First published: Wed Sep 14 2016(Updated: )
The kernel in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 mishandles session objects, which allows local users to hijack sessions, and consequently gain privileges, via a crafted application, aka "Windows Session Object Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-3305.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Windows 10 | ||
Windows 10 | =1511 | |
Windows 10 | =1607 | |
Windows 10 | =1703 | |
Microsoft Windows 7 | =sp1 | |
Microsoft Windows | ||
Microsoft Windows RT | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Vista | =sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3306 is rated as critical due to its potential for local privilege escalation.
To fix CVE-2016-3306, apply the latest security updates provided by Microsoft for all affected Windows versions.
CVE-2016-3306 affects Microsoft Windows Vista SP2, Windows 7 SP1, Windows 8.1, Windows 10, and various versions of Windows Server.
CVE-2016-3306 can be exploited locally by authenticated users to hijack session objects.
CVE-2016-3306 does not affect Windows 10 version 1703 as it is prior to the release of this vulnerability.