cve/2019/CVE-2019-0577.md
2025-09-29 21:09:30 +02:00

65 lines
5.8 KiB
Markdown

### [CVE-2019-0577](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0577)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010%20Servers&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%2010&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%207&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%208.1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20RT%208.1&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008%20R2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202008&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012%20R2&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202012&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202016&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Windows%20Server%202019&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=(Server%20Core%20installation)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=32-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=32-bit%20Systems%20Service%20Pack%201%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=32-bit%20Systems%20Service%20Pack%202%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=32-bit%20Systems%20Service%20Pack%202%20(Server%20Core%20installation)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=32-bit%20systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Itanium-Based%20Systems%20Service%20Pack%201%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Itanium-Based%20Systems%20Service%20Pack%202%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201607%20for%2032-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201607%20for%20x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201703%20for%2032-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201703%20for%20x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201709%20for%2032-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201709%20for%20ARM64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201709%20for%20x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201803%20for%2032-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201803%20for%20ARM64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201803%20for%20x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201809%20for%2032-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201809%20for%20ARM64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%201809%20for%20x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%20RT%208.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=version%201709%20%20(Server%20Core%20Installation)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=version%201803%20%20(Server%20Core%20Installation)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=x64-based%20Systems%20Service%20Pack%201%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=x64-based%20Systems%20Service%20Pack%201%20(Server%20Core%20installation)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=x64-based%20Systems%20Service%20Pack%202%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=x64-based%20Systems%20Service%20Pack%202%20(Server%20Core%20installation)%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=x64-based%20systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brightgreen)
### Description
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka "Jet Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/DanielEbert/winafl
- https://github.com/Team-BT5/WinAFL-RDP
- https://github.com/bacon-tomato-spaghetti/WinAFL-RDP
- https://github.com/googleprojectzero/winafl
- https://github.com/hardik05/winafl-powermopt
- https://github.com/pranav0408/WinAFL
- https://github.com/ssumachai/CS182-Project
- https://github.com/yrime/WinAflCustomMutate