Executive Summary

Summary
Title Security Update for Windows Media to Address Remote Code Execution (3143146)
Informations
Name MS16-027 First vendor Publication 2016-03-08
Vendor Microsoft Last vendor Modification 2016-04-07
Severity (Vendor) N/A Revision 1.2

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Critical
Revision Note: V1.2 (April 7, 2016): Added a note to clarify that Windows Media is only enabled on Windows server operating systems when the Desktop Experience feature is enabled. This is an informational change only.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if a user opens specially crafted media content that is hosted on a website.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS16-027

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 1
Os 1
Os 1
Os 1
Os 2
Os 2

Snort® IPS/IDS

Date Description
2016-04-07 Microsoft Windows Transport Stream Program Map Table Heap Overflow attempt
RuleID : 38125 - Revision : 3 - Type : FILE-MULTIMEDIA
2016-04-07 Microsoft Windows Transport Stream Program Map Table Heap Overflow attempt
RuleID : 38124 - Revision : 3 - Type : FILE-MULTIMEDIA
2016-04-05 Microsoft Internet Explorer embedded media player use after free attempt
RuleID : 38080 - Revision : 2 - Type : BROWSER-IE
2016-04-05 Microsoft Internet Explorer embedded media player use after free attempt
RuleID : 38079 - Revision : 2 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2016-03-08 Name : The remote Windows host is affected by multiple remote code execution vulnera...
File : smb_nt_ms16-027.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2016-04-08 00:27:33
  • Multiple Updates
2016-04-08 00:16:30
  • Multiple Updates
2016-03-11 05:27:44
  • Multiple Updates
2016-03-11 05:16:08
  • Multiple Updates
2016-03-10 05:28:25
  • Multiple Updates
2016-03-10 00:48:33
  • Multiple Updates
2016-03-09 21:29:19
  • Multiple Updates
2016-03-09 17:27:51
  • Multiple Updates
2016-03-09 13:25:54
  • Multiple Updates
2016-03-08 21:28:05
  • Multiple Updates
2016-03-08 21:17:10
  • First insertion