Executive Summary

Summary
Title Security Update for Microsoft Graphics Component (3148522)
Informations
Name MS16-039 First vendor Publication 2016-04-12
Vendor Microsoft Last vendor Modification 2017-09-12
Severity (Vendor) N/A Revision 4.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Critical
Revision Note: V4.0 (September 12, 2017): Revised the Microsoft Windows affected software table to include Windows 10 Version 1703 for 32-bit Systems and Windows 10 Version 1703 for x64-based Systems because they are affected by CVE-2016-0165. Consumers running Windows 10 are automatically protected. Microsoft recommends that enterprise customers running Windows 10 Version 1703 ensure they have update 4038788 installed to be protected from this vulnerability.
Summary: This security update resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Skype for Business, and Microsoft Lync. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a webpage that contains specially crafted embedded fonts.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS16-039

CWE : Common Weakness Enumeration

% Id Name
75 % CWE-264 Permissions, Privileges, and Access Controls
25 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3
Application 1
Application 3
Application 2
Application 1
Application 1
Os 1
Os 1
Os 2
Os 1
Os 1
Os 3
Os 2
Os 1

Snort® IPS/IDS

Date Description
2016-06-07 Microsoft Windows Dxgkrnl.sys RtlMemoryCopy buffer overflow attempt
RuleID : 38766 - Revision : 2 - Type : OS-WINDOWS
2016-06-07 Microsoft Windows Dxgkrnl.sys RtlMemoryCopy buffer overflow attempt
RuleID : 38765 - Revision : 2 - Type : OS-WINDOWS
2016-05-12 Microsoft Windows win32k.sys glyph bitmap boundary out of bounds memory acces...
RuleID : 38494 - Revision : 2 - Type : FILE-OTHER
2016-05-12 Microsoft Windows win32k.sys glyph bitmap boundary out of bounds memory acces...
RuleID : 38493 - Revision : 2 - Type : FILE-OTHER
2016-05-12 Microsoft Windows CreatePopupMenu win32k.sys use after free attempt
RuleID : 38492 - Revision : 2 - Type : OS-WINDOWS
2016-05-12 Microsoft Windows CreatePopupMenu win32k.sys use after free attempt
RuleID : 38491 - Revision : 2 - Type : OS-WINDOWS
2016-05-12 Microsoft Windows win32k.sys PathToRegion buffer overflow attempt
RuleID : 38488 - Revision : 2 - Type : OS-WINDOWS
2016-05-12 Microsoft Windows win32k.sys PathToRegion buffer overflow attempt
RuleID : 38487 - Revision : 2 - Type : OS-WINDOWS
2016-05-12 Microsoft Windows DrawMenuBarTemp memory corruption attempt
RuleID : 38460 - Revision : 2 - Type : OS-WINDOWS
2016-05-12 Microsoft Windows DrawMenuBarTemp memory corruption attempt
RuleID : 38459 - Revision : 2 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2016-04-12 Name : The remote host is affected by multiple vulnerabilities.
File : smb_nt_ms16-039.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
Date Informations
2017-09-13 17:23:09
  • Multiple Updates
2017-09-13 17:18:01
  • Multiple Updates
2016-06-14 21:38:02
  • Multiple Updates
2016-06-14 21:16:53
  • Multiple Updates
2016-04-20 00:28:25
  • Multiple Updates
2016-04-20 00:15:46
  • Multiple Updates
2016-04-14 21:30:09
  • Multiple Updates
2016-04-13 13:20:42
  • Multiple Updates
2016-04-13 05:28:05
  • Multiple Updates
2016-04-12 21:16:48
  • First insertion