First published: Wed Jan 13 2016(Updated: )
The sandbox implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, and Windows 10 Gold and 1511 mishandles reparse points, which allows local users to gain privileges via a crafted application, aka "Windows Mount Point Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-0006.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | =1511 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows 8.0 | ||
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0007 is rated as important due to the potential for local privilege escalation affecting various Microsoft Windows versions.
To remediate CVE-2016-0007, install the latest security updates provided by Microsoft for your affected Windows version.
CVE-2016-0007 affects Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8, Windows 8.1, Windows 10, and various Windows Server versions.
CVE-2016-0007 is a local privilege escalation vulnerability due to improper handling of reparse points.
CVE-2016-0007 requires local access to the system, meaning it cannot be exploited remotely without local user privileges.