MS16-005: Security Update for Windows Kernel-Mode Drivers to Address Remote Code Execution (3124584)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.

Synopsis :

The remote Windows host is affected by multiple vulnerabilities.

Description :

The remote Windows host is missing a security update. It is,
therefore, affected by multiple vulnerabilities :

- An information disclosure vulnerability exists in the
Windows graphics device interface due to improper
handling of objects in memory. An attacker can exploit
this to bypass the Address Space Layout Randomization
(ASLR) feature, resulting in the ability to predict
memory offsets in a call stack. (CVE-2016-0008)

- A remote code execution vulnerability exists due to
improper handling of objects in memory. An attacker can
exploit this vulnerability by convincing a user to visit
a specially crafted website, resulting in execution of
arbitrary code in the context of the current user.

See also :

Solution :

Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 8, RT, 2012, 8.1, RT 8.1, 2012 R2, and 10.

Note that Windows 10 with Citrix XenDesktop installed will not be
offered the patch due to an issue with the XenDesktop software that
prevents users from logging on when the patch is applied. To apply the
patch you must first uninstall XenDesktop or contact Citrix for help
with the issue.

Risk factor :

High / CVSS Base Score : 7.2
CVSS Temporal Score : 5.3
Public Exploit Available : false

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 87892 ()

Bugtraq ID: 79885

CVE ID: CVE-2016-0008

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now