vulnerability

MS16-153: Security Update for Common Log File System Driver (3207328)

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
Dec 13, 2016
Added
Dec 13, 2016
Modified
Nov 18, 2021

Description

An information disclosure vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to bypass security measures on the affected system allowing further exploitation.

Solutions

WINDOWS-HOTFIX-MS16-144-0137cfb4-5203-45f1-bb2b-8054030a555bWINDOWS-HOTFIX-MS16-144-02d26780-1d67-435d-b629-461cc57a0a7dWINDOWS-HOTFIX-MS16-144-081b8efa-a01d-4567-8f4a-188d7385a0eaWINDOWS-HOTFIX-MS16-144-0b86866e-3d6d-47c1-bf17-71928781d802WINDOWS-HOTFIX-MS16-144-29870417-440b-4667-849d-18ffefb32547WINDOWS-HOTFIX-MS16-144-36100bdd-30f5-4039-b8dd-fdde8720f835WINDOWS-HOTFIX-MS16-144-431bdad0-e68b-4275-8f14-e9c90fa2a9b0WINDOWS-HOTFIX-MS16-144-51ad43df-951a-49f7-8a33-dd04782a6bf1WINDOWS-HOTFIX-MS16-144-6bbcbf4b-2cf7-470e-b63b-57a8f4529c87WINDOWS-HOTFIX-MS16-144-85c2e54c-9120-4095-819e-27693fd85db6WINDOWS-HOTFIX-MS16-144-a4aaf8b0-7672-4ce2-a63e-a4ea02b6a928WINDOWS-HOTFIX-MS16-144-aefda319-d2f7-4ecc-be6b-9bcf2e617a30WINDOWS-HOTFIX-MS16-144-b6fe6c4a-089b-43be-8cd8-ebaa394a9424WINDOWS-HOTFIX-MS16-144-cd2c42a9-1799-477d-a5f5-e84cf4d40ba6WINDOWS-HOTFIX-MS16-144-d2439e7c-0dc5-41d2-b412-5616d415c0e1WINDOWS-HOTFIX-MS16-144-f20a00d1-dce0-4397-bde1-a8f06d87ad1aWINDOWS-HOTFIX-MS16-144-f7915dec-5649-4571-8913-6797401db5afWINDOWS-HOTFIX-MS16-144-f9443926-54c2-4542-bfa0-9b8e6e1ba3d7WINDOWS-HOTFIX-MS16-144-ff4c348a-c6c2-4bbc-af33-01ef3ae1cc6eWINDOWS-HOTFIX-MS16-153-42dff54d-ad8c-4d5c-894b-a9a200c26cf3WINDOWS-HOTFIX-MS16-153-95b949fd-554a-468e-b545-be044d5b1a27WINDOWS-HOTFIX-MS16-153-bb8fe503-2995-4d24-80de-1aea66c59938WINDOWS-HOTFIX-MS16-153-f4b3eaf5-5184-4545-990e-7ad2fc1288dfWINDOWS-HOTFIX-MS16-153-f64b8929-67e3-4337-b40a-ce37e08c4e49
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.