Executive Summary

Summary
TitleSecurity Update for .NET Framework (3148789)
Informations
NameMS16-041First vendor Publication2016-04-12
VendorMicrosoftLast vendor Modification2016-04-12
Severity (Vendor) N/ARevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score7.2Attack RangeLocal
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The more severe of the vulnerabilities could cause remote code execution if an attacker with access to the local system executes a malicious application.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS16-041

CWE : Common Weakness Enumeration

%idName
100 %CWE-264Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application2

Snort® IPS/IDS

DateDescription
2016-05-12Microsoft Windows api-ms-win-appmodel-runtime dll-load exploit attempt
RuleID : 38470 - Revision : 3 - Type : OS-WINDOWS
2016-05-12Microsoft Windows api-ms-win-appmodel-runtime dll-load exploit attempt
RuleID : 38469 - Revision : 3 - Type : OS-WINDOWS

Metasploit Database

idDescription
2015-12-08 Office OLE Multiple DLL Side Loading Vulnerabilities

Nessus® Vulnerability Scanner

DateDescription
2016-04-12Name : The remote Windows host has a software framework installed that is affected b...
File : smb_nt_ms16-041.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2016-04-14 21:30:11
  • Multiple Updates
2016-04-13 13:20:42
  • Multiple Updates
2016-04-13 05:28:07
  • Multiple Updates
2016-04-12 21:16:31
  • First insertion