Kaspersky ID:
KLA10844
Detect Date:
07/12/2016
Updated:
01/22/2024

Description

Multiple serious vulnerabilities have been found in Microsoft browsers. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. An improper memory objects handling can be exploited via a specially designed content to execute arbitrary code;
  2. Lack of ports restrictions can be exploited remotely via a specially designed content to trick user into connecting to the remote system;
  3. Multiple memory corruption vulnerabilities can be exploited remotely via a specially designed content to execute arbitrary code;
  4. An improper user-specific conditions validation at XSS Filter can be exploited remotely via a specially designed content to obtain sensitive information;
  5. Lack of HTTP content restrictions can be exploited remotely via a specially designed content to spoof user interface.

Original advisories

Related products

CVE list

  • CVE-2016-3204
    critical
  • CVE-2016-3248
    critical
  • CVE-2016-3259
    critical
  • CVE-2016-3260
    critical
  • CVE-2016-3261
    warning
  • CVE-2016-3264
    critical
  • CVE-2016-3265
    critical
  • CVE-2016-3269
    critical
  • CVE-2016-3271
    warning
  • CVE-2016-3273
    warning
  • CVE-2016-3274
    warning
  • CVE-2016-3276
    warning
  • CVE-2016-3277
    warning
  • CVE-2016-3240
    critical
  • CVE-2016-3241
    critical
  • CVE-2016-3242
    critical
  • CVE-2016-3243
    critical
  • CVE-2016-3244
    warning
  • CVE-2016-3245
    warning
  • CVE-2016-3246
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.