Think you have a false positive on this rule?

Sid 1-44598

Message

FILE-OFFICE Microsoft Office ociw32.dll dll-load exploit attempt

Summary

This event is generated when a dll-load is detected.

Impact

Attempted User Privilege Gain

CVE-2016-0041:

CVSS base score 7.8

CVSS impact score 5.9

CVSS exploitability score 1.8

Confidentiality Impact HIGH

Integrity Impact HIGH

Availability Impact HIGH

Detailed information

CVE-2016-0041: Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold and 1511, and Internet Explorer 10 and 11 mishandle DLL loading, which allows local users to gain privileges via a crafted application, aka "DLL Loading Remote Code Execution Vulnerability."

Affected systems

  • microsoft internet_explorer 10
  • microsoft internet_explorer 11
  • microsoft windows_10 -
  • microsoft windows_10 1511
  • microsoft windows_7 *
  • microsoft windows_8.1 *
  • microsoft windowsrt8.1 *
  • microsoft windowsserver2008 *
  • microsoft windowsserver2008 r2
  • microsoft windowsserver2012 *
  • microsoft windowsserver2012 r2
  • microsoft windows_vista *

Ease of attack

CVE-2016-0041:

Access Vector

Access Complexity

Authentication

False positives

False negatives

Corrective action

Contributors

  • Cisco's Talos Intelligence Group

Additional References

  • technet.microsoft.com/en-us/security/bulletin/MS16-014