KLA11914
Multiple vulnerability in Microsoft Products (ESU)

Updated: 01/18/2022
Detect date
?
05/10/2016
Severity
?
Critical
Description

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Windows Graphics Component can be exploited remotely via specially crafted website to execute arbitrary code.
  2. A remote code execution vulnerability in Windows Media Center can be exploited remotely via specially crafted to execute arbitrary code.
  3. A memory corruption vulnerability in Windows Imaging Component can be exploited remotely via specially crafted website to execute arbitrary code.
  4. A remote code execution vulnerability in RPC Network Data Representation Engine can be exploited remotely via specially crafted to execute arbitrary code.
  5. A remote code execution vulnerability in Windows DLL Loading can be exploited remotely to execute arbitrary code.
  6. An information disclosure vulnerability in Windows Graphics Component can be exploited remotely via specially crafted document to obtain sensitive information.
  7. An elevation of privilege vulnerability in DirectX can be exploited remotely via specially crafted application to gain privileges.
  8. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  9. An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
  10. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
  11. A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  12. A memory corruption vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to execute arbitrary code.
  13. Use-after-free vulnerability in GDI can be exploited remotely via specially crafted website to execute arbitrary code.
  14. A memory corruption vulnerability in Windows Journal can be exploited remotely via specially crafted to execute arbitrary code.
  15. An elevation of privilege vulnerability in Microsoft DirectX Graphics Kernel Subsystem can be exploited remotely via specially crafted application to gain privileges.
Exploitation

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/39805

https://www.exploit-db.com/exploits/40118

https://www.exploit-db.com/exploits/39960

https://www.exploit-db.com/exploits/39959

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Affected products

Windows Server 2012 R2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Microsoft Edge (EdgeHTML-based)
Windows Server 2008 for x64-based Systems (Server Core installation)
Windows Server 2012 (Server Core installation)
Windows 8.1 for 32-bit systems
Windows RT 8.1
Windows Server 2008 for x64-based Systems Service Pack 2
Internet Explorer 10
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows 8.1 for x64-based systems
Windows 10 Version 1511 for 32-bit Systems
Windows Vista Service Pack 2
Internet Explorer 11
Windows 10 Version 1511 for x64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows 10 for 32-bit Systems
Internet Explorer 9
Windows Server 2008 for 32-bit Systems (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 10 for x64-based Systems
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Original advisories

CVE-2016-0170
CVE-2016-0185
CVE-2016-0195
CVE-2016-0178
CVE-2016-0152
CVE-2016-0168
CVE-2016-0176
CVE-2016-0174
CVE-2016-0175
CVE-2016-0180
CVE-2016-0173
CVE-2016-0189
CVE-2016-0171
CVE-2016-0187
CVE-2016-0192
CVE-2016-0184
CVE-2016-0169
CVE-2016-0182
CVE-2016-0196
CVE-2016-0197

Impacts
?
ACE 
[?]

OSI 
[?]

PE 
[?]
Related products
Microsoft Internet Explorer
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Vista
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
Microsoft Edge
CVE-IDS
?
CVE-2016-01859.3Critical
CVE-2016-01897.6Critical
CVE-2016-01877.6Critical
CVE-2016-01927.6Critical
CVE-2016-01977.2High
CVE-2016-01967.2High
CVE-2016-01959.3Critical
CVE-2016-01527.2High
CVE-2016-01684.3Warning
CVE-2016-01767.2High
CVE-2016-01747.2High
CVE-2016-01752.1Warning
CVE-2016-01807.2High
CVE-2016-01737.2High
CVE-2016-01709.3Critical
CVE-2016-01717.2High
CVE-2016-01849.3Critical
CVE-2016-01694.3Warning
CVE-2016-01829.3Critical
CVE-2016-01789.0Critical
KB list

3156016
3156013
3141083
3156019
3155178
3153171
3156017
3153199
3155413
3158991
3150220
3154070

Microsoft official advisories
Microsoft Security Update Guide
Find out the statistics of the vulnerabilities spreading in your region