Intrusion Prevention

MS.Windows.MSXML.Use.After.Free

Description

This indicates an attack attempt to exploit a Code Execution vulnerability in Microsoft Windows.
The vulnerability is due to an error in MSXML3 library when handling malicious XML document. An attacker can exploit this to execute arbitrary code on vulnerable systems via a crafted XML file.

Affected Products

Windows Vista
Windows Server 2008
Windows 7
Windows 8.1
Windows Server 2012 and Windows Server 2012 R2
Windows RT 8.1
Windows 10

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor
http://technet.microsoft.com/security/bulletin/MS16-040

CVE References

CVE-2016-0147