SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows DLL (Any) Vendors:   Microsoft
Windows Journal File Processing Flaw Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1034974
SecurityTracker URL:  http://securitytracker.com/id/1034974
CVE Reference:   CVE-2016-0038   (Links to External Site)
Updated:  Feb 10 2016
Original Entry Date:  Feb 9 2016
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1, 8, 8.1, 2012, 2012 R2, 10; and prior service packs
Description:   A vulnerability was reported in Windows Journal. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted Windows Journal (.jnt) file that, when loaded by the target user, will execute arbitrary code on the target user's system.

Rohit Mothe of VeriSign iDefense Labs reported this vulnerability.

Impact:   A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a fix.

Windows Vista Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=5d00ac0b-3004-4636-9808-1aa6a3d0f1bd

Windows Vista x64 Edition Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=410330fc-2804-4584-b5a4-11cf214f5961

Windows Server 2008 for 32-bit Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=d4f73003-2c83-4690-9b61-c8da35fa8d11

Windows Server 2008 for x64-based Systems Service Pack 2:

https://www.microsoft.com/downloads/details.aspx?familyid=16f6671c-d5b6-4b62-9af4-fc2b014e002d

Windows 7 for 32-bit Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=d384a98c-44f8-48ab-a750-cb3423263d50

Windows 7 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=ad933ffb-6827-4593-9aa5-44adc4ef49bd

Windows Server 2008 R2 for x64-based Systems Service Pack 1:

https://www.microsoft.com/downloads/details.aspx?familyid=e658b762-9d9d-4a9b-82e6-88e49ab5a610

Windows 8.1 for 32-bit Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=df9da91e-67d5-45a9-b072-2512fc02efee

Windows 8.1 for x64-based Systems:

https://www.microsoft.com/downloads/details.aspx?familyid=f0574dfe-4b3a-43c7-b33e-e10c44332780

Windows Server 2012:

https://www.microsoft.com/downloads/details.aspx?familyid=a87f3a4b-76fc-454e-ba68-4a1d1ae5778e

Windows Server 2012 R2:

https://www.microsoft.com/downloads/details.aspx?familyid=2620ef65-f0db-46c2-ac7b-bee2386f8345

The Microsoft advisory is available at:

https://technet.microsoft.com/library/security/ms16-013

Vendor URL:  technet.microsoft.com/library/security/ms16-013 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC