CVE-2016-0145
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
12/04/2016
Last modified:
12/04/2025
Description
The font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold and 1511; Office 2007 SP3 and 2010 SP2; Word Viewer; .NET Framework 3.0 SP2, 3.5, and 3.5.1; Skype for Business 2016; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:live_meeting:2007:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:lync:2010:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:lync:2010:*:attendee:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:skype_for_business:2016:*:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securitytracker.com/id/1035528
- http://www.securitytracker.com/id/1035529
- http://www.securitytracker.com/id/1035530
- http://www.securitytracker.com/id/1035531
- http://www.securitytracker.com/id/1035532
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-039
- https://www.exploit-db.com/exploits/39743/
- http://www.securitytracker.com/id/1035528
- http://www.securitytracker.com/id/1035529
- http://www.securitytracker.com/id/1035530
- http://www.securitytracker.com/id/1035531
- http://www.securitytracker.com/id/1035532
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-039
- https://www.exploit-db.com/exploits/39743/



