Executive Summary

Summary
TitleSecurity Update for Microsoft Graphics Component (3148522)
Informations
NameMS16-039First vendor Publication2016-04-12
VendorMicrosoftLast vendor Modification2017-09-12
Severity (Vendor) N/ARevision4.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score9.3Attack RangeNetwork
Cvss Impact Score10Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Critical
Revision Note: V4.0 (September 12, 2017): Revised the Microsoft Windows affected software table to include Windows 10 Version 1703 for 32-bit Systems and Windows 10 Version 1703 for x64-based Systems because they are affected by CVE-2016-0165. Consumers running Windows 10 are automatically protected. Microsoft recommends that enterprise customers running Windows 10 Version 1703 ensure they have update 4038788 installed to be protected from this vulnerability.
Summary: This security update resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Skype for Business, and Microsoft Lync. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a webpage that contains specially crafted embedded fonts.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS16-039

CWE : Common Weakness Enumeration

%idName
75 %CWE-264Permissions, Privileges, and Access Controls
25 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application3
Application1
Application3
Application2
Application1
Application1
Os2
Os2
Os1
Os1
Os3
Os2
Os1

Snort® IPS/IDS

DateDescription
2016-06-07Microsoft Windows Dxgkrnl.sys RtlMemoryCopy buffer overflow attempt
RuleID : 38766 - Revision : 2 - Type : OS-WINDOWS
2016-06-07Microsoft Windows Dxgkrnl.sys RtlMemoryCopy buffer overflow attempt
RuleID : 38765 - Revision : 2 - Type : OS-WINDOWS
2016-05-12Microsoft Windows win32k.sys glyph bitmap boundary out of bounds memory acces...
RuleID : 38494 - Revision : 2 - Type : FILE-OTHER
2016-05-12Microsoft Windows win32k.sys glyph bitmap boundary out of bounds memory acces...
RuleID : 38493 - Revision : 2 - Type : FILE-OTHER
2016-05-12Microsoft Windows CreatePopupMenu win32k.sys use after free attempt
RuleID : 38492 - Revision : 2 - Type : OS-WINDOWS
2016-05-12Microsoft Windows CreatePopupMenu win32k.sys use after free attempt
RuleID : 38491 - Revision : 2 - Type : OS-WINDOWS
2016-05-12Microsoft Windows win32k.sys PathToRegion buffer overflow attempt
RuleID : 38488 - Revision : 2 - Type : OS-WINDOWS
2016-05-12Microsoft Windows win32k.sys PathToRegion buffer overflow attempt
RuleID : 38487 - Revision : 2 - Type : OS-WINDOWS
2016-05-12Microsoft Windows DrawMenuBarTemp memory corruption attempt
RuleID : 38460 - Revision : 2 - Type : OS-WINDOWS
2016-05-12Microsoft Windows DrawMenuBarTemp memory corruption attempt
RuleID : 38459 - Revision : 2 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

DateDescription
2016-04-12Name : The remote host is affected by multiple vulnerabilities.
File : smb_nt_ms16-039.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
DateInformations
2017-09-13 17:23:09
  • Multiple Updates
2017-09-13 17:18:01
  • Multiple Updates
2016-06-14 21:38:02
  • Multiple Updates
2016-06-14 21:16:53
  • Multiple Updates
2016-04-20 00:28:25
  • Multiple Updates
2016-04-20 00:15:46
  • Multiple Updates
2016-04-14 21:30:09
  • Multiple Updates
2016-04-13 13:20:42
  • Multiple Updates
2016-04-13 05:28:05
  • Multiple Updates
2016-04-12 21:16:48
  • First insertion