Description
Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user, due to how Microsoft Windows Text Services Framework handles objects in memory, aka "Windows Shell Memory Corruption Vulnerability".
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2024-09-17T00:01:17.814Z
Reserved: 2017-05-03T00:00:00.000Z
Link: CVE-2017-8727
No data.
Status : Modified
Published: 2017-10-13T13:29:02.410
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-8727
No data.
OpenCVE Enrichment
No data.
Weaknesses