First published: Wed Jan 13 2016(Updated: )
The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka "Windows Mount Point Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0007.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | =1511 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0006 has a CVSS score that indicates it is a medium severity vulnerability.
To mitigate CVE-2016-0006, install the latest security updates provided by Microsoft for your affected Windows version.
CVE-2016-0006 affects multiple Windows versions including Windows 7 SP1, Windows 8, Windows 8.1, Windows 10, and various editions of Windows Server.
CVE-2016-0006 is a local privilege escalation vulnerability due to mishandled reparse points in Windows.
Exploitation of CVE-2016-0006 could allow local users to gain elevated privileges on the affected system.