Rapid7 Vulnerability & Exploit Database

MS16-025: Security Update for Windows Library Loading to Address Remote Code Execution (3140709)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

MS16-025: Security Update for Windows Library Loading to Address Remote Code Execution (3140709)

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
03/08/2016
Created
07/25/2018
Added
03/08/2016
Modified
06/26/2020

Description

A remote code execution vulnerability exists when Microsoft Windows fails to properly validate input before loading certain libraries. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Solution(s)

  • WINDOWS-HOTFIX-MS16-025-31674cd7-a9a7-4287-b184-493e7c7433c8
  • WINDOWS-HOTFIX-MS16-025-383c6b2c-c18f-46e3-bcc2-c52e0c8e38ab
  • WINDOWS-HOTFIX-MS16-025-a53db68a-9382-4f1e-aa80-776abdef1eed
  • WINDOWS-HOTFIX-MS16-025-c53d77bf-f428-462e-82b9-f402295fce17
  • WINDOWS-HOTFIX-MS16-025-de4bef0a-c6b0-4a4b-a6e7-aef511eb1ca9
  • WINDOWS-HOTFIX-MS16-025-eefbe78d-a724-4407-9f3a-70f8ce205b0b

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;