MS16-006: Security Update for Silverlight to Address Remote Code Execution (3126036) (Mac OS X)

High Nessus Plugin ID 87874


A multimedia application framework installed on the remote Mac OS X host is affected by a remote code execution vulnerability.


The version of Microsoft Silverlight installed on the remote Mac OS X host is affected by a remote code execution vulnerability due to a flaw that allows strings to be decoded by a malicious decoder that returns negative offsets. An unauthenticated, remote attacker can exploit this vulnerability, by convincing a user to visit a website containing a specially crafted Silverlight application, to replace object headers with contents provided by the attacker, resulting in the execution of arbitrary code in the context of the current user.


Microsoft has released a set of patches for Silverlight 5.

See Also

Plugin Details

Severity: High

ID: 87874

File Name: macosx_ms16-006.nasl

Version: $Revision: 1.8 $

Type: local

Agent: macosx

Published: 2016/01/12

Modified: 2017/08/30

Dependencies: 58091

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:microsoft:silverlight

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, MacOSX/Silverlight/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/01/12

Vulnerability Publication Date: 2016/01/12

Exploitable With


Reference Information

CVE: CVE-2016-0034

OSVDB: 132791

MSFT: MS16-006

MSKB: 3126036