Kaspersky ID:
KLA10924
Detect Date:
12/13/2016
Updated:
01/22/2024

Description

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information or gain privileges.

Below is a complete list of vulnerabilities:

  1. An improper handling of objects in memory while running a Windows Crypto driver in kernel mode can be exploited locally via a specially designed application to obtain sensitive information;
  2. Improper sanitizing of input (which leads to an insecure library loading behavior) in the Windows Installer can be exploited locally via a specially designed application to gain privileges;
  3. An improper handling of objects in memory in the Windows Common Log File System (CLFS) can be exploited locally via a specially designed application to obtain sensitive information from process memory.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2016-7271
    warning
  • CVE-2016-7273
    critical
  • CVE-2016-7272
    critical
  • CVE-2016-7257
    warning
  • CVE-2016-7281
    warning
  • CVE-2016-7279
    critical
  • CVE-2016-7278
    warning
  • CVE-2016-7283
    critical
  • CVE-2016-7282
    warning
  • CVE-2016-7292
    high
  • CVE-2016-7274
    critical
  • CVE-2016-7295
    warning
  • CVE-2016-7219
    warning
  • CVE-2016-7258
    warning
  • CVE-2016-7259
    high
  • CVE-2016-7260
    high

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.