MS16-091: Security Update for .NET Framework (3170048)

Medium Nessus Plugin ID 92022


The remote Windows host is affected by an information disclosure vulnerability.


The remote Windows host is missing a security update. It is, therefore, affected by an information disclosure vulnerability in .NET Framework due to improper processing of XML input containing a reference to an external entity. An unauthenticated, remote attacker can exploit this, via specially crafted XML data, to read arbitrary files.


Microsoft has released a set of patches for Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1.

See Also

Plugin Details

Severity: Medium

ID: 92022

File Name: smb_nt_ms16-091.nasl

Version: $Revision: 1.5 $

Type: local

Agent: windows

Published: 2016/07/12

Modified: 2017/07/12

Dependencies: 13855, 51351, 57033

Risk Information

Risk Factor: Medium


Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:microsoft:.net_framework

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/07/12

Vulnerability Publication Date: 2016/07/12

Reference Information

CVE: CVE-2016-3255

BID: 91601

OSVDB: 141419

MSFT: MS16-091

MSKB: 3163244, 3163246, 3163247, 3163250, 3163251, 3163291, 3163912, 3164023, 3164024, 3164025, 3172985

IAVB: 2016-B-0111