MS16-075: Security Update for Windows SMB Server (3164038)

high Nessus Plugin ID 91603


The remote Windows host is affected by an elevation of privilege vulnerability.


The remote Windows host is missing a security update. It is, therefore, affected by an elevation of privilege vulnerability in the Microsoft Server Message Block (SMB) server when handling forwarded credential requests that are intended for another service running on the same host. An authenticated attacker can exploit this, via a specially crafted application, to execute arbitrary code with elevated permissions.


Microsoft has released a set of patches for Windows Vista, 2008, 7, 2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and 10.

See Also

Plugin Details

Severity: High

ID: 91603

File Name: smb_nt_ms16-075.nasl

Version: 1.13

Type: local

Agent: windows

Published: 6/14/2016

Updated: 11/19/2019

Risk Information

CVSS Score Source: CVE-2016-3225


Risk Factor: Critical

Score: 9.4


Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.7

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:F/RL:OF/RC:C


Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/14/2016

Vulnerability Publication Date: 6/14/2016

Exploitable With

Core Impact

Metasploit (Windows Net-NTLMv2 Reflection DCOM/RPC (Juicy))

Reference Information

CVE: CVE-2016-3225

BID: 91080

MSFT: MS16-075

MSKB: 3161561, 3163017, 3163018

IAVA: 2016-A-0150