Executive Summary

Summary
TitleSecurity Update for Windows Hyper-V (3143118)
Informations
NameMS16-045First vendor Publication2016-04-12
VendorMicrosoftLast vendor Modification2016-04-12
Severity (Vendor) N/ARevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score7.2Attack RangeLocal
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V1.0 (April 12, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an authenticated attacker on a guest operating system runs a specially crafted application that causes the Hyper-V host operating system to execute arbitrary code. Customers who have not enabled the Hyper-V role are not affected.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS16-045

CWE : Common Weakness Enumeration

%idName
67 %CWE-200Information Exposure
33 %CWE-284Access Control (Authorization) Issues

CPE : Common Platform Enumeration

TypeDescriptionCount
Os1
Os1
Os2

Nessus® Vulnerability Scanner

DateDescription
2016-04-12Name : The remote host is affected by multiple vulnerabilities.
File : smb_nt_ms16-045.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2016-04-14 21:30:15
  • Multiple Updates
2016-04-13 13:20:42
  • Multiple Updates
2016-04-13 05:28:11
  • Multiple Updates
2016-04-12 21:16:44
  • First insertion