CVE-2018-8256

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2018-8256
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-8256.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-8256
Published
2018-11-14T01:29:00Z
Modified
2024-09-03T02:08:38.210156Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A remote code execution vulnerability exists when PowerShell improperly handles specially crafted files, aka "Microsoft PowerShell Remote Code Execution Vulnerability." This affects Windows RT 8.1, PowerShell Core 6.0, Microsoft.PowerShell.Archive 1.2.2.0, Windows Server 2016, Windows Server 2012, Windows Server 2008 R2, Windows Server 2019, Windows 7, Windows Server 2012 R2, PowerShell Core 6.1, Windows 10 Servers, Windows 10, Windows 8.1.

References

Affected packages

Git / github.com/powershell/powershell

Affected ranges

Type
GIT
Repo
https://github.com/powershell/powershell
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected

Affected versions

Other

SD/688741
SD/692351
SD/693793
SD/695331
SD/700586
SD/704605
SD/706766
SD/709766
SD/709776
SD/715912
SD/717473
SD/725290

v0.*

v0.1.0
v0.2.0
v0.3.0
v0.4.0
v0.5.0
v0.6.0

v6.*

v6.0.0
v6.0.0-alpha.10
v6.0.0-alpha.11
v6.0.0-alpha.12
v6.0.0-alpha.13
v6.0.0-alpha.14
v6.0.0-alpha.16
v6.0.0-alpha.17
v6.0.0-alpha.18
v6.0.0-alpha.7
v6.0.0-alpha.8
v6.0.0-alpha.9
v6.0.0-beta.1
v6.0.0-beta.2
v6.0.0-beta.3
v6.0.0-beta.5
v6.0.0-beta.6
v6.0.0-beta.7
v6.0.0-beta.8
v6.0.0-beta.9
v6.0.0-rc
v6.0.0-rc.2