Vulnerability Name: | CVE-2016-0099 (CCN-110974) | ||||||||||||
Assigned: | 2015-12-04 | ||||||||||||
Published: | 2016-03-08 | ||||||||||||
Updated: | 2018-10-12 | ||||||||||||
Summary: | The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka "Secondary Logon Elevation of Privilege Vulnerability." | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.2 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
8.2 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-0099 Source: CCN Type: Microsoft Security Bulletin MS16-032 Security Update to Secondary Logon to Address Elevation of Privilege (3143141) Source: BID Type: UNKNOWN 84034 Source: SECTRACK Type: UNKNOWN 1035210 Source: MS Type: UNKNOWN MS16-032 Source: XF Type: UNKNOWN ms-secondarylogon-cve20160099-priv-esc(110974) Source: CCN Type: Packet Storm Security [03-17-2016] Window Secondary Login Failed Sanitization Source: CCN Type: Packet Storm Security [07-12-2016] MS16-032 Secondary Logon Handle Privilege Escalation Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [03-21-2016] Source: EXPLOIT-DB Type: UNKNOWN 39574 Source: EXPLOIT-DB Type: UNKNOWN 39719 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [04-25-2016] Source: EXPLOIT-DB Type: UNKNOWN 39809 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [07-13-2016] Source: EXPLOIT-DB Type: UNKNOWN 40107 | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |