Executive Summary

Summary
Title Security Update for Windows Kernel-Mode Drivers (3192892)
Informations
Name MS16-123 First vendor Publication 2016-10-11
Vendor Microsoft Last vendor Modification 2017-09-12
Severity (Vendor) N/A Revision 3.0

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Important
Revision Note: V3.0 (September 12, 2017): Revised the Affected Software table to include Windows 10 Version 1703 for 32-bit Systems and Windows 10 Version 1703 for x64-based Systems because they are affected by CVE-2016-3376. Consumers using Windows 10 are automatically protected. Microsoft recommends that enterprise customers running Windows 10 Version 1703 ensure they have update 4038788 installed to be protected from this vulnerability.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.

Original Source

Url : https://technet.microsoft.com/en-us/library/security/MS16-123

CWE : Common Weakness Enumeration

% Id Name
83 % CWE-264 Permissions, Privileges, and Access Controls
17 % CWE-287 Improper Authentication

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 18
Os 3
Os 1
Os 1
Os 1
Os 2
Os 2
Os 1

Snort® IPS/IDS

Date Description
2016-11-08 Microsoft Windows DFS client driver privilege escalation attempt
RuleID : 40419 - Revision : 2 - Type : OS-WINDOWS
2016-11-08 Microsoft Windows DFS client driver privilege escalation attempt
RuleID : 40418 - Revision : 2 - Type : OS-WINDOWS
2016-11-08 Microsoft Windows Ntoskrnl privilege escalation attempt
RuleID : 40393 - Revision : 2 - Type : OS-WINDOWS
2016-11-08 Microsoft Windows Ntoskrnl privilege escalation attempt
RuleID : 40392 - Revision : 2 - Type : OS-WINDOWS
2016-11-08 Microsoft Windows win32kfull.sys FBitsTouch use after free attempt
RuleID : 40381 - Revision : 3 - Type : OS-WINDOWS
2016-11-08 Microsoft Windows win32kfull.sys FBitsTouch use after free attempt
RuleID : 40380 - Revision : 3 - Type : OS-WINDOWS
2016-11-08 Microsoft GDI local privilege escalation attempt
RuleID : 40377 - Revision : 2 - Type : OS-WINDOWS
2016-11-08 Microsoft GDI local privilege escalation attempt
RuleID : 40376 - Revision : 2 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2016-10-12 Name : The remote host is affected by multiple vulnerabilities.
File : smb_nt_ms16-123.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
Date Informations
2017-09-13 17:23:10
  • Multiple Updates
2017-09-13 17:18:06
  • Multiple Updates
2016-12-13 21:26:51
  • Multiple Updates
2016-12-13 21:19:06
  • Multiple Updates
2016-10-17 21:26:13
  • Multiple Updates
2016-10-14 09:25:22
  • Multiple Updates
2016-10-13 13:25:06
  • Multiple Updates
2016-10-12 05:24:22
  • Multiple Updates
2016-10-12 05:16:54
  • Multiple Updates
2016-10-11 21:24:37
  • Multiple Updates
2016-10-11 21:18:30
  • First insertion