Executive Summary

Summary
TitleSecurity Update for Windows Library Loading to Address Remote Code Execution (3140709)
Informations
NameMS16-025First vendor Publication2016-03-08
VendorMicrosoftLast vendor Modification2016-03-08
Severity (Vendor) N/ARevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score7.2Attack RangeLocal
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V1.0 (March 8, 2016): Click here to enter text.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if Microsoft Windows fails to properly validate input before loading certain libraries. However, an attacker must first gain access to the local system with the ability to execute a malicious application.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS16-025

CWE : Common Weakness Enumeration

%idName
50 %CWE-264Permissions, Privileges, and Access Controls
50 %CWE-20Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Os1
Os1

Metasploit Database

idDescription
2015-12-08 Office OLE Multiple DLL Side Loading Vulnerabilities

Nessus® Vulnerability Scanner

DateDescription
2016-03-08Name : The remote Windows host is affected by a remote code execution vulnerability.
File : smb_nt_ms16-025.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
DateInformations
2016-03-15 21:28:21
  • Multiple Updates
2016-03-09 17:27:51
  • Multiple Updates
2016-03-09 13:25:54
  • Multiple Updates
2016-03-08 21:28:04
  • Multiple Updates
2016-03-08 21:16:38
  • First insertion