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "17.7.0",
"version_value": "17.7.4"
}
]
}
},
{
"product_name": "Microsoft Visual Studio 2022 version 17.6",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "17.6.0",
"version_value": "17.6.7"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Visual Studio Elevation of Privilege Vulnerability"
}
]
},
"impact": {
"cvss": [
{
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759",
"refsource": "MISC",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "16.11.30",
"versionStartIncluding": "16.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "17.2.19",
"versionStartIncluding": "17.2.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "17.4.11",
"versionStartIncluding": "17.4.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "17.6.7",
"versionStartIncluding": "17.6.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "17.7.4",
"versionStartIncluding": "17.7.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2023-36759"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Visual Studio Elevation of Privilege Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-09-15T00:00Z",
"publishedDate": "2023-09-12T17:15Z"
}
}
}
CERTFR-2023-AVI-0743
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer un déni de service, un contournement de la fonctionnalité de sécurité, une usurpation d'identité, une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 13 | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | ||
| Microsoft | N/A | Microsoft SharePoint Enterprise Server 2016 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.2 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.7 | ||
| Microsoft | N/A | Microsoft Identity Linux Broker | ||
| Microsoft | N/A | 3D Viewer | ||
| Microsoft | N/A | Dynamics 365 pour Finance and Operations | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.6 | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 23 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
| Microsoft | N/A | Visual Studio Code | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.4 | ||
| Microsoft | N/A | Microsoft SharePoint Server Subscription Edition | ||
| Microsoft | N/A | Microsoft Defender Security Intelligence Updates | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.0 | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 12 | ||
| Microsoft | N/A | 3D Builder | ||
| Microsoft | N/A | Microsoft SharePoint Server 2019 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 13",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2016",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Identity Linux Broker",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "3D Viewer",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Dynamics 365 pour Finance and Operations",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Visual Studio Code",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Defender Security Intelligence Updates",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "3D Builder",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-36800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36800"
},
{
"name": "CVE-2023-36794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36794"
},
{
"name": "CVE-2023-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36777"
},
{
"name": "CVE-2023-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36770"
},
{
"name": "CVE-2023-36739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36739"
},
{
"name": "CVE-2023-36792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36792"
},
{
"name": "CVE-2023-36772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36772"
},
{
"name": "CVE-2023-36758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36758"
},
{
"name": "CVE-2023-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38163"
},
{
"name": "CVE-2023-36745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36745"
},
{
"name": "CVE-2023-36760",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36760"
},
{
"name": "CVE-2023-36759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36759"
},
{
"name": "CVE-2023-36757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36757"
},
{
"name": "CVE-2023-36744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36744"
},
{
"name": "CVE-2023-39956",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39956"
},
{
"name": "CVE-2023-36771",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36771"
},
{
"name": "CVE-2023-36756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36756"
},
{
"name": "CVE-2023-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38164"
},
{
"name": "CVE-2023-36762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36762"
},
{
"name": "CVE-2023-36742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36742"
},
{
"name": "CVE-2022-41303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41303"
},
{
"name": "CVE-2023-36773",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36773"
},
{
"name": "CVE-2023-36764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36764"
},
{
"name": "CVE-2023-36740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36740"
},
{
"name": "CVE-2023-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36886"
},
{
"name": "CVE-2023-36799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36799"
},
{
"name": "CVE-2023-36796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36796"
},
{
"name": "CVE-2023-36736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36736"
},
{
"name": "CVE-2023-36793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36793"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36773 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36773"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36762 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36762"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38163 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38163"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36760 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36760"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36764 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36764"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36770 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36770"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36757 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36757"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36744 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36744"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36771 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36771"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36796 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36796"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36777 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36777"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41303 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41303"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36759 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36799 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36799"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36739 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36739"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36793 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36793"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36758 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36758"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36772 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36772"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-39956 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-39956"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36756 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36756"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36736 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36736"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36794 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36794"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36886 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36886"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36792 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36792"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36742 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36742"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36740 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36740"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38164 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38164"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36800 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36800"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36745 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36745"
}
],
"reference": "CERTFR-2023-AVI-0743",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, un contournement de la\nfonctionnalit\u00e9 de s\u00e9curit\u00e9, une usurpation d\u0027identit\u00e9, une ex\u00e9cution de\ncode arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
CERTFR-2023-AVI-0743
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer un déni de service, un contournement de la fonctionnalité de sécurité, une usurpation d'identité, une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 13 | ||
| Microsoft | N/A | Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) | ||
| Microsoft | N/A | Microsoft SharePoint Enterprise Server 2016 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.2 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.7 | ||
| Microsoft | N/A | Microsoft Identity Linux Broker | ||
| Microsoft | N/A | 3D Viewer | ||
| Microsoft | N/A | Dynamics 365 pour Finance and Operations | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.6 | ||
| Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 23 | ||
| Microsoft | N/A | Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | ||
| Microsoft | N/A | Visual Studio Code | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.1 | ||
| Microsoft | N/A | Microsoft Visual Studio 2022 version 17.4 | ||
| Microsoft | N/A | Microsoft SharePoint Server Subscription Edition | ||
| Microsoft | N/A | Microsoft Defender Security Intelligence Updates | ||
| Microsoft | N/A | Microsoft Dynamics 365 (on-premises) version 9.0 | ||
| Microsoft | N/A | Microsoft Exchange Server 2019 Cumulative Update 12 | ||
| Microsoft | N/A | 3D Builder | ||
| Microsoft | N/A | Microsoft SharePoint Server 2019 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 13",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Enterprise Server 2016",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Identity Linux Broker",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "3D Viewer",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Dynamics 365 pour Finance and Operations",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2016 Cumulative Update 23",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Visual Studio Code",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Visual Studio 2022 version 17.4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server Subscription Edition",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Defender Security Intelligence Updates",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Dynamics 365 (on-premises) version 9.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Exchange Server 2019 Cumulative Update 12",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "3D Builder",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft SharePoint Server 2019",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-36800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36800"
},
{
"name": "CVE-2023-36794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36794"
},
{
"name": "CVE-2023-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36777"
},
{
"name": "CVE-2023-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36770"
},
{
"name": "CVE-2023-36739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36739"
},
{
"name": "CVE-2023-36792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36792"
},
{
"name": "CVE-2023-36772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36772"
},
{
"name": "CVE-2023-36758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36758"
},
{
"name": "CVE-2023-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38163"
},
{
"name": "CVE-2023-36745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36745"
},
{
"name": "CVE-2023-36760",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36760"
},
{
"name": "CVE-2023-36759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36759"
},
{
"name": "CVE-2023-36757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36757"
},
{
"name": "CVE-2023-36744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36744"
},
{
"name": "CVE-2023-39956",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39956"
},
{
"name": "CVE-2023-36771",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36771"
},
{
"name": "CVE-2023-36756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36756"
},
{
"name": "CVE-2023-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38164"
},
{
"name": "CVE-2023-36762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36762"
},
{
"name": "CVE-2023-36742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36742"
},
{
"name": "CVE-2022-41303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41303"
},
{
"name": "CVE-2023-36773",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36773"
},
{
"name": "CVE-2023-36764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36764"
},
{
"name": "CVE-2023-36740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36740"
},
{
"name": "CVE-2023-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36886"
},
{
"name": "CVE-2023-36799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36799"
},
{
"name": "CVE-2023-36796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36796"
},
{
"name": "CVE-2023-36736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36736"
},
{
"name": "CVE-2023-36793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36793"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36773 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36773"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36762 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36762"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38163 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38163"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36760 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36760"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36764 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36764"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36770 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36770"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36757 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36757"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36744 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36744"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36771 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36771"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36796 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36796"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36777 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36777"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-41303 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41303"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36759 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36799 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36799"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36739 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36739"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36793 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36793"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36758 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36758"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36772 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36772"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-39956 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-39956"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36756 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36756"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36736 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36736"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36794 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36794"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36886 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36886"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36792 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36792"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36742 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36742"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36740 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36740"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-38164 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38164"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36800 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36800"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2023-36745 du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36745"
}
],
"reference": "CERTFR-2023-AVI-0743",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-09-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Usurpation d\u0027identit\u00e9"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la fonctionnalit\u00e9 de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service, un contournement de la\nfonctionnalit\u00e9 de s\u00e9curit\u00e9, une usurpation d\u0027identit\u00e9, une ex\u00e9cution de\ncode arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 12 septembre 2023",
"url": "https://msrc.microsoft.com/update-guide/"
}
]
}
WID-SEC-W-2023-2333
Vulnerability from csaf_certbund - Published: 2023-09-12 22:00 - Updated: 2023-11-21 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Microsoft .NET Framework ist eine Komponente des Microsoft Windows-Betriebssystems, das die Erstellung und Ausf\u00fchrung von Softwareanwendungen und Webdiensten erm\u00f6glicht. Es beinhaltet sowohl eine Laufzeitumgebung als auch ein Framework von Klassenbibliotheken (APIs), u. a. f\u00fcr die Programmiersprache ASP (ASP.NET), den Datenzugriff (ADO.NET), intelligente Clientanwendungen (Windows Forms) und weitere.\r\nMicrosoft Azure DevOps Server ist eine Plattform f\u00fcr kollaborative Softwareprojekte.\r\nMicrosoft Visual Studio ist eine integrierte Entwicklungsumgebung f\u00fcr Hochsprachen.\r\nVisual Studio Code ist ein Quelltext-Editor von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in verschiedenen Microsoft Developer Tools ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- MacOS X\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2333 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2333.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2333 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2333"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-6245 vom 2023-11-06",
"url": "http://linux.oracle.com/errata/ELSA-2023-6245.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-6242 vom 2023-11-03",
"url": "https://linux.oracle.com/errata/ELSA-2023-6242.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6246 vom 2023-11-02",
"url": "https://access.redhat.com/errata/RHSA-2023:6246"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-6247 vom 2023-11-02",
"url": "https://linux.oracle.com/errata/ELSA-2023-6247.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-6246 vom 2023-11-03",
"url": "https://linux.oracle.com/errata/ELSA-2023-6246.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6362-2 vom 2023-10-25",
"url": "https://www.cybersecurity-help.cz/vdb/SB2023102524"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6438-2 vom 2023-10-25",
"url": "https://ubuntu.com/security/notices/USN-6438-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-5143 vom 2023-09-14",
"url": "https://linux.oracle.com/errata/ELSA-2023-5143.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-5144 vom 2023-09-14",
"url": "https://linux.oracle.com/errata/ELSA-2023-5144.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-5145 vom 2023-09-14",
"url": "https://linux.oracle.com/errata/ELSA-2023-5145.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-5146 vom 2023-09-14",
"url": "http://linux.oracle.com/errata/ELSA-2023-5146.html"
},
{
"category": "external",
"summary": "PoC Exploit vom 2023-11-06",
"url": "https://securityonline.info/poc-exploit-published-for-visual-studio-code-rce-vulnerability-cve-2023-36742/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-5145 vom 2023-09-14",
"url": "http://linux.oracle.com/errata/ELSA-2023-5145.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5146 vom 2023-09-13",
"url": "https://access.redhat.com/errata/RHSA-2023:5146"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5145 vom 2023-09-13",
"url": "https://access.redhat.com/errata/RHSA-2023:5145"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5142 vom 2023-09-13",
"url": "https://access.redhat.com/errata/RHSA-2023:5142"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5143 vom 2023-09-13",
"url": "https://access.redhat.com/errata/RHSA-2023:5143"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5144 vom 2023-09-13",
"url": "https://access.redhat.com/errata/RHSA-2023:5144"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6362-1 vom 2023-09-12",
"url": "https://ubuntu.com/security/notices/USN-6362-1"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2023-09-12",
"url": "https://msrc.microsoft.com/update-guide"
}
],
"source_lang": "en-US",
"title": "Microsoft Developer Tools: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-11-21T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:58:21.710+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-2333",
"initial_release_date": "2023-09-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-09-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-09-13T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-09-14T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-10-24T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-11-02T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2023-11-06T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-11-21T23:00:00.000+00:00",
"number": "7",
"summary": "PoC aufgenommen"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Microsoft .NET Framework 4.8.1",
"product": {
"name": "Microsoft .NET Framework 4.8.1",
"product_id": "1273212",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:4.8.1"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 3.5.1",
"product": {
"name": "Microsoft .NET Framework 3.5.1",
"product_id": "130815",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:3.5.1"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 4.6.2",
"product": {
"name": "Microsoft .NET Framework 4.6.2",
"product_id": "336763",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:4.6.2"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 4.7",
"product": {
"name": "Microsoft .NET Framework 4.7",
"product_id": "432554",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:4.7"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 4.7.1",
"product": {
"name": "Microsoft .NET Framework 4.7.1",
"product_id": "432555",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:4.7.1"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 4.7.2",
"product": {
"name": "Microsoft .NET Framework 4.7.2",
"product_id": "432556",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:4.7.2"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 4.8",
"product": {
"name": "Microsoft .NET Framework 4.8",
"product_id": "432557",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:4.8"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 3.5",
"product": {
"name": "Microsoft .NET Framework 3.5",
"product_id": "834793",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:3.5:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 2.0 SP2",
"product": {
"name": "Microsoft .NET Framework 2.0 SP2",
"product_id": "T021515",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:2.0_sp2"
}
}
},
{
"category": "product_name",
"name": "Microsoft .NET Framework 3.0 SP2",
"product": {
"name": "Microsoft .NET Framework 3.0 SP2",
"product_id": "T024564",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:.net_framework:3.0_sp2"
}
}
}
],
"category": "product_name",
"name": ".NET Framework"
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Azure DevOps Server 2019.0.1",
"product": {
"name": "Microsoft Azure DevOps Server 2019.0.1",
"product_id": "766289",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_devops_server:2019.0.1:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Azure DevOps Server 2019.1.2",
"product": {
"name": "Microsoft Azure DevOps Server 2019.1.2",
"product_id": "T029128",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_devops_server:2019.1.2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Azure DevOps Server 2020.1.2",
"product": {
"name": "Microsoft Azure DevOps Server 2020.1.2",
"product_id": "T029129",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_devops_server:2020.1.2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Azure DevOps Server 2020.0.2",
"product": {
"name": "Microsoft Azure DevOps Server 2020.0.2",
"product_id": "T029804",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_devops_server:2020.0.2"
}
}
}
],
"category": "product_name",
"name": "Azure DevOps Server"
},
{
"category": "product_name",
"name": "Microsoft Visual Studio 2017 version 15.9",
"product": {
"name": "Microsoft Visual Studio 2017 version 15.9",
"product_id": "T015502",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2017:version_15.9"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visual Studio 2019 version 16.11",
"product": {
"name": "Microsoft Visual Studio 2019 version 16.11",
"product_id": "T024563",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2019:version_16.11"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.2",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.2",
"product_id": "T028102",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.2"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.4",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.4",
"product_id": "T028103",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.4"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.6",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.6",
"product_id": "T028105",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.6"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.7",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.7",
"product_id": "T029805",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_2022:version_17.7"
}
}
}
],
"category": "product_name",
"name": "Visual Studio 2022"
},
{
"category": "product_name",
"name": "Microsoft Visual Studio Code",
"product": {
"name": "Microsoft Visual Studio Code",
"product_id": "699261",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visual_studio_code:-"
}
}
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-39956",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-39956"
},
{
"cve": "CVE-2023-38155",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-38155"
},
{
"cve": "CVE-2023-36799",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36799"
},
{
"cve": "CVE-2023-36796",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36796"
},
{
"cve": "CVE-2023-36794",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36794"
},
{
"cve": "CVE-2023-36793",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36793"
},
{
"cve": "CVE-2023-36792",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36792"
},
{
"cve": "CVE-2023-36788",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36788"
},
{
"cve": "CVE-2023-36759",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36759"
},
{
"cve": "CVE-2023-36758",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36758"
},
{
"cve": "CVE-2023-36742",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-36742"
},
{
"cve": "CVE-2023-33136",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Microsoft Developer Tools. Die Fehler sind noch nicht im Detail beschrieben. Ein entfernter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen und seine Privilegien auf SYSTEM zu erweitern. Das erfolgreiche Ausnutzen einiger dieser Schwachstellen erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"432555",
"432556",
"432554",
"67646",
"432557",
"T015502",
"130815",
"T004914",
"834793",
"766289",
"336763",
"699261",
"1273212",
"T021515",
"T029805",
"T000126",
"T029804",
"T024564",
"T024563",
"T028105",
"T029129",
"T029128",
"T028103",
"T028102"
]
},
"release_date": "2023-09-12T22:00:00.000+00:00",
"title": "CVE-2023-33136"
}
]
}
MSRC_CVE-2023-36759
Vulnerability from csaf_microsoft - Published: 2023-09-12 07:00 - Updated: 2023-09-12 07:00Notes
{
"document": {
"acknowledgments": [
{
"names": [
"\u003ca href=\"https://github.com/zeze-zeze\"\u003eZeze\u003c/a\u003e with \u003ca href=\"https://teamt5.org/tw/\"\u003eTeamT5\u003c/a\u003e"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-36759 Visual Studio Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759"
},
{
"category": "self",
"summary": "CVE-2023-36759 Visual Studio Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/2023/msrc_cve-2023-36759.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Visual Studio Elevation of Privilege Vulnerability",
"tracking": {
"current_release_date": "2023-09-12T07:00:00.000Z",
"generator": {
"date": "2025-01-01T02:04:05.607Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-36759",
"initial_release_date": "2023-09-12T07:00:00.000Z",
"revision_history": [
{
"date": "2023-09-12T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c17.2.19",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.2 \u003c17.2.19",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "17.2.19",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.2 17.2.19",
"product_id": "12051"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c16.11.30",
"product": {
"name": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) \u003c16.11.30",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "16.11.30",
"product": {
"name": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) 16.11.30",
"product_id": "11935"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c17.4.11",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.4 \u003c17.4.11",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "17.4.11",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.4 17.4.11",
"product_id": "12129"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.4"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c17.7.4",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.7 \u003c17.7.4",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "17.7.4",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.7 17.7.4",
"product_id": "12222"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.7"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c17.6.7",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.6 \u003c17.6.7",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "17.6.7",
"product": {
"name": "Microsoft Visual Studio 2022 version 17.6 17.6.7",
"product_id": "12187"
}
}
],
"category": "product_name",
"name": "Microsoft Visual Studio 2022 version 17.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-36759",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level.",
"title": "What privileges could be gained by an attacker who successfully exploited the vulnerability?"
},
{
"category": "faq",
"text": "Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.",
"title": "According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?"
},
{
"category": "faq",
"text": "An authenticated attacker must send the victim a malicious file and convince them to open it.",
"title": "According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?"
}
],
"product_status": {
"fixed": [
"11935",
"12051",
"12129",
"12187",
"12222"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-36759 Visual Studio Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759"
},
{
"category": "self",
"summary": "CVE-2023-36759 Visual Studio Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36759"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2023-09-12T07:00:00.000Z",
"details": "17.2.19:Security Update:https://docs.microsoft.com/en-us/visualstudio/releases/2022/release-notes",
"product_ids": [
"4"
],
"url": "https://docs.microsoft.com/en-us/visualstudio/releases/2022/release-notes"
},
{
"category": "vendor_fix",
"date": "2023-09-12T07:00:00.000Z",
"details": "16.11.30:Security Update:https://docs.microsoft.com/en-us/visualstudio/releases/2019/release-notes-v16.11",
"product_ids": [
"5"
],
"url": "https://docs.microsoft.com/en-us/visualstudio/releases/2019/release-notes-v16.11"
},
{
"category": "vendor_fix",
"date": "2023-09-12T07:00:00.000Z",
"details": "17.4.11:Security Update:https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes",
"product_ids": [
"3"
],
"url": "https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes"
},
{
"category": "vendor_fix",
"date": "2023-09-12T07:00:00.000Z",
"details": "17.7.4:Security Update:https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes",
"product_ids": [
"1"
],
"url": "https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes"
},
{
"category": "vendor_fix",
"date": "2023-09-12T07:00:00.000Z",
"details": "17.6.7:Security Update:https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes",
"product_ids": [
"2"
],
"url": "https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "UNPROVEN",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 5.8,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Elevation of Privilege"
},
{
"category": "exploit_status",
"details": "Exploited:No;Latest Software Release:Exploitation Less Likely"
}
],
"title": "Visual Studio Elevation of Privilege Vulnerability"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.