Aug 2019: MS XML Remote Code Execution Vulnerability
CVE-2019-1057 Published on August 14, 2019

MS XML Remote Code Execution Vulnerability
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the users system. To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke MSXML through a web browser. However, an attacker would have no way to force a user to visit such a website. Instead, an attacker would typically have to convince a user to either click a link in an email message or instant message that would then take the user to the website. When Internet Explorer parses the XML content, an attacker could run malicious code remotely to take control of the users system. The update addresses the vulnerability by correcting how the MSXML parser processes user input.

NVD

Weakness Type

What is a Code Injection Vulnerability?

The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.

CVE-2019-1057 has been classified to as a Code Injection vulnerability or weakness.


Products Associated with CVE-2019-1057

Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

Microsoft Windows 10 Version 1903 for 32-bit Systems: Microsoft Windows 10 Version 1903 for x64-based Systems: Microsoft Windows 10 Version 1709: Microsoft Windows 10 Version 1903 for ARM64-based Systems: Microsoft Windows Server, version 1903 (Server Core installation): Microsoft Windows 10 Version 1809: Microsoft Windows Server 2019: Microsoft Windows 10 Version 1803: Microsoft Windows Server 2019 (Server Core installation): Microsoft Windows 10 Version 1709 for 32-bit Systems: Microsoft Windows Server, version 1803 (Server Core Installation): Microsoft Windows 10 Version 1507: Microsoft Windows 10 Version 1703: Microsoft Windows Server 2008 Service Pack 2: Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation): Microsoft Windows Server 2012: Microsoft Windows 7 Service Pack 1: Microsoft Windows Server 2008 R2 Systems Service Pack 1: Microsoft Windows Server 2012 R2: Microsoft Windows Server 2008 R2 Service Pack 1: Microsoft Windows 7: Microsoft Windows 8.1: Microsoft Windows Server 2008 Service Pack 2 (Server Core installation): Microsoft Windows Server 2008 Service Pack 2: Microsoft Windows Server 2012 R2 (Server Core installation): Microsoft Windows Server 2012 (Server Core installation): Microsoft Windows 10 Version 1607: Microsoft Windows Server 2016 (Server Core installation): Microsoft Windows Server 2016:

Exploit Probability

EPSS
4.43%
Percentile
88.84%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.