Rapid7 Vulnerability & Exploit Database

MS16-039: CVE-2016-0167: Security Update for Microsoft Graphics Component (3148522)

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

MS16-039: CVE-2016-0167: Security Update for Microsoft Graphics Component (3148522)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
04/12/2016
Created
07/25/2018
Added
04/12/2016
Modified
07/21/2023

Description

Elevation of privilege vulnerabilities exist when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerabilities could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Solution(s)

  • WINDOWS-HOTFIX-MS16-037-1f7b2d51-98a1-4240-a636-8096fa0308c3
  • WINDOWS-HOTFIX-MS16-037-34515df7-3d11-4fa9-98ad-77c6f0dafc2a
  • WINDOWS-HOTFIX-MS16-037-45da2895-fcf0-4175-a533-e0fda3dbc081
  • WINDOWS-HOTFIX-MS16-037-4d0814f6-9f22-43aa-b23c-f6243b1e1f4a
  • WINDOWS-HOTFIX-MS16-039-093d54fd-35cd-4271-a51b-5ab0eb47ba96
  • WINDOWS-HOTFIX-MS16-039-0a7a0d55-de2a-4446-90f7-2fa2f36ecc47
  • WINDOWS-HOTFIX-MS16-039-0b8bf296-fad8-4bb1-b39c-c1643a2734e7
  • WINDOWS-HOTFIX-MS16-039-0c43f9c0-716a-43ee-9b76-d453567c31a5
  • WINDOWS-HOTFIX-MS16-039-194b9cc4-5e67-469d-9ac4-01224dae0b6a
  • WINDOWS-HOTFIX-MS16-039-2f47e99a-09c4-4fdc-9ab8-46c522c6bf84
  • WINDOWS-HOTFIX-MS16-039-2fa6649a-52e7-4e20-9d1b-6992ae49c41d
  • WINDOWS-HOTFIX-MS16-039-3ced2cc8-893e-4e58-a34d-d10a2b3cb470
  • WINDOWS-HOTFIX-MS16-039-3cef1f71-f2d8-4a0c-a123-28a35f1d168e
  • WINDOWS-HOTFIX-MS16-039-4cf5d223-80b5-4860-9a42-3c7236788715
  • WINDOWS-HOTFIX-MS16-039-4f6b8f10-e598-481c-b148-9aefacdfea0d
  • WINDOWS-HOTFIX-MS16-039-562b8e6d-b2eb-4b1d-8826-b4f1f0781b50
  • WINDOWS-HOTFIX-MS16-039-5b812a5c-1652-4e81-8921-f7f362e8ae30
  • WINDOWS-HOTFIX-MS16-039-67d3a957-35b0-4fcc-b4e5-7898a34858d1
  • WINDOWS-HOTFIX-MS16-039-68a7afa5-8f43-4d43-97f7-d98b2d445d5a
  • WINDOWS-HOTFIX-MS16-039-6c53af9c-0340-490e-835e-1bdacc24a587
  • WINDOWS-HOTFIX-MS16-039-7140f09a-1659-421d-af9a-e5697cf1d4ae
  • WINDOWS-HOTFIX-MS16-039-793152ef-d100-4814-8e39-bd0e3d69097a
  • WINDOWS-HOTFIX-MS16-039-8847f0b0-086e-4eb5-9884-6001b2891920
  • WINDOWS-HOTFIX-MS16-039-8a6087b0-88b6-44d8-9dcc-3a2c865e46ba
  • WINDOWS-HOTFIX-MS16-039-9713aa2c-f856-4947-8a48-8023fbadcd1e
  • WINDOWS-HOTFIX-MS16-039-982737b3-b7a2-460b-a479-9998d1c059c2
  • WINDOWS-HOTFIX-MS16-039-9887f9f9-987c-4079-aed3-573193d7c63b
  • WINDOWS-HOTFIX-MS16-039-a0e77d95-8138-4da1-b6f3-aa7d13bb813c
  • WINDOWS-HOTFIX-MS16-039-a630f3f3-3309-4381-9459-80554fadf599
  • WINDOWS-HOTFIX-MS16-039-aa58be5e-7672-45af-bd91-169d6d5fd36a
  • WINDOWS-HOTFIX-MS16-039-adef8255-ad2b-471a-88f1-ca4fb8ef5587
  • WINDOWS-HOTFIX-MS16-039-b02e0110-cb1a-4f6b-b683-d90a1e647441
  • WINDOWS-HOTFIX-MS16-039-b6465501-fed8-48a7-b246-2a5f31ee28f0
  • WINDOWS-HOTFIX-MS16-039-bd880597-9e6e-4a82-9c3d-c728d9538cf1
  • WINDOWS-HOTFIX-MS16-039-ca65ddc3-72d2-4d6d-b993-ba4d253e0f75
  • WINDOWS-HOTFIX-MS16-039-cb8137e4-1340-423a-b878-75f82c6ce5f3
  • WINDOWS-HOTFIX-MS16-039-ce29092c-6667-43f2-93a3-b41ef725da04
  • WINDOWS-HOTFIX-MS16-039-e539b5df-f68f-4778-8c5c-462f2a4c12fa
  • WINDOWS-HOTFIX-MS16-039-e548aef8-bc2e-4508-a8cd-97d095668433
  • WINDOWS-HOTFIX-MS16-039-e59da614-abc1-4bfc-949a-72c97278fd94
  • WINDOWS-HOTFIX-MS16-039-e705e270-e937-4a0b-bd2c-57bb7b6165eb
  • WINDOWS-HOTFIX-MS16-039-e9bbce81-3d7e-4269-abb3-c98d0e5d40f6
  • WINDOWS-HOTFIX-MS16-039-e9f8016e-4f6a-45ca-b4b8-7f19a623c0dc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;