Microsoft Windows Server 2008 SP2 and R2 SP1 and Windows Server 2012 Gold and R2 allow remote authenticated users to execute arbitrary code via a crafted NetLogon request, aka "Windows Netlogon Memory Corruption Remote Code Execution Vulnerability."
http://www.securitytracker.com/id/1036103
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-076
Source: MITRE
Published: 2016-06-16
Updated: 2019-05-08
Type: CWE-20
Base Score: 9
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
Impact Score: 10
Exploitability Score: 8
Severity: HIGH
Base Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 2.8
Severity: HIGH
OR
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
91604 | MS16-076: Security Update for Netlogon (3167691) | Nessus | Windows : Microsoft Bulletins | high |