KLA10735
Multiple vulnerabilities in Microsoft Windows
Updated: 07/22/2020
Detect date
?
01/12/2016
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to bypass security restrictions, gain privileges execute arbitrary code or obtain sensitive information. Below is a complete list of vulnerabilities

  1. Improper memory objects handling at Windows graphics device can be exploited remotely via a specially designed web content to bypass Address Space Layout Randomization;
  2. Improper memory handling at Win32k can be exploited remotely via a specially designed web content to execute arbitrary code;
  3. Improper input validation at DLL loading can be exploited by logged in attacker via a specially designed application to gain privileges or execute arbitrary code;
  4. Improper user input validation at Microsoft DirectShow can be exploited remotely via a specially designed file;
  5. Lack of login restrictions at Remote Desktop Protocol can be exploited remotely via a specially designed RDP connect to bypass security restrictions;
  6. Multiple unknown vulnerabilities at Windows Mount Point can be exploited by logged in attacker to gain privileges.
Affected products

Windows 7 for 32-bit Systems Service Pack 1
Windows 10 Version 1511 for 32-bit Systems
Windows Vista Service Pack 2
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 1511 for x64-based Systems
Windows 8.1 for 32-bit systems
Windows Server 2012
Windows RT 8.1
Windows 10 Version 1607 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2012 (Server Core installation)
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2012 R2
Windows Server 2016 (Server Core installation)
Windows 10 for x64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows 8.1 for x64-based systems

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2016-0007
CVE-2016-0006
CVE-2016-0020
CVE-2016-0002
CVE-2016-0009
CVE-2016-0015
CVE-2016-0016
CVE-2016-0018
CVE-2016-0019
CVE-2016-0014

Impacts
?
ACE 
[?]

SB 
[?]

PE 
[?]
Related products
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Vista
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
CVE-IDS
?
CVE-2016-00070.0Unknown
CVE-2016-00060.0Unknown
CVE-2016-00200.0Unknown
CVE-2016-00090.0Unknown
CVE-2016-00150.0Unknown
CVE-2016-00160.0Unknown
CVE-2016-00180.0Unknown
CVE-2016-00190.0Unknown
CVE-2016-00140.0Unknown
CVE-2016-00020.0Unknown
Microsoft official advisories
Microsoft Security Update Guide
KB list

3110329
3109560
3121212
3121918
3108664
3124000
3121461

Exploitation

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/39311

https://www.exploit-db.com/exploits/39310

https://www.exploit-db.com/exploits/39311

https://www.exploit-db.com/exploits/39232

https://www.exploit-db.com/exploits/39233