Vulnerability Details : CVE-2016-3227
Use-after-free vulnerability in the DNS Server component in Microsoft Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted requests, aka "Windows DNS Server Use After Free Vulnerability."
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2016-3227
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:standard:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:datacenter:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:essentials:*:*:*
- cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-3227
37.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-3227
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
References for CVE-2016-3227
-
http://www.securitytracker.com/id/1036095
Microsoft DNS Server Use-After-Free Memory Error Lets Remote Users Execute Arbitrary Code on the Target System - SecurityTracker
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-071
Microsoft Security Bulletin MS16-071 - Critical | Microsoft Docs
Jump to