Kaspersky ID:
KLA10885
Detect Date:
10/11/2016
Updated:
01/22/2024

Description

Multiple serious vulnerabilities have been found in Microsoft Internet Explorer and Edge. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information or gain privileges.

Below is a complete list of vulnerabilities

  1. An improper memory objects handling can be exploited remotely via a specially designed content to execute arbitrary code;
  2. An improper memory objects handling at Chakra JavaScript engine can be exploited remotely via a specially designed content to execute arbitrary code;
  3. An improper memory objects handling can be exploited remotely via a specially designed content to obtain sensitive information;
  4. Lack of credential data storage restrictions can be exploited locally via harvesting memory dump to obtain sensitive information;
  5. Lack of private namespace security restrictions can be exploited remotely to gain privileges;
  6. An improper validation can be exploited remotely via a specially designed content to bypass security restrictions.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Related products

CVE list

  • CVE-2016-3331
    critical
  • CVE-2016-3298
    warning
  • CVE-2016-3267
    warning
  • CVE-2016-3392
    warning
  • CVE-2016-3391
    warning
  • CVE-2016-3390
    critical
  • CVE-2016-3389
    critical
  • CVE-2016-3388
    warning
  • CVE-2016-3387
    high
  • CVE-2016-3386
    critical
  • CVE-2016-3385
    critical
  • CVE-2016-3384
    critical
  • CVE-2016-3383
    critical
  • CVE-2016-3382
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.