LDAP: Microsoft Windows Domain User Code Execution

A code execution vulnerability exists in Microsoft Windows. A remote attacker with domain credentials can exploit this vulnerability by sending specially crafted requests to the target server. Successful exploitation will allow an attacker to execute arbitrary code with elevated privileges.

Extended Description

Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allow remote authenticated users to execute arbitrary code by leveraging a domain account to make a crafted request, aka "Windows Remote Code Execution Vulnerability."

Affected Products

Microsoft windows_rt_8.1

References

CVE: CVE-2016-3368

Short Name
LDAP:WINDOWS-DOM-USER-RCE
Severity
Major
Recommended
True
Recommended Action
Drop
Category
LDAP
Keywords
CVE-2016-3368 Code Domain Execution Microsoft User Windows
Release Date
10/06/2016
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Microsoft

CVSS Score

9.0

Found a potential security threat?