Kaspersky ID:
KLA10769
Detect Date:
03/08/2016
Updated:
01/22/2024

Description

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code or gain privileges.

Below is a complete list of vulnerabilities

  1. An improper input validation can be exploited by logged in attacker via a specially designed application to execute arbitrary code;
  2. An improper OpenType fonts handling at Windows Adobe Type Manager Library can be exploited remotely via a specially designed content to cause denial of service or execute arbitrary code;
  3. An improper resources handling at media library can be exploited remotely via a specially designed media content to execute arbitrary code;
  4. An improper .pdf parsing can be exploited remotely via a specially designed pdf file to execute arbitrary code;
  5. An improper input validation at OLE can be exploited remotely via a specially designed file, application or content to execute arbitrary code;
  6. An improper memory handlers sanitization can be exploited by logged in attacker to gain privileges;
  7. An improper request handling at Secondary Logon Service can be exploited by logged in attacker via a specially designed application to gain privileges;
  8. An improper memory objects validation at USB Mass Storage Class can be exploited by attacker with physical access via a specially designed USB device to gain privileges;
  9. An improper memory objects handling at Windows kernel-mode can be exploited by logged in attacker via a specially designed application to cause denial of service.

Technical details

Vulnerability (2) can be mitigated by renaming ATMFD.DLL and optionally (Fir Windows 8 and later OS) disabling ATMFD via registry. For further instructions you can navigate to MS16-026 listed in original advisories section.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2016-0094
    high
  • CVE-2016-0095
    high
  • CVE-2016-0121
    critical
  • CVE-2016-0120
    high
  • CVE-2016-0118
    critical
  • CVE-2016-0087
    high
  • CVE-2016-0091
    high
  • CVE-2016-0092
    critical
  • CVE-2016-0093
    high
  • CVE-2016-0098
    critical
  • CVE-2016-0096
    high
  • CVE-2016-0100
    high
  • CVE-2016-0099
    high
  • CVE-2016-0101
    critical
  • CVE-2016-0133
    high
  • CVE-2016-0117
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.