Executive Summary

Summary
TitleSecurity Update for Windows Kernel-Mode Drivers (3192892)
Informations
NameMS16-123First vendor Publication2016-10-11
VendorMicrosoftLast vendor Modification2017-09-12
Severity (Vendor) N/ARevision3.0

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score10Attack RangeNetwork
Cvss Impact Score10Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V3.0 (September 12, 2017): Revised the Affected Software table to include Windows 10 Version 1703 for 32-bit Systems and Windows 10 Version 1703 for x64-based Systems because they are affected by CVE-2016-3376. Consumers using Windows 10 are automatically protected. Microsoft recommends that enterprise customers running Windows 10 Version 1703 ensure they have update 4038788 installed to be protected from this vulnerability.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS16-123

CWE : Common Weakness Enumeration

%idName
83 %CWE-264Permissions, Privileges, and Access Controls
17 %CWE-287Improper Authentication

CPE : Common Platform Enumeration

TypeDescriptionCount
Application18
Os3
Os1
Os1
Os1
Os2
Os2
Os1

Snort® IPS/IDS

DateDescription
2016-11-08Microsoft Windows DFS client driver privilege escalation attempt
RuleID : 40419 - Revision : 2 - Type : OS-WINDOWS
2016-11-08Microsoft Windows DFS client driver privilege escalation attempt
RuleID : 40418 - Revision : 2 - Type : OS-WINDOWS
2016-11-08Microsoft Windows Ntoskrnl privilege escalation attempt
RuleID : 40393 - Revision : 2 - Type : OS-WINDOWS
2016-11-08Microsoft Windows Ntoskrnl privilege escalation attempt
RuleID : 40392 - Revision : 2 - Type : OS-WINDOWS
2016-11-08Microsoft Windows win32kfull.sys FBitsTouch use after free attempt
RuleID : 40381 - Revision : 3 - Type : OS-WINDOWS
2016-11-08Microsoft Windows win32kfull.sys FBitsTouch use after free attempt
RuleID : 40380 - Revision : 3 - Type : OS-WINDOWS
2016-11-08Microsoft GDI local privilege escalation attempt
RuleID : 40377 - Revision : 2 - Type : OS-WINDOWS
2016-11-08Microsoft GDI local privilege escalation attempt
RuleID : 40376 - Revision : 2 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

DateDescription
2016-10-12Name : The remote host is affected by multiple vulnerabilities.
File : smb_nt_ms16-123.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
DateInformations
2017-09-13 17:23:10
  • Multiple Updates
2017-09-13 17:18:06
  • Multiple Updates
2016-12-13 21:26:51
  • Multiple Updates
2016-12-13 21:19:06
  • Multiple Updates
2016-10-17 21:26:13
  • Multiple Updates
2016-10-14 09:25:22
  • Multiple Updates
2016-10-13 13:25:06
  • Multiple Updates
2016-10-12 05:24:22
  • Multiple Updates
2016-10-12 05:16:54
  • Multiple Updates
2016-10-11 21:24:37
  • Multiple Updates
2016-10-11 21:18:30
  • First insertion