Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

HTTP:STC:DL:CVE-2018-8413-RCE

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

HTTP

Keywords

Microsoft Windows CVE-2018-8413 Theme API Remote Code Execution

Release Date

2018/10/08

Update Number

3107

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

HTTP: Microsoft Windows CVE-2018-8413 Theme API Remote Code Execution


This signature detects an attempt to exploit a remote code execution vulnerability in Microsoft Windows. Successful exploitation could allow an attacker to execute arbitrary code in the context of the current user.

Extended Description

A remote code execution vulnerability exists when "Windows Theme API" does not properly decompress files, aka "Windows Theme API Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

Affected Products

  • Microsoft windows_10 -
  • Microsoft windows_10 1607
  • Microsoft windows_10 1703
  • Microsoft windows_10 1709
  • Microsoft windows_10 1803
  • Microsoft windows_10 1809
  • Microsoft windows_7 -
  • Microsoft windows_8.1 *
  • Microsoft windows_rt_8.1 -
  • Microsoft windows_server_2008 r2
  • Microsoft windows_server_2012 -
  • Microsoft windows_server_2012 r2
  • Microsoft windows_server_2016 -
  • Microsoft windows_server_2016 1709
  • Microsoft windows_server_2016 1803
  • Microsoft windows_server_2019 -

References

  • BugTraq: 105448
  • CVE: CVE-2020-1300
  • CVE: CVE-2018-8413

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out