Rapid7 Vulnerability & Exploit Database

MS16-102: Security Update for Microsoft Windows PDF Library (3182248)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

MS16-102: Security Update for Microsoft Windows PDF Library (3182248)

Severity
9
CVSS
(AV:N/AC:M/Au:N/C:C/I:C/A:C)
Published
08/09/2016
Created
07/25/2018
Added
08/09/2016
Modified
11/18/2021

Description

A remote code execution vulnerability exists when Microsoft Windows PDF Library improperly handles objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Solution(s)

  • WINDOWS-HOTFIX-MS16-095-4d52d21e-e4a1-4043-bcda-69a696b2b257
  • WINDOWS-HOTFIX-MS16-095-57ee4145-570f-4d7a-bf61-361695d14534
  • WINDOWS-HOTFIX-MS16-095-7eab7ce1-623b-4135-afdd-ce45f1da11d2
  • WINDOWS-HOTFIX-MS16-095-9df36889-a57a-4b96-b461-8c4503c6aacc
  • WINDOWS-HOTFIX-MS16-102-04b277e8-3478-4faa-abd0-062036cf7371
  • WINDOWS-HOTFIX-MS16-102-38984dcd-719e-424b-b824-aebce3e37b46
  • WINDOWS-HOTFIX-MS16-102-60ac223b-746c-4eb5-a79b-490eebfa81d2
  • WINDOWS-HOTFIX-MS16-102-a43b279d-209b-42d4-9fd0-26a09b9df4de
  • WINDOWS-HOTFIX-MS16-102-a4b5e755-6fdf-4a50-a34f-deb2dea87d7c
  • WINDOWS-HOTFIX-MS16-102-ab69dab1-3a4e-4dfb-b64a-59d3e1687a33

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;