7.8 CVE-2016-0099

CISA Kev Catalog Buffer Overflow Used by Malware Used by Ransomware Patch Exploit
  

The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka "Secondary Logon Elevation of Privilege Vulnerability."
https://nvd.nist.gov/vuln/detail/CVE-2016-0099

Categories

CWE-120 : Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
A buffer overflow condition exists when a product attempts to put more data in a buffer than it can hold, or when it attempts to put data in a memory area outside of the boundaries of a buffer. The simplest type of error, and the most common cause of buffer overflows, is the "classic" case in which the product copies the buffer without restricting how much is copied. Other variants exist, but the existence of a classic overflow strongly suggests that the programmer is not considering even the most basic of security protections.

References

secure@microsoft.com Patch Exploit

http://www.securityfocus.com/bid/84034
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1035210
Broken Link Third Party Advisory VDB Entry
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16...
Patch Vendor Advisory
https://www.exploit-db.com/exploits/39574/
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/39719/
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/39809/
Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/40107/
Exploit Third Party Advisory VDB Entry


 

CPE

cpe start end
Configuration 1
cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*


REMEDIATION


Patch

Url
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16...


EXPLOITS


Exploit-db.com

id description date
39809 Microsoft Windows 7 < 10 / 2008 < 2012 (x86/x64) - Local Privilege Escalation (MS16-032) 2016-04-25
40107 Microsoft Windows 7 < 10 / 2008 < 2012 (x86/x64) - Secondary Logon Handle Privilege Escalation (MS16-032) (Metasploit) 2016-07-13
39719 Microsoft Windows 7 < 10 / 2008 < 2012 R2 (x86/x64) - Local Privilege Escalation (MS16-032) (PowerShell) 2016-04-21
39574 Microsoft Windows 8.1/10 (x86) - Secondary Logon Standard Handles Missing Sanitization Privilege Escalation (MS16-032) 2016-03-21

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
https://www.exploit-db.com/exploits/39574/
https://www.exploit-db.com/exploits/39719/
https://www.exploit-db.com/exploits/39809/
https://www.exploit-db.com/exploits/40107/


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
10 Buffer Overflow via Environment Variables
High
100 Overflow Buffers
Very High
14 Client-side Injection-induced Buffer Overflow
High
24 Filter Failure through Buffer Overflow
High
42 MIME Conversion
High
44 Overflow Binary Resource File
Very High
45 Buffer Overflow via Symbolic Links
High
46 Overflow Variables and Tags
High
47 Buffer Overflow via Parameter Expansion
High
67 String Format Overflow in syslog()
Very High
8 Buffer Overflow in an API Call
High
9 Buffer Overflow in Local Command-Line Utilities
High
92 Forced Integer Overflow
High