Searching
..

Click anywhere to stop

KLA10840
Multiple vulnerabilities in Microsoft Windows

Updated: 02/03/2024
Detect date
?
07/12/2016
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, gain privileges or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. Lack of print driver validation restrictions at Windows Print Spooler can be exploited from adjacent network via man-in-the-middle attack or spoofing printer to execute arbitrary code;
  2. Lack of filesystem writing restrictions at Windows Print Spooler can be exploited by logged in attacker via a specially designed application to gain privileges;
  3. An improper memory objects handling at Windows Kernel Mode can be exploited by logged in attacker via a specially designed application to obtain sensitive information, gain privileges;
  4. Lack of memory information disclosure restrictions at Windows GDI can be exploited by logged in attacker via a specially designed application to obtain sensitive information;
  5. An unknown vulnerability at Windows Kernel can be exploited by logged in attacker to bypass security restrictions;
  6. An improper page fault calls handling can be exploited by logged in attacker via a specially designed application to obtain sensitive information;
  7. An improper policy handling can be exploited locally or by administer-rights attacker via a policy manipulations to bypass security restrictions.

Technical details

To mitigate (1) vulnerability you can change Point and Print Restrictions policies to enable users to print only to specific trusted print servers. More detailed information about this mitigation could be found at MS16-087 advisory, listed in original advisories section.

To mitigate (7) vulnerability you can configure BitLocker to use TPM+PIN protection or disable Secure Boot integrity protection of BitLocker. More detailed information about these mitigations could be found at MS16-094 advisory listed in original advisories section.

Affected products

Microsoft Windows 10 Version 1511
Microsoft Windows Vista Service Pack 2
Microsoft Windows Server 2008 Service Pack 2
Microsoft Windows 7 Service Pack 1
Micorosft Windows 2008 R2 Service Pack 1
Microsoft Windows 8.1
Microsoft Windows 2012
Microsoft Windows 2012 R2
Microsoft Windows RT
Microsoft Windows 10

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2016-3238
CVE-2016-3239
CVE-2016-3249
CVE-2016-3287
CVE-2016-3258
CVE-2016-3256
CVE-2016-3254
CVE-2016-3286
CVE-2016-3252
CVE-2016-3250
CVE-2016-3251

Impacts
?
ACE 
[?]

OSI 
[?]

SB 
[?]

PE 
[?]
Related products
Microsoft Windows Vista
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
CVE-IDS
?
CVE-2016-32388.1Critical
CVE-2016-32397.8Critical
CVE-2016-32497.3High
CVE-2016-32874.4Warning
CVE-2016-32584.7Warning
CVE-2016-32565.0Warning
CVE-2016-32547.8Critical
CVE-2016-32867.3High
CVE-2016-32527.3High
CVE-2016-32507.3High
CVE-2016-32512.8Warning
Microsoft official advisories
Microsoft Security Update Guide
KB list

3172985
3170377
3163912
3170455
3168965
3172727
4038782
4038786
4038783
4038792
4038799
4038793
4038781

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Find out the statistics of the vulnerabilities spreading in your region