MS16-065: Security Update for .NET Framework (3156757)

medium Nessus Plugin ID 91014


The remote Windows host is affected by an information disclosure vulnerability.


The remote Windows host is missing a security update. It is, therefore, affected by an information disclosure vulnerability in the .NET Framework encryption component. A man-in-the-middle attacker can exploit this vulnerability by injecting unencrypted data into the secure channel between a targeted client and a legitimate server, allowing the attacker to decrypt encrypted SSL/TLS traffic.


Microsoft has released a set of patches for Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1.

See Also

Plugin Details

Severity: Medium

ID: 91014

File Name: smb_nt_ms16-065.nasl

Version: 1.11

Type: local

Agent: windows

Published: 5/10/2016

Updated: 5/15/2020

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2016-0149


Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:.net_framework

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 5/10/2016

Vulnerability Publication Date: 5/10/2016

Reference Information

CVE: CVE-2016-0149

BID: 90026

IAVB: 2016-B-0087-S

MSFT: MS16-065

MSKB: 3142023, 3142024, 3142025, 3142026, 3142030, 3142032, 3142033, 3142035, 3142036, 3142037, 3156387, 3156421