MS16-007: Security Update for Microsoft Windows to Address Remote Code Execution (3124901)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host is affected by multiple vulnerabilities.

Description :

The remote Windows host is missing a security update. It is,
therefore, affected by multiple vulnerabilities :

- Multiple elevation of privilege vulnerabilities exist
due to improper validation of user-supplied input before
loading DLL files. A local attacker can exploit these,
via a crafted application, to elevate their privileges
and take control of the affected system. (CVE-2016-0014,
CVE-2016-0020)

- A remote code execution vulnerability exists in
DirectShow due to improper validation of user-supplied
input. A remote attacker can exploit this, by convincing
a user to open a specially crafted file, to execute
arbitrary code in the context of the current user,
resulting in taking control of the affected system.
(CVE-2016-0015)

- Multiple remote code execution vulnerabilities exist
due to improper validation of user-supplied input before
loading DLL files. A local attacker can exploit these,
via a specially crafted application, to execute
arbitrary code. (CVE-2016-0016, CVE-2016-0018)

- A security bypass vulnerability exists in the Windows
Remote Desktop Protocol (RDP) due to a failure to
prevent remote logons to accounts that have no passwords
set. A remote attacker can exploit this, by using an
older version of the RDP client to connect to a Windows
10 host, to generate a list of user accounts.
(CVE-2016-0019)

See also :

https://technet.microsoft.com/library/security/MS16-007

Solution :

Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2, and 10.

Note that Windows 10 with Citrix XenDesktop installed will not be
offered the patch due to an issue with the XenDesktop software that
prevents users from logging on when the patch is applied. To apply the
patch you must first uninstall XenDesktop or contact Citrix for help
with the issue.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 87890 ()

Bugtraq ID: 79896
79900
79902
79906
79908
79909

CVE ID: CVE-2016-0014
CVE-2016-0015
CVE-2016-0016
CVE-2016-0018
CVE-2016-0019
CVE-2016-0020

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now