
====================================================================

                             CERT-Renater

                  Note d'Information No. 2016/VULN106
_____________________________________________________________________

DATE                : 10/03/2016

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Windows versions Vista, Server 2008.

======================================================================
KB3140709
https://technet.microsoft.com/en-us/library/security/MS16-025
_____________________________________________________________________

Microsoft Security Bulletin MS16-025: Security Update for Windows
Library Loading to Address Remote Code Execution (3140709)

Bulletin Number: MS16-025

Bulletin Title: Security Update for Windows Library Loading to
Address Remote Code Execution

Severity: Important

KB Article: 3140709

Version: 1.0

Published Date: March 8, 2016

Executive Summary

This security update resolves a vulnerability in Microsoft Windows. The
vulnerability could allow remote code execution if Microsoft Windows
fails to properly validate input before loading certain libraries.
However, an attacker must first gain access to the local system with
the ability to execute a malicious application.

This security update is rated Important for Windows Vista and Windows
Server 2008.


Affected Software

Windows Vista Service Pack 2 (3140709)

Windows Vista x64 Edition Service Pack 2 (3140709)

Windows Server 2008 for 32-bit Systems Service Pack 2 (3140709)

Windows Server 2008 for x64-based Systems Service Pack 2 (3140709)

Windows Server 2008 for Itanium-based Systems Service Pack 2 (3140709)

Server Core installation option

Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core
installation) (3140709)

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core
installation) (3140709)


Vulnerability Information

Library Loading Input Validation Remote Code Execution Vulnerability -
CVE-2016-0100

A remote code execution vulnerability exists when Microsoft Windows
fails to properly validate input before loading certain libraries. An
attacker who successfully exploited this vulnerability could take
complete control of an affected system. An attacker could then install
programs; view, change, or delete data; or create new accounts with
full user rights. Users whose accounts are configured to have fewer
user rights on the system could be less impacted than users who operate
with administrative user rights.

To exploit the vulnerability, an attacker must first gain access to the
local system and have the ability to execute a malicious application.
The update corrects how Windows validates input when loading certain
libraries.

The following table contains links to the standard entry for the
vulnerability in the Common Vulnerabilities and Exposures list:

Vulnerability title   CVE number     Publicly disclosed   Exploited

Library Loading Input
Validation            CVE-2016-0100       No                 No
Remote Code Execution Vulnerability

==========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================




