Windows Host Compute Service Shim Remote Code Execution Vulnerability
Released: May 2, 2018
- Assigning CNA
- Microsoft
- Mitre
- CVE-2018-8115
Executive Summary
A remote code execution vulnerability exists when the Windows Host Compute Service Shim (hcsshim) library fails to properly validate input while importing a container image. To exploit the vulnerability, an attacker would place malicious code in a specially crafted container image which, if an authenticated administrator imported (pulled), could cause a container management service utilizing the Host Compute Service Shim library to execute malicious code on the Windows host.
An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system.
The security update addresses the vulnerability by correcting how Windows Host Compute Service Shim validates input from container images.
Exploitability
The following table provides an exploitability assessment for this vulnerability at the time of original publication.
- Publicly disclosed
- No
- Exploited
- No
- Exploitability assessment
- Exploitation Unlikely
Acknowledgements
- Michael Hanselmann
Security Updates
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle.
- -
Disclaimer
Revisions
Information published.