{"containers":{"cna":{"affected":[{"product":"Windows Subsystem for Linux","vendor":"Microsoft Corporation","versions":[{"status":"affected","version":"Windows 10 1703"}]}],"datePublic":"2017-08-08T00:00:00.000Z","descriptions":[{"lang":"en","value":"Windows Subsystem for Linux in Windows 10 1703 allows an elevation of privilege vulnerability when it fails to properly handle handles NT pipes, aka \"Windows Subsystem for Linux Elevation of Privilege Vulnerability\"."}],"problemTypes":[{"descriptions":[{"description":"Elevation of Privilege","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-08-09T09:57:01.000Z","orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8622"},{"name":"100040","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/100040"},{"name":"1039103","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id/1039103"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@microsoft.com","DATE_PUBLIC":"2017-08-08T00:00:00","ID":"CVE-2017-8622","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Windows Subsystem for Linux","version":{"version_data":[{"version_value":"Windows 10 1703"}]}}]},"vendor_name":"Microsoft Corporation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Windows Subsystem for Linux in Windows 10 1703 allows an elevation of privilege vulnerability when it fails to properly handle handles NT pipes, aka \"Windows Subsystem for Linux Elevation of Privilege Vulnerability\"."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Elevation of Privilege"}]}]},"references":{"reference_data":[{"name":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8622","refsource":"CONFIRM","url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8622"},{"name":"100040","refsource":"BID","url":"http://www.securityfocus.com/bid/100040"},{"name":"1039103","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1039103"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T16:41:24.171Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8622"},{"name":"100040","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/100040"},{"name":"1039103","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id/1039103"}]}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2017-8622","datePublished":"2017-08-08T21:00:00.000Z","dateReserved":"2017-05-03T00:00:00.000Z","dateUpdated":"2024-09-16T18:03:07.702Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}