KLA10856
Multiple vulnerabilities in Microsoft Windows

Updated: 09/26/2023
Detect date
?
08/09/2016
Severity
?
Critical
Description

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, gain privileges or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. An improper embedded fonts handling can be exploited remotely via a specially designed content to execute arbitrary code;
  2. An improper memory objects handling can be exploited by logged in attacker via a specially designed application to gain privileges;
  3. An improper boot manager load can be exploited by administer-rights attacker or locally via a specially designed boot manager to bypass security restrictions;
  4. An improper secure communication channel handling at Netlogon can be exploited from adjacent network via a specially designed application to gain privileges;
  5. An improper password change handling at Kerberos can be exploited from adjacent network via man-in-the-middle attack to gain privileges;
  6. An improper memory objects handling at Windows PDF library can be exploited remotely via a specially designed content to execute arbitrary code;
  7. An improper secure connection handling at Universal Outlook can be exploited remotely to obtain sensitive information;

Technical details

To mitigate vulnerability №3 configure BitLocker to use Trusted Platform Module (TPM)+PIN protection or disable Secure Boot integrity protection of BitLocker

To mitigate vulnerability №6 remove Microsoft Edge from the PDF reader default file type association (for Windows 10 only)

Affected products

Microsoft Windows Vista Service Pack 2
Microsoft Windows Server 2008 Service Pack 2
Microsoft Windows 7 Service Pack 1
Microsof windows Server 2008 R2 Service Pack 1
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows RT 8.1
Microsoft Windows 10

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2016-3319
CVE-2016-3320
CVE-2016-3312
CVE-2016-3311
CVE-2016-3310
CVE-2016-3309
CVE-2016-3308
CVE-2016-3304
CVE-2016-3303
CVE-2016-3301
CVE-2016-3300
CVE-2016-3237

Impacts
?
ACE 
[?]

OSI 
[?]

SB 
[?]

PE 
[?]
Related products
Microsoft Windows
Microsoft Windows Vista
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
CVE-IDS
?
CVE-2016-33199.3Critical
CVE-2016-33204.0Warning
CVE-2016-33125.0Critical
CVE-2016-33117.2High
CVE-2016-33107.2High
CVE-2016-33097.2High
CVE-2016-33087.2High
CVE-2016-33049.3Critical
CVE-2016-33039.3Critical
CVE-2016-33019.3Critical
CVE-2016-33007.2High
CVE-2016-32376.8High
Microsoft official advisories
Microsoft Security Update Guide
KB list

3175887
3176495
3176492
3176493
3177725
3178034
3172729
3177108
3192441
3194798
3192440
3185331
3185332
3192393
3192392
3167679

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Find out the statistics of the vulnerabilities spreading in your region