The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka "Secondary Logon Elevation of Privilege Vulnerability."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/84034 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1035210 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-032 - Patch, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/39574/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/39719/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/39809/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/40107/ - Exploit, Third Party Advisory, VDB Entry |
24 Jul 2024, 14:28
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:* |
CWE | CWE-120 | |
References | () http://www.securityfocus.com/bid/84034 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1035210 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-032 - Patch, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/39574/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/39719/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/39809/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/40107/ - Exploit, Third Party Advisory, VDB Entry | |
First Time |
Microsoft windows 10 1507
Microsoft windows 10 1511 |
Information
Published : 2016-03-09 11:59
Updated : 2024-11-21 02:41
NVD link : CVE-2016-0099
Mitre link : CVE-2016-0099
CVE.ORG link : CVE-2016-0099
JSON object : View
Products Affected
microsoft
- windows_10_1511
- windows_vista
- windows_10_1507
- windows_7
- windows_8.1
- windows_server_2012
- windows_server_2008
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')