CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
98.8%
The version of Internet Explorer installed on the remote host is missing Cumulative Security Update 3142015. It is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution vulnerabilities. An unauthenticated, remote attacker can exploit these issues by convincing a user to visit a specially crafted website, resulting in the execution of arbitrary code in the context of the current user.
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(89746);
script_version("1.16");
script_cvs_date("Date: 2019/11/20");
script_cve_id(
"CVE-2016-0102",
"CVE-2016-0103",
"CVE-2016-0104",
"CVE-2016-0105",
"CVE-2016-0106",
"CVE-2016-0107",
"CVE-2016-0108",
"CVE-2016-0109",
"CVE-2016-0110",
"CVE-2016-0111",
"CVE-2016-0112",
"CVE-2016-0113",
"CVE-2016-0114"
);
script_bugtraq_id(
84009,
84010,
84011,
84012,
84013,
84014,
84015,
84016,
84018,
84019,
84020,
84021,
84022
);
script_xref(name:"MSFT", value:"MS16-023");
script_xref(name:"MSKB", value:"3139929");
script_xref(name:"MSKB", value:"3140745");
script_xref(name:"MSKB", value:"3140768");
script_xref(name:"ZDI", value:"ZDI-12-021");
script_name(english:"MS16-023: Cumulative Security Update for Internet Explorer (3142015)");
script_summary(english:"Checks the version of mshtml.dll.");
script_set_attribute(attribute:"synopsis", value:
"The remote host has a web browser installed that is affected by
multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The version of Internet Explorer installed on the remote host is
missing Cumulative Security Update 3142015. It is, therefore, affected
by multiple vulnerabilities, the majority of which are remote code
execution vulnerabilities. An unauthenticated, remote attacker can
exploit these issues by convincing a user to visit a specially crafted
website, resulting in the execution of arbitrary code in the context
of the current user.");
script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-023");
script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-16-195/");
script_set_attribute(attribute:"solution", value:
"Microsoft has released a set of patches for Windows Vista, 2008, 7,
2008 R2, 2012, 8.1, RT 8.1, 2012 R2, and 10.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-0114");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2016/03/08");
script_set_attribute(attribute:"patch_publication_date", value:"2016/03/08");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/03/08");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
script_set_attribute(attribute:"cpe", value:"cpe:/a:microsoft:ie");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows : Microsoft Bulletins");
script_copyright(english:"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
script_require_keys("SMB/MS_Bulletin_Checks/Possible");
script_require_ports(139, 445, "Host/patch_management_checks");
exit(0);
}
include("audit.inc");
include("smb_hotfixes_fcheck.inc");
include("smb_hotfixes.inc");
include("smb_func.inc");
include("smb_reg_query.inc");
include("misc_func.inc");
get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
bulletin = 'MS16-023';
kbs = make_list('3139929', '3140745', '3140768');
if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);
get_kb_item_or_exit("SMB/Registry/Enumerated");
get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);
if (hotfix_check_sp_range(vista:'2', win7:'1', win8:'0', win81:'0', win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
productname = get_kb_item_or_exit("SMB/ProductName", exit_code:1);
if ("Windows 8" >< productname && "8.1" >!< productname)
audit(AUDIT_OS_SP_NOT_VULN);
if (hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE);
share = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);
if (
# Windows 10
hotfix_is_vulnerable(os:"10", sp:0, file:"mshtml.dll", version:"11.0.10586.162", min_version:"11.0.10586.0", dir:"\system32", bulletin:bulletin, kb:"3140768") ||
hotfix_is_vulnerable(os:"10", sp:0, file:"mshtml.dll", version:"11.0.10240.16724", min_version:"11.0.10240.16000", dir:"\system32", bulletin:bulletin, kb:"3140745") ||
# Windows 8.1 / Windows Server 2012 R2
# Internet Explorer 11
hotfix_is_vulnerable(os:"6.3", sp:0, file:"mshtml.dll", version:"11.0.9600.18231", min_version:"11.0.9600.17000", dir:"\system32", bulletin:bulletin, kb:"3139929") ||
# Windows Server 2012
# Internet Explorer 10
hotfix_is_vulnerable(os:"6.2", sp:0, file:"mshtml.dll", version:"10.0.9200.21767", min_version:"10.0.9200.21000", dir:"\system32", bulletin:bulletin, kb:"3139929") ||
hotfix_is_vulnerable(os:"6.2", sp:0, file:"mshtml.dll", version:"10.0.9200.17647", min_version:"10.0.9200.16000", dir:"\system32", bulletin:bulletin, kb:"3139929") ||
# Windows 7 / Server 2008 R2
# Internet Explorer 11
hotfix_is_vulnerable(os:"6.1", sp:1, file:"mshtml.dll", version:"11.0.9600.18231", min_version:"11.0.9600.17000", dir:"\system32", bulletin:bulletin, kb:"3139929") ||
# Vista / Windows Server 2008
# Internet Explorer 9
hotfix_is_vulnerable(os:"6.0", sp:2, file:"mshtml.dll", version:"9.0.8112.20864", min_version:"9.0.8112.20000", dir:"\system32", bulletin:bulletin, kb:"3139929") ||
hotfix_is_vulnerable(os:"6.0", sp:2, file:"mshtml.dll", version:"9.0.8112.16749", min_version:"9.0.8112.16000", dir:"\system32", bulletin:bulletin, kb:"3139929")
)
{
set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);
hotfix_security_hole();
hotfix_check_fversion_end();
}
else
{
hotfix_check_fversion_end();
audit(AUDIT_HOST_NOT, 'affected');
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0102
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0103
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0104
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0105
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0106
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0107
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0108
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0109
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0110
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0111
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0112
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0113
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0114
docs.microsoft.com/en-us/security-updates/SecurityBulletins/2016/ms16-023
www.zerodayinitiative.com/advisories/ZDI-16-195/
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS
Percentile
98.8%