CISA KEV 정보
| 취약점명 | Microsoft Internet Explorer Messaging API Information Disclosure Vulnerability |
|---|---|
| 설명 | An information disclosure vulnerability exists when the Microsoft Internet Messaging API improperly handles objects in memory. An attacker who successfully exploited this vulnerability could allow the attacker to test for the presence of files on disk. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-200 |
| 등록일 (KEV) | 2022-05-24 |
| 조치 기한 | 2022-06-14 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2016-3298 |
NVD 상세 정보
CVSS v3.1: 6.5 MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NCVSS v2.0: 2.6
AV:N/AC:H/Au:N/C:P/I:N/A:N설명: Microsoft Internet Explorer 9 through 11 and the Internet Messaging API in Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allow remote attackers to determine the existence of arbitrary files via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability."
참조
- http://www.securityfocus.com/bid/93392 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1036992 [Broken Link, Third Party Advisory, VDB Entry]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-118 [Patch, Vendor Advisory]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-126 [Patch, Vendor Advisory]
- http://www.securityfocus.com/bid/93392 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1036992 [Broken Link, Third Party Advisory, VDB Entry]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-118 [Patch, Vendor Advisory]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-126 [Patch, Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-3298
This product uses the NVD API but is not endorsed or certified by the NVD.