MS16-035: Security Update for .NET Framework to Address Security Feature Bypass (3141780)

critical Nessus Plugin ID 89757

Synopsis

The remote Windows host is affected by a security feature bypass vulnerability.

Description

The remote Windows host is missing a security update. It is, therefore, affected by a security feature bypass vulnerability in the .NET Framework due to improper validation of certain elements in a signed XML document. An attacker can exploit this vulnerability to modify the contents of an XML file without invalidating the signature associated with the file.

Solution

Microsoft has released a set of patches for .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, 4.5.1, 4.5.2, 4.6, and 4.6.1.

See Also

https://www.nessus.org/u?69dfeed4

Plugin Details

Severity: Critical

ID: 89757

File Name: smb_nt_ms16-035.nasl

Version: 1.10

Type: local

Agent: windows

Published: 3/8/2016

Updated: 5/15/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2016-0132

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:.net_framework

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 3/8/2016

Vulnerability Publication Date: 3/8/2016

Reference Information

CVE: CVE-2016-0132

BID: 84075