Дата обнаружения
|
14/06/2016 |
Уровень угрозы
|
Critical |
Описание
|
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, perform cross-site scripting attack. Below is a complete list of vulnerabilities:
|
Эксплуатация
|
The following public exploits exists for this vulnerability: https://www.exploit-db.com/exploits/39994 https://www.exploit-db.com/exploits/39991 https://www.exploit-db.com/exploits/39990 https://www.exploit-db.com/exploits/45562 https://www.exploit-db.com/exploits/40219 Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Пораженные продукты
|
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) |
Решение
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Первичный источник обнаружения
|
CVE-2016-3213 CVE-2016-3216 CVE-2016-3228 CVE-2016-0200 CVE-2016-3225 CVE-2016-3223 CVE-2016-3221 CVE-2016-3220 CVE-2016-3212 CVE-2016-0199 CVE-2016-3211 CVE-2016-3205 CVE-2016-3236 CVE-2016-3207 CVE-2016-3206 CVE-2016-3299 CVE-2016-3218 |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
PE
[?]
XSS/CSS
[?]
|
Связанные продукты
|
Microsoft Internet Explorer Microsoft Windows Microsoft Windows Server Microsoft Windows Vista Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows Server 2008 Windows RT Microsoft Windows 10 |
CVE-IDS
|
CVE-2016-32077.6Critical
CVE-2016-32067.6Critical CVE-2016-32057.6Critical CVE-2016-32139.3Critical CVE-2016-32124.3Warning CVE-2016-32119.3Critical CVE-2016-01999.3Critical CVE-2016-02009.3Critical CVE-2016-32206.9High CVE-2016-32186.9High CVE-2016-32164.3Warning CVE-2016-32994.3Warning CVE-2016-32289.0Critical CVE-2016-32256.9High CVE-2016-32239.3Critical CVE-2016-32216.9High |
KB list
|