Executive Summary

Summary
TitleSecurity Update for Windows Kernel-Mode Drivers (3158222)
Informations
NameMS16-062First vendor Publication2016-05-10
VendorMicrosoftLast vendor Modification2016-05-10
Severity (Vendor) N/ARevision1.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score7.2Attack RangeLocal
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V1.0 (May 10, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS16-062

CWE : Common Weakness Enumeration

%idName
86 %CWE-264Permissions, Privileges, and Access Controls
14 %CWE-200Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Os2
Os3
Os1
Os1
Os2
Os3
Os1

Snort® IPS/IDS

DateDescription
2016-06-07Microsoft Windows win32kfull.sys device context use after free attempt
RuleID : 38809 - Revision : 2 - Type : OS-WINDOWS
2016-06-07Microsoft Windows win32kfull.sys device context use after free attempt
RuleID : 38808 - Revision : 2 - Type : OS-WINDOWS
2016-06-07Microsoft Windows NtGdiGetEmbUFI kernel information disclosure attempt
RuleID : 38802 - Revision : 2 - Type : OS-WINDOWS
2016-06-07Microsoft Windows NtGdiGetEmbUFI kernel information disclosure attempt
RuleID : 38801 - Revision : 2 - Type : OS-WINDOWS
2016-06-07Microsoft Windows Device Context bitmap use after free attempt
RuleID : 38788 - Revision : 2 - Type : OS-WINDOWS
2016-06-07Microsoft Windows Device Context bitmap use after free attempt
RuleID : 38787 - Revision : 2 - Type : OS-WINDOWS
2016-06-07Microsoft Windows device content surface bitmap use after free attempt
RuleID : 38775 - Revision : 2 - Type : OS-WINDOWS
2016-06-07Microsoft Windows device content surface bitmap use after free attempt
RuleID : 38774 - Revision : 2 - Type : OS-WINDOWS
2016-06-07Microsoft Windows Dxgkrnl.sys RtlMemoryCopy buffer overflow attempt
RuleID : 38766 - Revision : 2 - Type : OS-WINDOWS
2016-06-07Microsoft Windows Dxgkrnl.sys RtlMemoryCopy buffer overflow attempt
RuleID : 38765 - Revision : 2 - Type : OS-WINDOWS
2016-06-07Microsoft Windows win32kfull.sys font object use after free attempt
RuleID : 38762 - Revision : 2 - Type : OS-WINDOWS
2016-06-07Microsoft Windows win32kfull.sys font object use after free attempt
RuleID : 38761 - Revision : 2 - Type : OS-WINDOWS
2016-06-07Microsoft Windows Win32k window handle use after free attempt
RuleID : 38760 - Revision : 3 - Type : OS-WINDOWS
2016-06-07Microsoft Windows Win32k window handle use after free attempt
RuleID : 38759 - Revision : 3 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

DateDescription
2016-05-10Name : The remote host is affected by multiple vulnerabilities.
File : smb_nt_ms16-062.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
DateInformations
2016-05-12 05:36:18
  • Multiple Updates
2016-05-11 13:27:29
  • Multiple Updates
2016-05-11 09:37:21
  • Multiple Updates
2016-05-10 21:38:07
  • Multiple Updates
2016-05-10 21:17:15
  • First insertion