ID MS:CVE-2016-7259 Type mscve Reporter Microsoft Modified 2016-12-13T08:00:00
Description
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.
The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
{"id": "MS:CVE-2016-7259", "bulletinFamily": "microsoft", "title": "Win32k Elevation of Privilege Vulnerability", "description": "An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\n\nTo exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.\n\nThe update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.\n", "published": "2016-12-13T08:00:00", "modified": "2016-12-13T08:00:00", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "href": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7259", "reporter": "Microsoft", "references": [], "cvelist": ["CVE-2016-7259"], "type": "mscve", "lastseen": "2020-08-07T11:48:19", "edition": 2, "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2016-7259"]}, {"type": "symantec", "idList": ["SMNTC-94771"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310810308"]}, {"type": "mskb", "idList": ["KB3205651"]}, {"type": "nessus", "idList": ["SMB_NT_MS16-151.NASL"]}, {"type": "kaspersky", "idList": ["KLA10924", "KLA11904"]}], "modified": "2020-08-07T11:48:19", "rev": 2}, "score": {"value": 6.5, "vector": "NONE", "modified": "2020-08-07T11:48:19", "rev": 2}, "vulnersScore": 6.5}, "kbList": ["KB3205383", "KB3197868", "KB3205408", "KB3205386", "KB3205409", "KB3206632", "KB3205401", "KB3207752", "KB3205394", "KBNone", "KB3204723", "KB3198234"], "msrc": "", "mscve": "CVE-2016-7259", "msAffectedSoftware": [{"kb": "KB3207752", "kbSupersedence": "KB3197868", "msplatform": "", "name": "Windows 7 for x64-based Systems Service Pack 1"}, {"kb": "KB3207752", "kbSupersedence": "KB3205394", "msplatform": "", "name": "Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1"}, {"kb": "KB3204723", "kbSupersedence": "KB3198234", "msplatform": "", "name": "Windows Vista x64 Edition Service Pack 2"}, {"kb": "KB3206632", "kbSupersedence": "KBNone", "msplatform": "", "name": "Windows 10 Version 1607 for 32-bit Systems"}, {"kb": "KB3205409", "kbSupersedence": "KB3205408", "msplatform": "", "name": "Windows Server 2012 (Server Core installation)"}, {"kb": "KB3205401", "kbSupersedence": "KBNone", "msplatform": "", "name": "Windows Server 2012 R2 (Server Core installation)"}, {"kb": "KB3204723", "kbSupersedence": "KB3198234", "msplatform": "", "name": "Windows Server 2008 for x64-based Systems Service Pack 2"}, {"kb": "KB3205401", "kbSupersedence": "KBNone", "msplatform": "", "name": "Windows 8.1 for x64-based systems"}, {"kb": "KB3205401", "kbSupersedence": "KBNone", "msplatform": "", "name": "Windows 8.1 for 32-bit systems"}, {"kb": "KB3205409", "kbSupersedence": "KB3205408", "msplatform": "", "name": "Windows Server 2012"}, {"kb": "KB3205383", "kbSupersedence": "KBNone", "msplatform": "", "name": "Windows 10 for 32-bit Systems"}, {"kb": "KB3207752", "kbSupersedence": "KB3197868", "msplatform": "", "name": "Windows 7 for 32-bit Systems Service Pack 1"}, {"kb": "KB3206632", "kbSupersedence": "KBNone", "msplatform": "", "name": "Windows Server 2016"}, {"kb": "KB3204723", "kbSupersedence": "KB3198234", "msplatform": "", "name": "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)"}, {"kb": "KB3204723", "kbSupersedence": "KB3198234", "msplatform": "", "name": "Windows Vista Service Pack 2"}, {"kb": "KB3205383", "kbSupersedence": "KBNone", "msplatform": "", "name": "Windows 10 for x64-based Systems"}, {"kb": "KB3207752", "kbSupersedence": "KB3197868", "msplatform": "", "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1"}, {"kb": "KB3206632", "kbSupersedence": "KBNone", "msplatform": "", "name": "Windows 10 Version 1607 for x64-based Systems"}, {"kb": "KB3205401", "kbSupersedence": "KBNone", "msplatform": "", "name": "Windows RT 8.1"}, {"kb": "KB3206632", "kbSupersedence": "KBNone", "msplatform": "", "name": "Windows Server 2016 (Server Core installation)"}, {"kb": "KB3205386", "kbSupersedence": "KBNone", "msplatform": "", "name": "Windows 10 Version 1511 for x64-based Systems"}, {"kb": "KB3205401", "kbSupersedence": "KBNone", "msplatform": "", "name": "Windows Server 2012 R2"}, {"kb": "KB3204723", "kbSupersedence": "KB3198234", "msplatform": "", "name": "Windows Server 2008 for Itanium-Based Systems Service Pack 2"}, {"kb": "KB3204723", "kbSupersedence": "KB3198234", "msplatform": "", "name": "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)"}, {"kb": "KB3204723", "kbSupersedence": "KB3198234", "msplatform": "", "name": "Windows Server 2008 for 32-bit Systems Service Pack 2"}, {"kb": "KB3207752", "kbSupersedence": "KB3197868", "msplatform": "", "name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)"}, {"kb": "KB3205386", "kbSupersedence": "KBNone", "msplatform": "", "name": "Windows 10 Version 1511 for 32-bit Systems"}], "scheme": null}
{"cve": [{"lastseen": "2021-02-02T06:28:11", "description": "The Graphics Component in the kernel-mode drivers in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability.\"", "edition": 4, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2016-12-20T06:59:00", "title": "CVE-2016-7259", "type": "cve", "cwe": ["CWE-19"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-7259"], "modified": "2018-10-12T22:14:00", "cpe": ["cpe:/o:microsoft:windows_rt_8.1:*", "cpe:/o:microsoft:windows_server_2016:*", "cpe:/o:microsoft:windows_vista:*", "cpe:/o:microsoft:windows_server_2012:r2", "cpe:/o:microsoft:windows_10:-", "cpe:/o:microsoft:windows_server_2008:*", "cpe:/o:microsoft:windows_server_2012:-", "cpe:/o:microsoft:windows_10:1607", "cpe:/o:microsoft:windows_server_2008:r2", "cpe:/o:microsoft:windows_10:1511", "cpe:/o:microsoft:windows_8.1:*", "cpe:/o:microsoft:windows_7:*"], "id": "CVE-2016-7259", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-7259", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"]}], "symantec": [{"lastseen": "2018-03-11T20:41:44", "bulletinFamily": "software", "cvelist": ["CVE-2016-7259"], "description": "### Description\n\nMicrosoft Windows is prone to a local privilege-escalation vulnerability. A local attacker can exploit this issue to gain elevated privileges within the context of the affected system.\n\n### Technologies Affected\n\n * Microsoft Windows 10 Version 1607 for 32-bit Systems \n * Microsoft Windows 10 Version 1607 for x64-based Systems \n * Microsoft Windows 10 for 32-bit Systems \n * Microsoft Windows 10 for x64-based Systems \n * Microsoft Windows 10 version 1511 for 32-bit Systems \n * Microsoft Windows 10 version 1511 for x64-based Systems \n * Microsoft Windows 7 for 32-bit Systems SP1 \n * Microsoft Windows 7 for x64-based Systems SP1 \n * Microsoft Windows 8.1 for 32-bit Systems \n * Microsoft Windows 8.1 for x64-based Systems \n * Microsoft Windows RT 8.1 \n * Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1 \n * Microsoft Windows Server 2008 R2 for x64-based Systems SP1 \n * Microsoft Windows Server 2008 for 32-bit Systems SP2 \n * Microsoft Windows Server 2008 for Itanium-based Systems SP2 \n * Microsoft Windows Server 2008 for x64-based Systems SP2 \n * Microsoft Windows Server 2012 \n * Microsoft Windows Server 2012 R2 \n * Microsoft Windows Server 2016 for x64-based Systems \n * Microsoft Windows Vista SP2 \n * Microsoft Windows Vista x64 Edition SP2 \n\n### Recommendations\n\n**Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.** \nTo exploit this vulnerability, an attacker requires local access to an affected computer. Grant local access for trusted and accountable users only. \n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2016-12-13T00:00:00", "published": "2016-12-13T00:00:00", "id": "SMNTC-94771", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/94771", "type": "symantec", "title": "Microsoft Windows Graphics Component CVE-2016-7259 Local Privilege Escalation Vulnerability", "cvss": {"score": 7.2, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "openvas": [{"lastseen": "2020-06-10T19:48:21", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-7260", "CVE-2016-7259"], "description": "This host is missing an important security\n update according to Microsoft Bulletin MS16-151", "modified": "2020-06-08T00:00:00", "published": "2016-12-14T00:00:00", "id": "OPENVAS:1361412562310810308", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310810308", "type": "openvas", "title": "Microsoft Windows Kernel Mode Drivers Multiple Vulnerabilities (3205651)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Kernel Mode Drivers Multiple Vulnerabilities (3205651)\n#\n# Authors:\n# Tushar Khelge <ktushar@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.810308\");\n script_version(\"2020-06-08T14:40:48+0000\");\n script_cve_id(\"CVE-2016-7259\", \"CVE-2016-7260\");\n script_bugtraq_id(94785, 94771);\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-08 14:40:48 +0000 (Mon, 08 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2016-12-14 08:12:22 +0530 (Wed, 14 Dec 2016)\");\n script_name(\"Microsoft Windows Kernel Mode Drivers Multiple Vulnerabilities (3205651)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft Bulletin MS16-151\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The multiple flaws are due to,\n\n - The Windows Graphics Component improperly handles objects in memory.\n\n - The Windows kernel-mode driver fails to properly handle objects in memory.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to run arbitrary code in kernel mode and run processes in an elevated context.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 10 x32/x64\n\n - Microsoft Windows Server 2016\n\n - Microsoft Windows 8.1 x32/x64\n\n - Microsoft Windows Server 2012/2012R2\n\n - Microsoft Windows 10 Version 1511 x32/x64\n\n - Microsoft Windows 10 Version 1607 x32/x64\n\n - Microsoft Windows 7 x32/x64 Service Pack 1 and prior\n\n - Microsoft Windows Vista x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3205651\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/en-us/library/security/ms16-151\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(winVista:3, win7:2, win7x64:2, win2008:3, win2008r2:2, winVistax64:3, win2008x64:3,\n win2012:1, win2012R2:1, win8_1:1, win8_1x64:1, win10:1, win10x64:1, win2016:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath){\n exit(0);\n}\n\nwinVer = fetch_file_version(sysPath:sysPath, file_name:\"system32\\Win32k.sys\");\nif(!winVer){\n exit(0);\n}\n\nif(hotfix_check_sp(winVista:3, winVistax64:3, win2008:3, win2008x64:3) > 0)\n{\n if(version_is_less(version:winVer, test_version:\"6.0.6002.19712\"))\n {\n Vulnerable_range = \"Less than 6.0.6002.19712\";\n VULN = TRUE ;\n }\n else if(version_in_range(version:winVer, test_version:\"6.0.6002.23000\", test_version2:\"6.0.6002.24033\"))\n {\n Vulnerable_range = \"6.0.6002.23000 - 6.0.6002.24033\";\n VULN = TRUE ;\n }\n}\n\nelse if(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) > 0 )\n{\n if(version_is_less(version:winVer, test_version:\"6.1.7601.23591\"))\n {\n Vulnerable_range = \"Less than 6.1.7601.23591\";\n VULN = TRUE ;\n }\n}\n\nelse if(hotfix_check_sp(win2012:1) > 0 )\n{\n if(version_is_less(version:winVer, test_version:\"6.2.9200.22029\"))\n {\n Vulnerable_range = \"Less than 6.2.9200.22029\";\n VULN = TRUE ;\n }\n}\n\nelse if(hotfix_check_sp(win8_1:1, win8_1x64:1, win2012R2:1) > 0 )\n{\n if(version_is_less(version:winVer, test_version:\"6.3.9600.18533\"))\n {\n Vulnerable_range = \"Less than 6.3.9600.18533\";\n VULN = TRUE ;\n }\n}\n\nelse if(hotfix_check_sp(win10:1, win10x64:1, win2016:1) > 0 )\n{\n if(version_is_less(version:winVer, test_version:\"10.0.10240.16384\"))\n {\n Vulnerable_range = \"Less than 10.0.10240.16384\";\n VULN = TRUE ;\n }\n else if(version_in_range(version:winVer, test_version:\"10.0.10586.0\", test_version2:\"10.0.10586.19\"))\n {\n Vulnerable_range = \"10.0.10586.0 - 10.0.10586.19\";\n VULN = TRUE ;\n }\n else if(version_in_range(version:winVer, test_version:\"10.0.14393.0\", test_version2:\"10.0.14393.575\"))\n {\n Vulnerable_range = \"10.0.14393.0 - 10.0.14393.575\";\n VULN = TRUE ;\n }\n}\n\nif(VULN)\n{\n report = 'File checked: ' + sysPath + \"\\system32\\Win32k.sys\"+ '\\n' +\n 'File version: ' + winVer + '\\n' +\n 'Vulnerable range: ' + Vulnerable_range + '\\n' ;\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "mskb": [{"lastseen": "2021-01-01T22:41:17", "bulletinFamily": "microsoft", "cvelist": ["CVE-2016-7260", "CVE-2016-7259"], "description": "<html><body><p>Resolves a vulnerability in Windows that could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of the system.</p><h2>Summary</h2><div class=\"kb-summary-section section\">This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of the affected system.\u00a0<br/><br/>To learn more about the vulnerability, see <a href=\"https://technet.microsoft.com/library/security/ms16-151\" id=\"kb-link-2\" target=\"_self\">Microsoft Security Bulletin MS16-151</a>. </div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><span class=\"text-base\">Important </span><ul class=\"sbody-free_list\"><li>All future security and non-security updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update <a href=\"https://support.microsoft.com/en-us/help/2919355\" id=\"kb-link-3\" target=\"_self\">2919355</a> to be installed. We recommend that you install update <a href=\"https://support.microsoft.com/en-us/help/2919355\" id=\"kb-link-4\" target=\"_self\">2919355</a> on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive future updates. </li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a href=\"https://technet.microsoft.com/en-us/library/hh825699\" id=\"kb-link-5\" target=\"_self\">Add language packs to Windows</a>.</li></ul></div><h2>Additional information about this security update</h2><div class=\"kb-moreinformation-section section\"><br/>The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.<br/><ul class=\"sbody-free_list\"><li><a href=\"https://support.microsoft.com/help/3204723\" id=\"kb-link-6\" target=\"_self\">3204723</a> MS16-151: Description of the security update for Windows kernel-mode drivers: December 13, 2016</li><li><a href=\"https://support.microsoft.com/help/3205400\" id=\"kb-link-7\" target=\"_self\">3205400</a> December 2016 Security Only Quality Update for Windows 8.1 and Windows Server 2012 R2</li><li><a href=\"https://support.microsoft.com/help/3205401\" id=\"kb-link-8\" target=\"_self\">3205401</a> December 2016 Security Monthly Quality Rollup for Windows 8.1 and Windows Server 2012 R2</li><li><a href=\"https://support.microsoft.com/help/3205408\" id=\"kb-link-9\" target=\"_self\">3205408</a> December 2016 Security Only Quality Update for Windows Server 2012</li><li><a href=\"https://support.microsoft.com/help/3205409\" id=\"kb-link-10\" target=\"_self\">3205409</a> December 2016 Security Monthly Quality Rollup for Windows Server 2012</li><li><a href=\"https://support.microsoft.com/help/3205394\" id=\"kb-link-11\" target=\"_self\">3205394</a> December 2016 Security Only Quality Update for Windows 7 SP1 and Windows Server 2008 R2 SP1</li><li><a href=\"https://support.microsoft.com/help/3207752\" id=\"kb-link-12\" target=\"_self\">3207752</a> December 2016 Security Monthly Quality Rollup for Windows 7 SP1 and Windows Server 2008 R2 SP1</li></ul> Additionally, see the following articles for more information about Windows 10, Windows 10 version 1511, Windows 10 version 1607, and Windows Server 2016: <br/><ul class=\"sbody-free_list\"><li><a href=\"https://support.microsoft.com/en-us/help/4004230?preview\" id=\"kb-link-13\" target=\"_self\">Windows 10 RTM release notes (KB3205383)</a></li><li><a href=\"https://support.microsoft.com/en-us/help/4004229?preview\" id=\"kb-link-14\" target=\"_self\">Windows 10 Version 1511 release notes (KB3205386)</a></li><li><a href=\"https://support.microsoft.com/en-us/help/4004227?preview\" id=\"kb-link-15\" target=\"_self\">Windows 10 Version 1607 and Windows Server 2016 release notes (KB3206632)</a></li><li><a href=\"https://support.microsoft.com/en-sg/help/12387/windows-10-update-history\" id=\"kb-link-16\" target=\"_self\">Windows 10 and Windows Server 2016 update history</a>.</li></ul></div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Security update deployment information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><h4 class=\"sbody-h4\">Windows Vista (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Vista:<br/><span class=\"text-base\">Windows6.0-KB3204723-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Vista:<br/><span class=\"text-base\">Windows6.0-KB3204723-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-18\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart the system after you apply this security update. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">WUSA.exe does not support uninstalling updates. To uninstall an update that is installed by WUSA, click <strong class=\"uiterm\">Control Panel</strong>, and then click <span class=\"text-base\">Security</span>. Under <span class=\"sbody-userinput\">Windows Update</span>, click <strong class=\"uiterm\">View installed updates</strong>, and then select from the list of updates. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3204723\" id=\"kb-link-19\" target=\"_self\">Microsoft Knowledge Base Article 3204723</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> This update does not add a registry key to validate its installation. </td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3204723-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3204723-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3204723-ia64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-20\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart the system after you apply this security update. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">WUSA.exe does not support uninstalling updates. To uninstall an update that is installed by WUSA, click <strong class=\"uiterm\">Control Panel</strong>, and then click <span class=\"text-base\">Security</span>. Under <span class=\"sbody-userinput\">Windows Update</span>, click <strong class=\"uiterm\">View installed updates</strong>, and then select from the list of updates. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3204723\" id=\"kb-link-21\" target=\"_self\">Microsoft Knowledge Base Article 3204723</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> This update does not add a registry key to validate its installation. </td></tr></table></div><h4 class=\"sbody-h4\">Windows 7 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 7:<br/><span class=\"text-base\">Windows6.1-KB3205394-x86.msu<br/></span>Security only</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 7<br/><span class=\"text-base\">Windows6.1-KB3207752-x86.msu<br/></span>Monthly rollup</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 7:<br/><span class=\"text-base\">Windows6.1-KB3205394-x64.msu<br/></span>Security only</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 7:<br/><span class=\"text-base\">Windows6.1-KB3207752-x64.msu<br/></span>Monthly rollup</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-22\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart the system after you apply this security update. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that is installed by WUSA, use the <span class=\"text-base\">/Uninstall </span>setup switch or click <strong class=\"uiterm\">Control Panel</strong>, and then click\u00a0<strong class=\"uiterm\">System and Security</strong>. Under <strong class=\"uiterm\">Windows Update</strong>, click <strong class=\"uiterm\">View installed updates</strong>, and then select from the list of updates. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3205394\" id=\"kb-link-23\" target=\"_self\">Microsoft Knowledge Base Article 3205394</a><br/>See <a href=\"https://support.microsoft.com/help/3207752\" id=\"kb-link-24\" target=\"_self\">Microsoft Knowledge Base Article 3207752</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> This update does not add a registry key to validate its installation. </td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 R2 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3205394-x64.msu<br/></span>Security only</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3207752-x64.msu<br/></span>Monthly rollup</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3205394-ia64.msu<br/></span>Security only</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3207752-ia64.msu<br/></span>Monthly rollup</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-25\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart the system after you apply this security update. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that is installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch or click <strong class=\"uiterm\">Control Panel</strong>, and then click\u00a0<strong class=\"uiterm\">System and Security</strong>. Under <strong class=\"uiterm\">Windows Update</strong>, click <strong class=\"uiterm\">View installed updates</strong>, and then select from the list of updates. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3205394\" id=\"kb-link-26\" target=\"_self\">Microsoft Knowledge Base Article 3205394</a><br/>See <a href=\"https://support.microsoft.com/help/3207752\" id=\"kb-link-27\" target=\"_self\">Microsoft Knowledge Base Article 3207752</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> This update does not add a registry key to validate its installation. </td></tr></table></div><h4 class=\"sbody-h4\">Windows 8.1 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3205400-x86.msu<br/></span>Security only</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3205401-x86.msu<br/></span>Monthly rollup</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3205400-x64.msu<br/></span>Security only</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3205401-x64.msu<br/></span>Monthly rollup</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-28\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart the system after you apply this security update. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that is installed by WUSA, use the <span class=\"text-base\">/Uninstall</span>\u00a0setup switch or click\u00a0<strong class=\"uiterm\">Control Panel</strong>, click <strong class=\"uiterm\">System and Security</strong>, and then click <strong class=\"uiterm\">Windows Update</strong>. Under <span class=\"sbody-userinput\">See also</span>, click <span class=\"sbody-userinput\">Installed updates</span>, and then select from the list of updates. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3205400\" id=\"kb-link-29\" target=\"_self\">Microsoft Knowledge Base Article 3205400</a><br/>See <a href=\"https://support.microsoft.com/help/3205401\" id=\"kb-link-30\" target=\"_self\">Microsoft Knowledge Base Article 3205401</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> This update does not add a registry key to validate its installation. </td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2012 and Windows Server 2012 R2 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012:<br/><span class=\"text-base\">Windows8-RT-KB</span><span class=\"text-base\">3205408-x64.msu <br/></span>Security only</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012:<br/><span class=\"text-base\">Windows8-RT-KB</span><span class=\"text-base\">3205409-x64.msu<br/></span>Monthly rollup</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012 R2:<br/><span class=\"text-base\">Windows8.1-KB</span><span class=\"text-base\">3205400-x64.msu<br/></span>Security only</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012 R2:<br/><span class=\"text-base\">Windows8.1-KB</span><span class=\"text-base\">3205401-x64.msu <br/></span>Monthly rollup</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-31\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart the system after you apply this security update. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that is installed by WUSA, use the <span class=\"text-base\">/Uninstall</span>\u00a0setup switch or click\u00a0<strong class=\"uiterm\">Control Panel</strong>, click <strong class=\"uiterm\">System and Security</strong>, and then click <strong class=\"uiterm\">Windows Update</strong>. Under <span class=\"sbody-userinput\">See also</span>, click <span class=\"sbody-userinput\">Installed updates</span>, and then select from the list of updates. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3205408\" id=\"kb-link-32\" target=\"_self\">Microsoft Knowledge Base Article 3205408</a><br/>See <a href=\"https://support.microsoft.com/help/3205409\" id=\"kb-link-33\" target=\"_self\">Microsoft Knowledge Base Article 3205409</a><br/>See <a href=\"https://support.microsoft.com/help/3205400\" id=\"kb-link-34\" target=\"_self\">Microsoft Knowledge Base Article 3205400</a><br/>See <a href=\"https://support.microsoft.com/help/3205401\" id=\"kb-link-35\" target=\"_self\">Microsoft Knowledge Base Article 3205401</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> This update does not add a registry key to validate its installation. </td></tr></table></div><h4 class=\"sbody-h4\">Windows RT 8.1 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Deployment</span></td><td class=\"sbody-td\">The 3205401 Monthly Only update is available via <a href=\"http://go.microsoft.com/fwlink/?linkid=21130\" id=\"kb-link-36\" target=\"_self\">Windows Update</a> only. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart Requirement</span></td><td class=\"sbody-td\">You must restart the system after you apply this security update. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal Information</span></td><td class=\"sbody-td\">Click <strong class=\"uiterm\">Control Panel</strong>, click <strong class=\"uiterm\">System and Security</strong>, and then click <strong class=\"uiterm\">Windows Update</strong>. Under <span class=\"sbody-userinput\">See also</span>, click <span class=\"sbody-userinput\">Installed updates</span>, and then select from the list of updates. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3205401\" id=\"kb-link-37\" target=\"_self\">Microsoft Knowledge Base Article 3205401</a></td></tr></table></div><h4 class=\"sbody-h4\">Windows 10 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 10:<br/><span class=\"text-base\">Windows10.0-KB3205383-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 10:<br/><span class=\"text-base\">Windows10.0-</span><span class=\"text-base\">KB3205383</span><span class=\"text-base\">-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 10 Version 1511:<br/><span class=\"text-base\">Windows10.0-KB3205386-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 10 Version 1511:<br/><span class=\"text-base\">Windows10.0-</span><span class=\"text-base\">KB3205386</span><span class=\"text-base\">-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 10 Version 1607:<br/><span class=\"text-base\">Windows10.0-KB3206632-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 10 Version 1607:<br/><span class=\"text-base\">Windows10.0-KB3206632-x64.ms</span><span class=\"text-base\">u</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-38\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart the system after you apply this security update. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that is installed by WUSA, use the <span class=\"text-base\">/Uninstall</span>\u00a0setup switch or click\u00a0<strong class=\"uiterm\">Control Panel</strong>, click <strong class=\"uiterm\">System and Security</strong>, and then click <strong class=\"uiterm\">Windows Update</strong>. Under <span class=\"sbody-userinput\">See also</span>, click <span class=\"sbody-userinput\">Installed updates</span>, and then select from the list of updates. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/4004230?preview\" id=\"kb-link-39\" target=\"_self\">Windows 10 RTM release notes (KB3205383)</a><br/><a href=\"https://support.microsoft.com/en-us/help/4004229?preview\" id=\"kb-link-40\" target=\"_self\">Windows 10 Version 1511 release notes (KB3205386)</a><br/><a href=\"https://support.microsoft.com/en-us/help/4004227?preview\" id=\"kb-link-41\" target=\"_self\">Windows 10 Version 1607 and Windows Server 2016 release notes (KB3206632)</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> This update does not add a registry key to validate its installation. </td></tr></table></div><h4 class=\"sbody-h4\"> Windows Server 2016 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2016:<br/><span class=\"text-base\">Windows10.0-</span><span class=\"text-base\">KB3206632</span><span class=\"text-base\">-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-42\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart the system after you apply this security update. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that is installed by WUSA, use the <span class=\"text-base\">/Uninstall</span>\u00a0setup switch or click\u00a0<strong class=\"uiterm\">Control Panel</strong>, click <strong class=\"uiterm\">System and Security</strong>, and then click <strong class=\"uiterm\">Windows Update</strong>. Under <span class=\"sbody-userinput\">See also</span>, click <span class=\"sbody-userinput\">Installed updates</span>, and then select from the list of updates. </td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\"><a href=\"https://support.microsoft.com/en-us/help/4004227?preview\" id=\"kb-link-43\" target=\"_self\">Windows 10 Version 1607 and Windows Server 2016 release notes (KB3206632)</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> This update does not add a registry key to validate its installation. </td></tr></table></div></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">How to obtain help and support for this security update</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">Help for installing updates: <a href=\"https://support.microsoft.com/ph/6527\" id=\"kb-link-44\" target=\"_self\">Support for Microsoft Update</a><br/><br/>Security solutions for IT professionals: <a href=\"https://technet.microsoft.com/security/bb980617.aspx\" id=\"kb-link-45\" target=\"_self\">TechNet Security Troubleshooting and Support</a><br/><br/>Help for protecting your Windows-based computer from viruses and malware: <a href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" id=\"kb-link-46\" target=\"_self\">Virus Solution and Security Center</a><br/><br/>Local support according to your country: <a href=\"https://www.microsoft.com/en-us/locale.aspx\" id=\"kb-link-47\" target=\"_self\">International Support</a></div><br/></span></div></div></div><a class=\"bookmark\" id=\"fileinfo\"></a></div></body></html>", "edition": 3, "modified": "2016-12-13T22:18:52", "id": "KB3205651", "href": "https://support.microsoft.com/en-us/help/3205651/", "published": "2016-12-13T00:00:00", "title": "MS16-151: Security update for Windows kernel-mode drivers: December 13, 2016", "type": "mskb", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-03-01T06:19:03", "description": "The remote Windows host is missing a security update. It is,\ntherefore, affected by multiple elevation of privilege\nvulnerabilities :\n\n - An elevation of privilege vulnerability exists in the\n Windows Graphics Component due to improper handling of\n objects in memory. A local attacker can exploit this\n vulnerability, via a specially crafted application, to\n execute arbitrary code in an elevated context.\n (CVE-2016-7259)\n\n - An elevation of privilege vulnerability exists in the\n Windows kernel-mode driver due to improper handling of\n objects in memory. A local attacker can exploit this\n vulnerability, via a specially crafted application, to\n execute arbitrary code in kernel mode.\n (CVE-2016-7260)", "edition": 33, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-12-13T00:00:00", "title": "MS16-151: Security Update for Windows Kernel-Mode Drivers (3205651)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-7260", "CVE-2016-7259"], "modified": "2021-03-02T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS16-151.NASL", "href": "https://www.tenable.com/plugins/nessus/95768", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(95768);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2018/11/15 20:50:32\");\n\n script_cve_id(\"CVE-2016-7259\", \"CVE-2016-7260\");\n script_bugtraq_id(94771, 94785);\n script_xref(name:\"MSFT\", value:\"MS16-151\");\n script_xref(name:\"MSKB\", value:\"3204723\");\n script_xref(name:\"MSKB\", value:\"3205394\");\n script_xref(name:\"MSKB\", value:\"3207752\");\n script_xref(name:\"MSKB\", value:\"3205400\");\n script_xref(name:\"MSKB\", value:\"3205401\");\n script_xref(name:\"MSKB\", value:\"3205408\");\n script_xref(name:\"MSKB\", value:\"3205409\");\n script_xref(name:\"MSKB\", value:\"3205383\");\n script_xref(name:\"MSKB\", value:\"3205386\");\n script_xref(name:\"MSKB\", value:\"3206632\");\n script_xref(name:\"IAVA\", value:\"2016-A-0347\");\n\n script_name(english:\"MS16-151: Security Update for Windows Kernel-Mode Drivers (3205651)\");\n script_summary(english:\"Checks the version of win32k.sys or the installed rollup.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is affected by multiple elevation of privilege\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing a security update. It is,\ntherefore, affected by multiple elevation of privilege\nvulnerabilities :\n\n - An elevation of privilege vulnerability exists in the\n Windows Graphics Component due to improper handling of\n objects in memory. A local attacker can exploit this\n vulnerability, via a specially crafted application, to\n execute arbitrary code in an elevated context.\n (CVE-2016-7259)\n\n - An elevation of privilege vulnerability exists in the\n Windows kernel-mode driver due to improper handling of\n objects in memory. A local attacker can exploit this\n vulnerability, via a specially crafted application, to\n execute arbitrary code in kernel mode.\n (CVE-2016-7260)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-151\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Windows Vista, 2008, 7,\n2008 R2, 2012, 8.1, RT 8.1, 2012 R2, 10, and 2016.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/12/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/12/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/12/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\", \"smb_check_rollup.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_reg_query.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS16-151';\nkbs = make_list(\n '3204723',\n '3205394',\n '3207752',\n '3205400',\n '3205401',\n '3205408',\n '3205409',\n '3205383',\n '3205386',\n '3206632'\n);\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(vista:'2', win7:'1', win8:'0', win81:'0', win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\n# Windows 8 EOL\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Windows 8\" >< productname && \"8.1\" >!< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n # Vista / 2008\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"win32k.sys\", version:\"6.0.6002.24034\", min_version:\"6.0.6002.23000\", dir:\"\\system32\", bulletin:bulletin, kb:\"3204723\") ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"win32k.sys\", version:\"6.0.6002.19712\", min_version:\"6.0.6002.18000\", dir:\"\\system32\", bulletin:bulletin, kb:\"3204723\") ||\n # 8.1 / 2012 R2\n smb_check_rollup(os:\"6.3\",\n sp:0,\n rollup_date: \"12_2016\",\n bulletin:bulletin,\n rollup_kb_list:make_list(3205400, 3205401)) ||\n # 2012\n smb_check_rollup(os:\"6.2\",\n sp:0,\n rollup_date: \"12_2016\",\n bulletin:bulletin,\n rollup_kb_list:make_list(3205408, 3205409)) ||\n # 7 / 2008 R2\n smb_check_rollup(os:\"6.1\",\n sp:1,\n rollup_date: \"12_2016\",\n bulletin:bulletin,\n rollup_kb_list:make_list(3205394, 3207752)) ||\n # 10 (1507)\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"10240\",\n rollup_date: \"12_2016\",\n bulletin:bulletin,\n rollup_kb_list:make_list(3205383)) ||\n # 10 (1511)\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"10586\",\n rollup_date: \"12_2016\",\n bulletin:bulletin,\n rollup_kb_list:make_list(3205386)) ||\n # 10 (1607)\n smb_check_rollup(os:\"10\",\n sp:0,\n os_build:\"14393\",\n rollup_date: \"12_2016\",\n bulletin:bulletin,\n rollup_kb_list:make_list(3206632))\n)\n{\n set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2020-09-02T12:04:24", "bulletinFamily": "info", "cvelist": ["CVE-2016-7283", "CVE-2016-7282", "CVE-2016-7272", "CVE-2016-7274", "CVE-2016-7260", "CVE-2016-7279", "CVE-2016-7278", "CVE-2016-7292", "CVE-2016-7257", "CVE-2016-7259", "CVE-2016-7219", "CVE-2016-7295"], "description": "### *Detect date*:\n12/13/2016\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges.\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:\n\n### *Affected products*:\nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows 10 for 32-bit Systems \nWindows Vista x64 Edition Service Pack 2 \nMicrosoft Office 2016 for Mac \nInternet Explorer 9 \nWindows 10 for x64-based Systems \nWindows Server 2012 (Server Core installation) \nWindows Server 2016 (Server Core installation) \nWindows 7 for x64-based Systems Service Pack 1 \nWindows 8.1 for 32-bit systems \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows 8.1 for x64-based systems \nWindows Server 2012 \nMicrosoft Office 2010 Service Pack 2 (32-bit editions) \nWindows Vista Service Pack 2 \nInternet Explorer 11 \nMicrosoft Office 2010 Service Pack 2 (64-bit editions) \nWindows Server 2008 for x64-based Systems Service Pack 2 \nWindows Server 2016 \nMicrosoft Office for Mac 2011 \nWindows RT 8.1 \nWindows Server 2008 for Itanium-Based Systems Service Pack 2 \nWindows Server 2012 R2 (Server Core installation) \nWindows Server 2008 R2 for Itanium-Based Systems Service Pack 1 \nWindows 10 Version 1511 for 32-bit Systems \nMicrosoft Office Word Viewer \nMicrosoft Edge (EdgeHTML-based) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nMicrosoft Office 2007 Service Pack 3 \nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nWindows 10 Version 1511 for x64-based Systems \nMicrosoft Windows Hyperlink Object Library \nWindows 10 Version 1607 for 32-bit Systems \nWindows 10 Version 1607 for x64-based Systems \nWindows 7 for 32-bit Systems Service Pack 1 \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nInternet Explorer 10 \nWindows Server 2012 R2\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2016-7219](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7219>) \n[CVE-2016-7272](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7272>) \n[CVE-2016-7259](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7259>) \n[CVE-2016-7274](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7274>) \n[CVE-2016-7260](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7260>) \n[CVE-2016-7278](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7278>) \n[CVE-2016-7279](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7279>) \n[CVE-2016-7295](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7295>) \n[CVE-2016-7292](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7292>) \n[CVE-2016-7257](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7257>) \n[CVE-2016-7283](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7283>) \n[CVE-2016-7282](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2016-7282>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Internet Explorer](<https://threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/>)\n\n### *CVE-IDS*:\n[CVE-2016-7272](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7272>)0.0Unknown \n[CVE-2016-7257](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7257>)0.0Unknown \n[CVE-2016-7279](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7279>)0.0Unknown \n[CVE-2016-7278](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7278>)0.0Unknown \n[CVE-2016-7283](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7283>)0.0Unknown \n[CVE-2016-7282](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7282>)0.0Unknown \n[CVE-2016-7292](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7292>)0.0Unknown \n[CVE-2016-7274](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7274>)0.0Unknown \n[CVE-2016-7295](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7295>)0.0Unknown \n[CVE-2016-7219](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7219>)0.0Unknown \n[CVE-2016-7259](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7259>)0.0Unknown \n[CVE-2016-7260](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7260>)0.0Unknown\n\n### *KB list*:\n[3203621](<http://support.microsoft.com/kb/3203621>) \n[3207752](<http://support.microsoft.com/kb/3207752>) \n[3205394](<http://support.microsoft.com/kb/3205394>) \n[3196726](<http://support.microsoft.com/kb/3196726>) \n[3203838](<http://support.microsoft.com/kb/3203838>) \n[3196348](<http://support.microsoft.com/kb/3196348>) \n[3204724](<http://support.microsoft.com/kb/3204724>) \n[3204808](<http://support.microsoft.com/kb/3204808>) \n[3205638](<http://support.microsoft.com/kb/3205638>) \n[3204723](<http://support.microsoft.com/kb/3204723>)\n\n### *Microsoft official advisories*:", "edition": 1, "modified": "2020-07-22T00:00:00", "published": "2016-12-13T00:00:00", "id": "KLA11904", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11904", "title": "\r KLA11904Multiple vulnerabilities in Microsoft Products (ESU) ", "type": "kaspersky", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-02T11:42:44", "bulletinFamily": "info", "cvelist": ["CVE-2016-7283", "CVE-2016-7282", "CVE-2016-7272", "CVE-2016-7274", "CVE-2016-7260", "CVE-2016-7279", "CVE-2016-7273", "CVE-2016-7278", "CVE-2016-7281", "CVE-2016-7271", "CVE-2016-7292", "CVE-2016-7258", "CVE-2016-7257", "CVE-2016-7259", "CVE-2016-7219", "CVE-2016-7295"], "description": "### *Detect date*:\n12/13/2016\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information or gain privileges.\n\n### *Affected products*:\nMicrosoft Windows Vista Service Pack 2 \nMicrosoft Windows 7 \nMicrosoft Windows 7 Service Pack 1 \nMicrosoft Windows 8.1 \nMicrosoft Windows 10 \nMicrosoft Windows Server 2008 \nMicrosoft Windows Server 2008 Service Pack 2 \nMicrosoft Windows Server 2008 R2 Service Pack 1 \nMicrosoft Windows Server 2012 \nMicrosoft Windows Server 2012 R2 \nMicrosoft Windows Server 2016\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[MS16-149](<https://technet.microsoft.com/en-us/library/security/ms16-149.aspx>) \n[MS16-153](<https://technet.microsoft.com/en-us/library/security/ms16-153.aspx>) \n[CVE-2016-7271](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7271>) \n[CVE-2016-7273](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7273>) \n[CVE-2016-7272](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7272>) \n[CVE-2016-7257](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7257>) \n[CVE-2016-7281](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7281>) \n[CVE-2016-7279](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7279>) \n[CVE-2016-7278](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7278>) \n[CVE-2016-7283](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7283>) \n[CVE-2016-7282](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7282>) \n[CVE-2016-7292](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7292>) \n[CVE-2016-7274](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7274>) \n[CVE-2016-7295](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7295>) \n[CVE-2016-7219](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7219>) \n[CVE-2016-7258](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7258>) \n[CVE-2016-7259](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7259>) \n[CVE-2016-7260](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2016-7260>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows Vista](<https://threats.kaspersky.com/en/product/Microsoft-Windows-Vista-4/>)\n\n### *CVE-IDS*:\n[CVE-2016-7271](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7271>)4.6Warning \n[CVE-2016-7273](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7273>)0.0Unknown \n[CVE-2016-7272](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7272>)0.0Unknown \n[CVE-2016-7257](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7257>)0.0Unknown \n[CVE-2016-7281](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7281>)2.6Warning \n[CVE-2016-7279](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7279>)7.6Critical \n[CVE-2016-7278](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7278>)2.6Warning \n[CVE-2016-7283](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7283>)9.3Critical \n[CVE-2016-7282](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7282>)4.3Warning \n[CVE-2016-7292](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7292>)7.2High \n[CVE-2016-7274](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7274>)9.3Critical \n[CVE-2016-7295](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7295>)2.1Warning \n[CVE-2016-7219](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7219>)2.1Warning \n[CVE-2016-7258](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7258>)2.1Warning \n[CVE-2016-7259](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7259>)7.2High \n[CVE-2016-7260](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7260>)7.2High\n\n### *Microsoft official advisories*:\n\n\n### *KB list*:\n[3208481](<http://support.microsoft.com/kb/3208481>) \n[3205386](<http://support.microsoft.com/kb/3205386>) \n[3205383](<http://support.microsoft.com/kb/3205383>) \n[3205401](<http://support.microsoft.com/kb/3205401>) \n[3205400](<http://support.microsoft.com/kb/3205400>) \n[3205408](<http://support.microsoft.com/kb/3205408>) \n[3205409](<http://support.microsoft.com/kb/3205409>) \n[3207752](<http://support.microsoft.com/kb/3207752>) \n[3205394](<http://support.microsoft.com/kb/3205394>) \n[3206632](<http://support.microsoft.com/kb/3206632>) \n[3196726](<http://support.microsoft.com/kb/3196726>) \n[3203838](<http://support.microsoft.com/kb/3203838>) \n[3196348](<http://support.microsoft.com/kb/3196348>) \n[3204724](<http://support.microsoft.com/kb/3204724>) \n[3204808](<http://support.microsoft.com/kb/3204808>) \n[3205638](<http://support.microsoft.com/kb/3205638>) \n[3204723](<http://support.microsoft.com/kb/3204723>)\n\n### *Exploitation*:\nThe following public exploits exists for this vulnerability:", "edition": 42, "modified": "2020-06-18T00:00:00", "published": "2016-12-13T00:00:00", "id": "KLA10924", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10924", "title": "\r KLA10924Privilege escalation and information disclosure vulnerabilities in Microsoft Windows ", "type": "kaspersky", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}