### [CVE-2017-8558](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8558) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Malware%20Protection%20Engine&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=32-bit%20versions%20only%20of%20Microsoft%20Forefront%20and%20Microsoft%20Defender%20on%20Microsoft%20Windows%20Server%202008%20SP2%20and%20R2%20SP1%2C%20Windows%207%20SP1%2C%20Windows%208.1%2C%20Windows%20Server%202012%20Gold%20and%20R2%2C%20Windows%20RT%208.1%2C%20Windows%2010%20Gold%2C%201511%2C%201607%2C%20and%201703%2C%20and%20Windows%20Server%202016%2C%20Microsoft%20Exchange%20Server%202013%20and%202016.%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brightgreen) ### Description The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on 32-bit versions of Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703 does not properly scan a specially crafted file leading to memory corruption. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability". ### POC #### Reference - https://www.exploit-db.com/exploits/42264/ #### Github No PoCs found on GitHub currently.