CVE-2016-0145

Published on: 04/12/2016 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:13 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Certain versions of .net Framework from Microsoft contain the following vulnerability:

The font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold and 1511; Office 2007 SP3 and 2010 SP2; Word Viewer; .NET Framework 3.0 SP2, 3.5, and 3.5.1; Skype for Business 2016; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."

  • CVE-2016-0145 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 8.8 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE REQUIRED
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED HIGH HIGH HIGH

CVSS2 Score: 9.3 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
COMPLETE COMPLETE COMPLETE

CVE References

Description Tags Link
Microsoft Windows Kernel - 'win32k.sys' TTF Processing EBLC / EBSC Tables Pool Corruption (MS16-039) - Windows dos Exploit www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 39743
Microsoft .NET Embedded Font File File Processing Flaw Lets Remote Users Execute Arbitrary Code - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035529
Microsoft Lync File Embedded Font File Processing Flaw Lets Remote Users Execute Arbitrary Code - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035530
Microsoft Office Embedded Font File File Processing Flaw Lets Remote Users Execute Arbitrary Code - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035528
Microsoft Skype for Business Embedded Font File Processing Flaw Lets Remote Users Execute Arbitrary Code - SecurityTracker www.securitytracker.com
text/html
URL Logo SECTRACK 1035531
Windows Kernel 'win32k.sys' Bugs Let Local Users Gain Elevated Privileges and Remote Users Execute Arbitrary Code - SecurityTracker Third Party Advisory
www.securitytracker.com
text/html
URL Logo SECTRACK 1035532
Microsoft Security Bulletin MS16-039 - Critical | Microsoft Docs docs.microsoft.com
text/html
URL Logo MS MS16-039

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationMicrosoft.net Framework3.0sp2AllAll
ApplicationMicrosoft.net Framework3.5AllAllAll
ApplicationMicrosoft.net Framework3.5.1AllAllAll
ApplicationMicrosoft.net Framework3.0sp2AllAll
ApplicationMicrosoft.net Framework3.5AllAllAll
ApplicationMicrosoft.net Framework3.5.1AllAllAll
ApplicationMicrosoftLive Meeting2007AllAllAll
ApplicationMicrosoftLive Meeting2007AllAllAll
ApplicationMicrosoftLync2010AllAllAll
ApplicationMicrosoftLync2010AllattendeeAll
ApplicationMicrosoftLync2013sp1AllAll
ApplicationMicrosoftLync2010AllAllAll
ApplicationMicrosoftLync2010AllattendeeAll
ApplicationMicrosoftLync2013sp1AllAll
ApplicationMicrosoftOffice2007sp3AllAll
ApplicationMicrosoftOffice2010sp2AllAll
ApplicationMicrosoftOffice2007sp3AllAll
ApplicationMicrosoftOffice2010sp2AllAll
ApplicationMicrosoftSkype For Business2016AllAllAll
ApplicationMicrosoftSkype For Business2016AllAllAll
Operating
System
MicrosoftWindows 10-AllAllAll
Operating
System
MicrosoftWindows 101511AllAllAll
Operating
System
MicrosoftWindows 10-AllAllAll
Operating
System
MicrosoftWindows 101511AllAllAll
Operating
System
MicrosoftWindows 7-sp1AllAll
Operating
System
MicrosoftWindows 7-sp1AllAll
Operating
System
MicrosoftWindows 8.1AllAllAllAll
Operating
System
MicrosoftWindows 8.1AllAllAllAll
Operating
System
MicrosoftWindows Rt 8.1-AllAllAll
Operating
System
MicrosoftWindows Rt 8.1-AllAllAll
Operating
System
MicrosoftWindows Server 2008-sp2AllAll
Operating
System
MicrosoftWindows Server 2008r2sp1AllAll
Operating
System
MicrosoftWindows Server 2008-sp2AllAll
Operating
System
MicrosoftWindows Server 2008r2sp1AllAll
Operating
System
MicrosoftWindows Server 2012-AllAllAll
Operating
System
MicrosoftWindows Server 2012r2AllAllAll
Operating
System
MicrosoftWindows Server 2012-AllAllAll
Operating
System
MicrosoftWindows Server 2012r2AllAllAll
Operating
System
MicrosoftWindows VistaAllsp2AllAll
Operating
System
MicrosoftWindows VistaAllsp2AllAll
ApplicationMicrosoftWord ViewerAllAllAllAll
ApplicationMicrosoftWord ViewerAllAllAllAll
  • cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:live_meeting:2007:*:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:live_meeting:2007:*:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:lync:2010:*:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:lync:2010:*:attendee:*:*:*:*:*:
  • cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:lync:2010:*:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:lync:2010:*:attendee:*:*:*:*:*:
  • cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:skype_for_business:2016:*:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:skype_for_business:2016:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*:
  • cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*: