MS16-091: Security Update for .NET Framework (3170048)

high Nessus Plugin ID 92022

Synopsis

The remote Windows host is affected by an information disclosure vulnerability.

Description

The remote Windows host is missing a security update. It is, therefore, affected by an information disclosure vulnerability in .NET Framework due to improper processing of XML input containing a reference to an external entity. An unauthenticated, remote attacker can exploit this, via specially crafted XML data, to read arbitrary files.

Solution

Microsoft has released a set of patches for Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1.

See Also

https://www.nessus.org/u?19fc59fd

Plugin Details

Severity: High

ID: 92022

File Name: smb_nt_ms16-091.nasl

Version: 1.10

Type: local

Agent: windows

Published: 7/12/2016

Updated: 5/15/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2016-3255

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:.net_framework

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 7/12/2016

Vulnerability Publication Date: 7/12/2016

Reference Information

CVE: CVE-2016-3255

BID: 91601

IAVB: 2016-B-0111-S

MSFT: MS16-091

MSKB: 3163244, 3163246, 3163247, 3163250, 3163251, 3163291, 3163912, 3164023, 3164024, 3164025, 3172985