MS16-150: Security Update for Secure Kernel Mode (3205642)

High Nessus Plugin ID 95767


The remote host is affected by an elevation of privilege vulnerability.


The remote Windows host is missing a security update. It is, therefore, affected by an elevation of privilege vulnerability in Windows Secure Kernel Mode due to improper handling of objects in memory. A local attacker can exploit this, via a specially crafted application, to bypass virtual trust levels (VTL).


Microsoft has released a set of patches for Windows 10 and 2016.

See Also

Plugin Details

Severity: High

ID: 95767

File Name: smb_nt_ms16-150.nasl

Version: $Revision: 1.6 $

Type: local

Agent: windows

Published: 2016/12/13

Modified: 2017/11/28

Dependencies: 13855, 57033, 93962

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/12/13

Vulnerability Publication Date: 2016/12/13

Reference Information

CVE: CVE-2016-7271

BID: 94734

OSVDB: 148618

MSFT: MS16-150

MSKB: 3205383, 3205386, 3206632

IAVA: 2016-A-0348