2016-01-12 This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker is able to log on to a target system and run a specially crafted application.
Vulnerabilities addressed in this bulletin:
DLL Loading Elevation of Privilege Vulnerability
Multiple elevation of privilege vulnerabilities exist when Windows improperly validates input before loading dynamic link library (DLL) files.
CVE-2016-0014
MAPI DLL Loading Elevation of Privilege Vulnerability
Multiple elevation of privilege vulnerabilities exist when Windows improperly validates input before loading dynamic link library (DLL) files.
CVE-2016-0020
DirectShow Heap Corruption Remote Code Execution Vulnerability
A remote code execution vulnerability exists when DirectShow improperly validates user input.
CVE-2016-0015
Windows DLL Loading Remote Code Execution Vulnerability
Multiple remote code execution vulnerabilities exist when Windows improperly validates input before loading dynamic link library (DLL) files.
CVE-2016-0016
Windows DLL Loading Remote Code Execution Vulnerability
Multiple remote code execution vulnerabilities exist when Windows improperly validates input before loading dynamic link library (DLL) files.
CVE-2016-0018
Windows Remote Desktop Protocol Security Bypass Vulnerability
A security feature bypass vulnerability exists in Windows Remote Desktop Protocol (RDP) that is caused when Windows 10 hosts running RDP services fail to prevent remote logon to accounts that have no passwords set.
CVE-2016-0019

Bulletin details at Microsoft.com

Related CVE Entries

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Elevation of Privilege Vulnerability."
Max CVSS
7.8
EPSS Score
0.06%
Published
2016-01-13
Updated
2019-05-16
DirectShow in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows 10 Gold and 1511 allows remote attackers to execute arbitrary code via a crafted file, aka "DirectShow Heap Corruption Remote Code Execution Vulnerability."
Max CVSS
9.3
EPSS Score
96.02%
Published
2016-01-13
Updated
2019-05-17
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Remote Code Execution Vulnerability."
Max CVSS
7.8
EPSS Score
60.16%
Published
2016-01-13
Updated
2019-05-15
Microsoft Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 R2, and Windows 10 Gold and 1511 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Remote Code Execution Vulnerability."
Max CVSS
7.3
EPSS Score
36.92%
Published
2016-01-13
Updated
2019-05-15
The Remote Desktop Protocol (RDP) service implementation in Microsoft Windows 10 Gold and 1511 allows remote attackers to bypass intended access restrictions and establish sessions for blank-password accounts via a modified RDP client, aka "Windows Remote Desktop Protocol Security Bypass Vulnerability."
Max CVSS
9.3
EPSS Score
0.64%
Published
2016-01-13
Updated
2018-10-30
Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "MAPI DLL Loading Elevation of Privilege Vulnerability."
Max CVSS
7.8
EPSS Score
0.05%
Published
2016-01-13
Updated
2018-10-12
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!