Vulnerabilities > CVE-2016-0034 - Unspecified vulnerability in Microsoft Silverlight

047910
CVSS 8.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
microsoft
nessus

Summary

Microsoft Silverlight 5 before 5.1.41212.0 mishandles negative offsets during decoding, which allows remote attackers to execute arbitrary code or cause a denial of service (object-header corruption) via a crafted web site, aka "Silverlight Runtime Remote Code Execution Vulnerability."

Msbulletin

bulletin_idMS16-006
bulletin_url
date2016-01-12T00:00:00
impactRemote Code Execution
knowledgebase_id3126036
knowledgebase_url
severityCritical
titleSecurity Update for Silverlight to Address Remote Code Execution

Nessus

  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_MS16-006.NASL
    descriptionThe version of Microsoft Silverlight installed on the remote Mac OS X host is affected by a remote code execution vulnerability due to a flaw that allows strings to be decoded by a malicious decoder that returns negative offsets. An unauthenticated, remote attacker can exploit this vulnerability, by convincing a user to visit a website containing a specially crafted Silverlight application, to replace object headers with contents provided by the attacker, resulting in the execution of arbitrary code in the context of the current user.
    last seen2020-06-01
    modified2020-06-02
    plugin id87874
    published2016-01-12
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87874
    titleMS16-006: Security Update for Silverlight to Address Remote Code Execution (3126036) (Mac OS X)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(87874);
      script_version("1.11");
      script_cvs_date("Date: 2019/11/22");
    
      script_cve_id("CVE-2016-0034");
      script_xref(name:"MSFT", value:"MS16-006");
      script_xref(name:"MSKB", value:"3126036");
    
      script_name(english:"MS16-006: Security Update for Silverlight to Address Remote Code Execution (3126036) (Mac OS X)");
      script_summary(english:"Checks the version of Microsoft Silverlight.");
    
      script_set_attribute(attribute:"synopsis", value:
    "A multimedia application framework installed on the remote Mac OS X
    host is affected by a remote code execution vulnerability.");
      script_set_attribute(attribute:"description", value:
    "The version of Microsoft Silverlight installed on the remote Mac OS X
    host is affected by a remote code execution vulnerability due to a
    flaw that allows strings to be decoded by a malicious decoder that
    returns negative offsets. An unauthenticated, remote attacker can
    exploit this vulnerability, by convincing a user to visit a website
    containing a specially crafted Silverlight application, to replace
    object headers with contents provided by the attacker, resulting in
    the execution of arbitrary code in the context of the current user.");
      script_set_attribute(attribute:"see_also", value:"http://technet.microsoft.com/en-us/security/bulletin/ms16-006");
      script_set_attribute(attribute:"solution", value:
    "Microsoft has released a set of patches for Silverlight 5.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-0034");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'CANVAS');
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2016/01/12");
      script_set_attribute(attribute:"patch_publication_date", value:"2016/01/12");
      script_set_attribute(attribute:"plugin_publication_date", value:"2016/01/12");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:silverlight");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"MacOS X Local Security Checks");
    
      script_copyright(english:"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("macosx_silverlight_installed.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/MacOSX/Version", "MacOSX/Silverlight/Installed");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    kb_base = "MacOSX/Silverlight";
    get_kb_item_or_exit(kb_base+"/Installed");
    path = get_kb_item_or_exit(kb_base+"/Path", exit_code:1);
    version = get_kb_item_or_exit(kb_base+"/Version", exit_code:1);
    
    
    bulletin = "MS16-006";
    kb = "3126036";
    
    fixed_version = "5.1.41212.0";
    if (version =~ "^5\." && ver_compare(ver:version, fix:fixed_version, strict:FALSE) < 0)
    {
      if (defined_func("report_xml_tag")) report_xml_tag(tag:bulletin, value:kb);
    
      if (report_verbosity > 0)
      {
        report =
          '\n  Path              : ' + path +
          '\n  Installed version : ' + version +
          '\n  Fixed version     : ' + fixed_version +
          '\n';
        security_hole(port:0, extra:report);
      }
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_INST_VER_NOT_VULN, "Microsoft Silverlight", version);
    
  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS16-006.NASL
    descriptionThe version of Microsoft Silverlight installed on the remote Windows host is affected by a remote code execution vulnerability due to a flaw that allows strings to be decoded by a malicious decoder that returns negative offsets. An unauthenticated, remote attacker can exploit this vulnerability, by convincing a user to visit a website containing a specially crafted Silverlight application, to replace object headers with contents provided by the attacker, resulting in the execution of arbitrary code in the context of the current user.
    last seen2020-06-01
    modified2020-06-02
    plugin id87880
    published2016-01-12
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87880
    titleMS16-006: Security Update for Silverlight to Address Remote Code Execution (3126036)

The Hacker News

idTHN:48EB36B9BBEE6D28A599E0C7CE3BA0C9
last seen2018-01-27
modified2017-06-14
published2017-06-14
reporterSwati Khandelwal
sourcehttps://thehackernews.com/2017/06/north-korea-hacking-malware.html
titleUS Warns of 'DeltaCharlie' – A North Korean DDoS Botnet Malware