Vulnerability Name:

CVE-2016-0148 (CCN-111859)

Assigned:2015-12-04
Published:2016-04-12
Updated:2018-10-12
Summary:Microsoft .NET Framework 4.6 and 4.6.1 mishandles library loading, which allows local users to gain privileges via a crafted application, aka ".NET Framework Remote Code Execution Vulnerability."
CVSS v3 Severity:7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): 
Attack Complexity (AC): 
Privileges Required (PR): 
User Interaction (UI): 
Scope:Scope (S): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
8.0 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)
7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): 
Attack Complexity (AC): 
Privileges Required (PR): 
User Interaction (UI): 
Scope:Scope (S): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-264
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2016-0148

Source: MISC
Type: UNKNOWN
http://packetstormsecurity.com/files/136671/.NET-Framework-4.6-DLL-Hijacking.html

Source: FULLDISC
Type: Mailing List, Third Party Advisory
20160412 .NET Framework 4.6 allows side loading of Windows API Set DLL

Source: CCN
Type: Microsoft Security Bulletin MS16-041
Security Update for .NET Framework (3148789)

Source: BUGTRAQ
Type: UNKNOWN
20160412 .NET Framework 4.6 allows side loading of Windows API Set DLL

Source: SECTRACK
Type: Third Party Advisory
1035535

Source: MISC
Type: Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-16-234

Source: MS
Type: UNKNOWN
MS16-041

Source: XF
Type: UNKNOWN
ms-dotnet-cve20160148-code-exec(111859)

Source: CCN
Type: ZDI-16-234
Microsoft .NET Framework mscoreei DLL Planting Remote Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*
  • OR cpe:/a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2016-0148 (CCN-111861)

    Assigned:2015-12-04
    Published:2016-04-12
    Updated:2018-10-12
    Summary:Microsoft .NET Framework 4.6 and 4.6.1 mishandles library loading, which allows local users to gain privileges via a crafted application, aka ".NET Framework Remote Code Execution Vulnerability."
    CVSS v3 Severity:7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
    6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
    Exploitability Metrics:Attack Vector (AV): 
    Attack Complexity (AC): 
    Privileges Required (PR): 
    User Interaction (UI): 
    Scope:Scope (S): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    8.0 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)
    7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
    Exploitability Metrics:Attack Vector (AV): 
    Attack Complexity (AC): 
    Privileges Required (PR): 
    User Interaction (UI): 
    Scope:Scope (S): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
    Exploitability Metrics:Access Vector (AV): Local
    Access Complexity (AC): Low
    Authentication (Au): None
    Impact Metrics:Confidentiality (C): Complete
    Integrity (I): Complete
    Availibility (A): Complete
    9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C)
    Exploitability Metrics:Access Vector (AV): Network
    Access Complexity (AC): Low
    Athentication (Au): Single_Instance
    Impact Metrics:Confidentiality (C): Complete
    Integrity (I): Complete
    Availibility (A): Complete
    Vulnerability Type:CWE-264
    Vulnerability Consequences:Gain Access
    References:Source: MITRE
    Type: CNA
    CVE-2016-0148

    Source: CCN
    Type: Microsoft Security Bulletin MS16-041
    Security Update for .NET Framework (3148789)

    Source: CCN
    Type: IBM X-Force Exchange Vulnerability Report
    Microsoft .NET Framework code execution

    Source: XF
    Type: UNKNOWN
    win-ms16kb3148789-update(111861)

    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.cisecurity:def:499
    V
    .NET Framework Remote Code Execution Vulnerability - CVE-2016-0148 (MS16-041)
    2016-06-13
    BACK
    microsoft .net framework 4.6
    microsoft .net framework 4.6.1
    microsoft .net framework 4.6
    microsoft .net framework 4.6.1