MS16-007 Security Update for Microsoft Windows to Address Remote Code Execution
2016-01-12 This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker is able to log on to a target system and run a specially crafted application.
Vulnerabilities addressed in this bulletin:
Bulletin details at Microsoft.com
Vulnerabilities addressed in this bulletin:
- DLL Loading Elevation of Privilege Vulnerability
- Multiple elevation of privilege vulnerabilities exist when Windows improperly validates input before loading dynamic link library (DLL) files.
CVE-2016-0014 - MAPI DLL Loading Elevation of Privilege Vulnerability
- Multiple elevation of privilege vulnerabilities exist when Windows improperly validates input before loading dynamic link library (DLL) files.
CVE-2016-0020 - DirectShow Heap Corruption Remote Code Execution Vulnerability
- A remote code execution vulnerability exists when DirectShow improperly validates user input.
CVE-2016-0015 - Windows DLL Loading Remote Code Execution Vulnerability
- Multiple remote code execution vulnerabilities exist when Windows improperly validates input before loading dynamic link library (DLL) files.
CVE-2016-0016 - Windows DLL Loading Remote Code Execution Vulnerability
- Multiple remote code execution vulnerabilities exist when Windows improperly validates input before loading dynamic link library (DLL) files.
CVE-2016-0018 - Windows Remote Desktop Protocol Security Bypass Vulnerability
- A security feature bypass vulnerability exists in Windows Remote Desktop Protocol (RDP) that is caused when Windows 10 hosts running RDP services fail to prevent remote logon to accounts that have no passwords set.
CVE-2016-0019
Bulletin details at Microsoft.com
Related CVE Entries
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Elevation of Privilege Vulnerability."
Max CVSS
7.8
EPSS Score
0.06%
Published
2016-01-13
Updated
2019-05-16
DirectShow in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted file, aka "DirectShow Heap Corruption Remote Code Execution Vulnerability."
Max CVSS
9.3
EPSS Score
96.02%
Published
2016-01-13
Updated
2019-05-17
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Remote Code Execution Vulnerability."
Max CVSS
7.8
EPSS Score
60.16%
Published
2016-01-13
Updated
2019-05-15
Microsoft Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 R2, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Remote Code Execution Vulnerability."
Max CVSS
7.3
EPSS Score
36.92%
Published
2016-01-13
Updated
2019-05-15
The Remote Desktop Protocol (RDP) service implementation in Microsoft Windows 10 Gold and 1511 allows remote attackers to bypass intended access restrictions and establish sessions for blank-password accounts via a modified RDP client, aka "Windows Remote Desktop Protocol Security Bypass Vulnerability."
Max CVSS
9.3
EPSS Score
0.64%
Published
2016-01-13
Updated
2018-10-30
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "MAPI DLL Loading Elevation of Privilege Vulnerability."
Max CVSS
7.8
EPSS Score
0.05%
Published
2016-01-13
Updated
2018-10-12