Executive Summary

Summary
Title Security Update for Windows Kernel-Mode Drivers (3158222)
Informations
Name MS16-062 First vendor Publication 2016-05-10
Vendor Microsoft Last vendor Modification 2016-05-10
Severity (Vendor) N/A Revision 1.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V1.0 (May 10, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS16-062

CWE : Common Weakness Enumeration

% Id Name
86 % CWE-264 Permissions, Privileges, and Access Controls
14 % CWE-200 Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 1
Os 3
Os 1
Os 1
Os 2
Os 3
Os 1

Snort® IPS/IDS

Date Description
2016-06-07 Microsoft Windows win32kfull.sys device context use after free attempt
RuleID : 38809 - Revision : 2 - Type : OS-WINDOWS
2016-06-07 Microsoft Windows win32kfull.sys device context use after free attempt
RuleID : 38808 - Revision : 2 - Type : OS-WINDOWS
2016-06-07 Microsoft Windows NtGdiGetEmbUFI kernel information disclosure attempt
RuleID : 38802 - Revision : 2 - Type : OS-WINDOWS
2016-06-07 Microsoft Windows NtGdiGetEmbUFI kernel information disclosure attempt
RuleID : 38801 - Revision : 2 - Type : OS-WINDOWS
2016-06-07 Microsoft Windows Device Context bitmap use after free attempt
RuleID : 38788 - Revision : 2 - Type : OS-WINDOWS
2016-06-07 Microsoft Windows Device Context bitmap use after free attempt
RuleID : 38787 - Revision : 2 - Type : OS-WINDOWS
2016-06-07 Microsoft Windows device content surface bitmap use after free attempt
RuleID : 38775 - Revision : 2 - Type : OS-WINDOWS
2016-06-07 Microsoft Windows device content surface bitmap use after free attempt
RuleID : 38774 - Revision : 2 - Type : OS-WINDOWS
2016-06-07 Microsoft Windows Dxgkrnl.sys RtlMemoryCopy buffer overflow attempt
RuleID : 38766 - Revision : 2 - Type : OS-WINDOWS
2016-06-07 Microsoft Windows Dxgkrnl.sys RtlMemoryCopy buffer overflow attempt
RuleID : 38765 - Revision : 2 - Type : OS-WINDOWS
2016-06-07 Microsoft Windows win32kfull.sys font object use after free attempt
RuleID : 38762 - Revision : 2 - Type : OS-WINDOWS
2016-06-07 Microsoft Windows win32kfull.sys font object use after free attempt
RuleID : 38761 - Revision : 2 - Type : OS-WINDOWS
2016-06-07 Microsoft Windows Win32k window handle use after free attempt
RuleID : 38760 - Revision : 3 - Type : OS-WINDOWS
2016-06-07 Microsoft Windows Win32k window handle use after free attempt
RuleID : 38759 - Revision : 3 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2016-05-10 Name : The remote host is affected by multiple vulnerabilities.
File : smb_nt_ms16-062.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
Date Informations
2016-05-12 05:36:18
  • Multiple Updates
2016-05-11 13:27:29
  • Multiple Updates
2016-05-11 09:37:21
  • Multiple Updates
2016-05-10 21:38:07
  • Multiple Updates
2016-05-10 21:17:15
  • First insertion