Think you have a false positive on this rule?

Sid 1-44834

Message

OS-WINDOWS Microsoft Windows win32k.sys use after free attempt

Summary

This event is generated when a malicious file attempting to exploit CVE-2017-11847 is detected.

Impact

Attempted User Privilege Gain

CVE-2017-11847:

CVSS base score 7.8

CVSS impact score 5.9

CVSS exploitability score 1.8

Confidentiality Impact HIGH

Integrity Impact HIGH

Availability Impact HIGH

Detailed information

CVE-2017-11847: Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to run arbitrary code in kernel mode, install programs, view, change or delete data, and create new accounts with full user rights due to improperly handing objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability".

Affected systems

  • microsoft windows_10 *
  • microsoft windows_10 1511
  • microsoft windows_10 1607
  • microsoft windows_10 1703
  • microsoft windows_7 *
  • microsoft windows_8.1 *
  • microsoft windowsrt8.1 *
  • microsoft windowsserver2008 *
  • microsoft windowsserver2008 r2
  • microsoft windowsserver2012 *
  • microsoft windowsserver2012 r2
  • microsoft windowsserver2016 *

Ease of attack

CVE-2017-11847:

Access Vector

Access Complexity

Authentication

False positives

False negatives

Corrective action

Contributors

  • Cisco's Talos Intelligence Group

Additional References

  • portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2017-11847