MS16-137: Security Update for Windows Authentication Methods (3199173)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote Windows host is affected multiple vulnerabilities.

Description :

The remote Windows host is missing a security update. It is,
therefore, affected by multiple vulnerabilities :

- An information disclosure vulnerability exists in
Windows Virtual Secure Mode due to improper handling of
objects in memory. An authenticated, remote attacker can
exploit this, via a specially crafted application, to
disclose sensitive information. (CVE-2016-7220)

- A denial of service vulnerability exists in the Local
Security Authority Subsystem Service (LSASS) when
handling specially crafted requests. An authenticated,
remote attacker can exploit this to cause the host to
become non-responsive. (CVE-2016-7237)

- An elevation of privilege vulnerability exists due to
improper handling of NTLM password change requests. An
authenticated, remote attacker can exploit this, via a
specially crafted application, to gain administrative
privileges. (CVE-2016-7238)

See also :

https://technet.microsoft.com/library/security/MS16-137

Solution :

Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10, and 2016.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)
CVSS Temporal Score : 7.4
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 94638 ()

Bugtraq ID: 94036
94040
94045

CVE ID: CVE-2016-7220
CVE-2016-7237
CVE-2016-7238

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now