VID |
26764 |
Severity |
40 |
Port |
139,445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
The Hotfix (MS16-048, 3148528) for 'Security Update for CSRSS' has not been applied. This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker logs on to a target system and runs a specially crafted application.
Windows CSRSS Security Feature Bypass Vulnerability - CVE-2016-0151 A security feature bypass vulnerability exists in Microsoft Windows when the Client-Server Run-time Subsystem (CSRSS) fails to properly manage process tokens in memory.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: https://technet.microsoft.com/en-us/library/security/ms16-048
* Platforms Affected: Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows 10 |
Recommendation |
Apply the appropriate patch(3148528) for your system, as listed in Microsoft Security Bulletin MS16-048 at https://technet.microsoft.com/en-us/library/security/ms16-048 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2016-0151 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|