Vulnerabilities > CVE-2016-0034 - Unspecified vulnerability in Microsoft Silverlight
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Microsoft Silverlight 5 before 5.1.41212.0 mishandles negative offsets during decoding, which allows remote attackers to execute arbitrary code or cause a denial of service (object-header corruption) via a crafted web site, aka "Silverlight Runtime Remote Code Execution Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 10 |
Msbulletin
bulletin_id | MS16-006 |
bulletin_url | |
date | 2016-01-12T00:00:00 |
impact | Remote Code Execution |
knowledgebase_id | 3126036 |
knowledgebase_url | |
severity | Critical |
title | Security Update for Silverlight to Address Remote Code Execution |
Nessus
NASL family MacOS X Local Security Checks NASL id MACOSX_MS16-006.NASL description The version of Microsoft Silverlight installed on the remote Mac OS X host is affected by a remote code execution vulnerability due to a flaw that allows strings to be decoded by a malicious decoder that returns negative offsets. An unauthenticated, remote attacker can exploit this vulnerability, by convincing a user to visit a website containing a specially crafted Silverlight application, to replace object headers with contents provided by the attacker, resulting in the execution of arbitrary code in the context of the current user. last seen 2020-06-01 modified 2020-06-02 plugin id 87874 published 2016-01-12 reporter This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/87874 title MS16-006: Security Update for Silverlight to Address Remote Code Execution (3126036) (Mac OS X) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(87874); script_version("1.11"); script_cvs_date("Date: 2019/11/22"); script_cve_id("CVE-2016-0034"); script_xref(name:"MSFT", value:"MS16-006"); script_xref(name:"MSKB", value:"3126036"); script_name(english:"MS16-006: Security Update for Silverlight to Address Remote Code Execution (3126036) (Mac OS X)"); script_summary(english:"Checks the version of Microsoft Silverlight."); script_set_attribute(attribute:"synopsis", value: "A multimedia application framework installed on the remote Mac OS X host is affected by a remote code execution vulnerability."); script_set_attribute(attribute:"description", value: "The version of Microsoft Silverlight installed on the remote Mac OS X host is affected by a remote code execution vulnerability due to a flaw that allows strings to be decoded by a malicious decoder that returns negative offsets. An unauthenticated, remote attacker can exploit this vulnerability, by convincing a user to visit a website containing a specially crafted Silverlight application, to replace object headers with contents provided by the attacker, resulting in the execution of arbitrary code in the context of the current user."); script_set_attribute(attribute:"see_also", value:"http://technet.microsoft.com/en-us/security/bulletin/ms16-006"); script_set_attribute(attribute:"solution", value: "Microsoft has released a set of patches for Silverlight 5."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-0034"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'CANVAS'); script_set_attribute(attribute:"vuln_publication_date", value:"2016/01/12"); script_set_attribute(attribute:"patch_publication_date", value:"2016/01/12"); script_set_attribute(attribute:"plugin_publication_date", value:"2016/01/12"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:silverlight"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"MacOS X Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("macosx_silverlight_installed.nasl"); script_require_keys("Host/local_checks_enabled", "Host/MacOSX/Version", "MacOSX/Silverlight/Installed"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); kb_base = "MacOSX/Silverlight"; get_kb_item_or_exit(kb_base+"/Installed"); path = get_kb_item_or_exit(kb_base+"/Path", exit_code:1); version = get_kb_item_or_exit(kb_base+"/Version", exit_code:1); bulletin = "MS16-006"; kb = "3126036"; fixed_version = "5.1.41212.0"; if (version =~ "^5\." && ver_compare(ver:version, fix:fixed_version, strict:FALSE) < 0) { if (defined_func("report_xml_tag")) report_xml_tag(tag:bulletin, value:kb); if (report_verbosity > 0) { report = '\n Path : ' + path + '\n Installed version : ' + version + '\n Fixed version : ' + fixed_version + '\n'; security_hole(port:0, extra:report); } else security_hole(0); exit(0); } else audit(AUDIT_INST_VER_NOT_VULN, "Microsoft Silverlight", version);
NASL family Windows : Microsoft Bulletins NASL id SMB_NT_MS16-006.NASL description The version of Microsoft Silverlight installed on the remote Windows host is affected by a remote code execution vulnerability due to a flaw that allows strings to be decoded by a malicious decoder that returns negative offsets. An unauthenticated, remote attacker can exploit this vulnerability, by convincing a user to visit a website containing a specially crafted Silverlight application, to replace object headers with contents provided by the attacker, resulting in the execution of arbitrary code in the context of the current user. last seen 2020-06-01 modified 2020-06-02 plugin id 87880 published 2016-01-12 reporter This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/87880 title MS16-006: Security Update for Silverlight to Address Remote Code Execution (3126036)
The Hacker News
id | THN:48EB36B9BBEE6D28A599E0C7CE3BA0C9 |
last seen | 2018-01-27 |
modified | 2017-06-14 |
published | 2017-06-14 |
reporter | Swati Khandelwal |
source | https://thehackernews.com/2017/06/north-korea-hacking-malware.html |
title | US Warns of 'DeltaCharlie' – A North Korean DDoS Botnet Malware |