CVE-2016-0099

The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka "Secondary Logon Elevation of Privilege Vulnerability."
References
Link Resource
http://www.securityfocus.com/bid/84034 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1035210 Broken Link Third Party Advisory VDB Entry
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-032 Patch Vendor Advisory
https://www.exploit-db.com/exploits/39574/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/39719/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/39809/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/40107/ Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/84034 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1035210 Broken Link Third Party Advisory VDB Entry
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-032 Patch Vendor Advisory
https://www.exploit-db.com/exploits/39574/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/39719/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/39809/ Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/40107/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*

History

21 Nov 2024, 02:41

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/84034 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/84034 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1035210 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1035210 - Broken Link, Third Party Advisory, VDB Entry
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-032 - Patch, Vendor Advisory () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-032 - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/39574/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/39574/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/39719/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/39719/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/39809/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/39809/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/40107/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/40107/ - Exploit, Third Party Advisory, VDB Entry

24 Jul 2024, 14:28

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*
CWE CWE-264 CWE-120
References () http://www.securityfocus.com/bid/84034 - () http://www.securityfocus.com/bid/84034 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1035210 - () http://www.securitytracker.com/id/1035210 - Broken Link, Third Party Advisory, VDB Entry
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-032 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-032 - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/39574/ - () https://www.exploit-db.com/exploits/39574/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/39719/ - () https://www.exploit-db.com/exploits/39719/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/39809/ - () https://www.exploit-db.com/exploits/39809/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/40107/ - () https://www.exploit-db.com/exploits/40107/ - Exploit, Third Party Advisory, VDB Entry
First Time Microsoft windows 10 1507
Microsoft windows 10 1511

Information

Published : 2016-03-09 11:59

Updated : 2024-11-21 02:41


NVD link : CVE-2016-0099

Mitre link : CVE-2016-0099

CVE.ORG link : CVE-2016-0099


JSON object : View

Products Affected

microsoft

  • windows_10_1511
  • windows_vista
  • windows_10_1507
  • windows_7
  • windows_8.1
  • windows_server_2012
  • windows_server_2008
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')