Executive Summary

Summary
Title Security Update for Windows Kernel (3186973)
Informations
Name MS16-111 First vendor Publication 2016-09-13
Vendor Microsoft Last vendor Modification 2017-07-11
Severity (Vendor) N/A Revision 2.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 4.6 Attack Range Local
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V2.0 (July 11, 2017): Revised Windows Affected Software and Vulnerability Severity Ratings table to include Windows 10 Version 1703 for 32-bit Systems and Windows 10 Version 1703 for x64-based Systems because they are affected by CVE-2016-3305. Microsoft recommends that customers running Windows 10 Version 1703 should install update 4025342 to be protected from this vulnerability.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application on a target system.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS16-111

CWE : Common Weakness Enumeration

% Id Name
40 % CWE-264 Permissions, Privileges, and Access Controls
40 % CWE-19 Data Handling
20 % CWE-200 Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1
Os 1
Os 1
Os 1
Os 2
Os 2
Os 2
Os 5
Os 2
Os 2

Snort® IPS/IDS

Date Description
2016-10-11 Microsoft Windows 10 and 8.1 registry key privilege escalation attempt
RuleID : 40128 - Revision : 2 - Type : OS-WINDOWS
2016-10-11 Microsoft Windows 10 and 8.1 registry key privilege escalation attempt
RuleID : 40127 - Revision : 2 - Type : OS-WINDOWS
2016-10-11 Microsoft Windows 10 privilege escalation attempt
RuleID : 40115 - Revision : 2 - Type : OS-WINDOWS
2016-10-11 Microsoft Windows 10 privilege escalation attempt
RuleID : 40114 - Revision : 2 - Type : OS-WINDOWS
2016-10-11 Microsoft Windows Server Ntoskrnl concurrent login attempt
RuleID : 40111 - Revision : 2 - Type : OS-WINDOWS
2016-10-11 Microsoft Windows Server Ntoskrnl concurrent login attempt
RuleID : 40110 - Revision : 2 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2016-09-13 Name : The remote host is affected by multiple vulnerabilities.
File : smb_nt_ms16-111.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2017-07-11 21:23:56
  • Multiple Updates
2017-07-11 21:16:39
  • Multiple Updates
2016-09-15 00:24:17
  • Multiple Updates
2016-09-14 17:25:25
  • Multiple Updates
2016-09-14 13:25:41
  • Multiple Updates
2016-09-13 21:25:59
  • Multiple Updates
2016-09-13 21:18:15
  • First insertion