Lucene search

K
mskbMicrosoftKB3158991
HistoryMay 10, 2016 - 7:00 a.m.

MS16-053: Description of the security update for JScript and VBScript 5.7: May 10, 2016

2016-05-1007:00:00
Microsoft
support.microsoft.com
62

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.9%

MS16-053: Description of the security update for JScript and VBScript 5.7: May 10, 2016

Summary

This security update resolves vulnerabilities in the JScript and VBScript scripting engines in Microsoft Windows. The vulnerabilities could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploits these vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploits these vulnerabilities could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To learn more about the vulnerability, see Microsoft Security Bulletin MS16-053.

More Information

Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see
Get security updates automatically.

__

Method 2: Microsoft Download Center

You can obtain the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

Click the download link in Microsoft Security Bulletin MS16-053 that corresponds to the version of Windows that you are running.

More Information

__

How to obtain help and support for this security update

Help for installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help for protecting your Windows-based computer from viruses and malware: Virus Solution and Security Center

Local support according to your country: International Support

File Information

__

File hash information

File name SHA1 hash SHA256 hash
Windows6.0-KB3158991-x86.msu 3983349C99B5E09E0C6ACB09443BE69CCE3FBBD7 B15290E7D4FAAA529BCCEF285C05A2036AD010B8F709F3AF57C9671C96F24965
Windows6.0-KB3158991-ia64.msu C4CF2ECDCB59A8A7DD614CF2AF3ADAF1A9DD4253 29DBEB4C7FFC849298C001B587F2088E81DB7EC8EA57C9266818DDAFB99678D3
Windows6.0-KB3158991-x64.msu E8690F843B93E48FC0086183A320106EDE47993F B39F48F79A96E6CCDA4709CFDD427AC995246CE9DF3948B8637D813F213DD21B

__

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.Windows Vista and Windows Server 2008 file informationNotes

* The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:Version Product Milestone Service branch
6.0.600 2.19xxx Windows Vista or Windows Server 2008 SP2 GDR
6.0.600 2.23xxx Windows Vista or Windows Server 2008 SP2 LDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
  • The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
    For all supported x86-based versionsFile name| File version| File size| Date| Time| Platform
    β€”|β€”|β€”|β€”|β€”|β€”
    Jscript.dll| 5.7.6002.19642| 516,096| 23-Apr-2016| 04:44| x86
    Jscript.dll| 5.7.6002.23956| 516,096| 23-Apr-2016| 04:42| x86
    Vbscript.dll| 5.7.6002.19642| 434,176| 23-Apr-2016| 04:45| x86
    Vbscript.dll| 5.7.6002.23956| 434,176| 23-Apr-2016| 04:43| x86
    For all supported ia64-based versionsFile name| File version| File size| Date| Time| Platform
    β€”|β€”|β€”|β€”|β€”|β€”
    Jscript.dll| 5.7.6002.19642| 1,394,688| 24-Apr-2016| 03:39| IA-64
    Jscript.dll| 5.7.6002.23956| 1,395,200| 24-Apr-2016| 03:02| IA-64
    Vbscript.dll| 5.7.6002.19642| 1,174,016| 24-Apr-2016| 03:40| IA-64
    Vbscript.dll| 5.7.6002.23956| 1,175,552| 24-Apr-2016| 03:02| IA-64
    Jscript.dll| 5.7.6002.19642| 516,096| 23-Apr-2016| 04:44| x86
    Jscript.dll| 5.7.6002.23956| 516,096| 23-Apr-2016| 04:42| x86
    Vbscript.dll| 5.7.6002.19642| 434,176| 23-Apr-2016| 04:45| x86
    Vbscript.dll| 5.7.6002.23956| 434,176| 23-Apr-2016| 04:43| x86
    For all supported x64-based versionsFile name| File version| File size| Date| Time| Platform
    β€”|β€”|β€”|β€”|β€”|β€”
    Jscript.dll| 5.7.6002.19642| 755,200| 24-Apr-2016| 04:07| x64
    Jscript.dll| 5.7.6002.23956| 755,200| 24-Apr-2016| 03:24| x64
    Vbscript.dll| 5.7.6002.19642| 583,680| 24-Apr-2016| 04:07| x64
    Vbscript.dll| 5.7.6002.23956| 583,168| 24-Apr-2016| 03:24| x64
    Jscript.dll| 5.7.6002.19642| 516,096| 23-Apr-2016| 04:44| x86
    Jscript.dll| 5.7.6002.23956| 516,096| 23-Apr-2016| 04:42| x86
    Vbscript.dll| 5.7.6002.19642| 434,176| 23-Apr-2016| 04:45| x86
    Vbscript.dll| 5.7.6002.23956| 434,176| 23-Apr-2016| 04:43| x86

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.9%