KLA10769
Multiple vulnerabilities in Microsoft Windows
Обновлено: 17/06/2019
Дата обнаружения
08/03/2016
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code or gain privileges.

Below is a complete list of vulnerabilities

  1. An improper input validation can be exploited by logged in attacker via a specially designed application to execute arbitrary code;
  2. An improper OpenType fonts handling at Windows Adobe Type Manager Library can be exploited remotely via a specially designed content to cause denial of service or execute arbitrary code;
  3. An improper resources handling at media library can be exploited remotely via a specially designed media content to execute arbitrary code;
  4. An improper .pdf parsing can be exploited remotely via a specially designed pdf file to execute arbitrary code;
  5. An improper input validation at OLE can be exploited remotely via a specially designed file, application or content to execute arbitrary code;
  6. An improper memory handlers sanitization can be exploited by logged in attacker to gain privileges;
  7. An improper request handling at Secondary Logon Service can be exploited by logged in attacker via a specially designed application to gain privileges;
  8. An improper memory objects validation at USB Mass Storage Class can be exploited by attacker with physical access via a specially designed USB device to gain privileges;
  9. An improper memory objects handling at Windows kernel-mode can be exploited by logged in attacker via a specially designed application to cause denial of service.

Technical details

Vulnerability (2) can be mitigated by renaming ATMFD.DLL and optionally (Fir Windows 8 and later OS) disabling ATMFD via registry. For further instructions you can navigate to MS16-026 listed in original advisories section.

Пораженные продукты

Microsoft Windows Vista Service Pack 2
Microsoft Windows Server 2008 Service Pack 2
Microsoft Windows 7 Service Pack 1
Microsoft Windows Server 2008 R2 Service Pack 1
Microsoft Windows 8.1
Microsoft Windows 2012
Microsoft Windows 2012 R2
Microsoft Windows RT 8.1
Microsoft Windows 10
Microsoft Windows 10 Version 1511

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2016-0094
CVE-2016-0095
CVE-2016-0121
CVE-2016-0120
CVE-2016-0118
CVE-2016-0087
CVE-2016-0091
CVE-2016-0092
CVE-2016-0093
CVE-2016-0098
CVE-2016-0096
CVE-2016-0100
CVE-2016-0099
CVE-2016-0101
CVE-2016-0133
CVE-2016-0117
Оказываемое влияние
?
ACE 
[?]

DoS 
[?]

PE 
[?]
Связанные продукты
Microsoft Windows Vista
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
CVE-IDS
Microsoft official advisories
Microsoft Security Update Guide
KB list

3140768
3140745
3139398
3139940
3140709
3143136
3138962
3139914
3140735
3143145
3143146
3140410
3143141
3143142
3143081
3139852
3137513
3143148
3138910