Kaspersky ID:
KLA10840
Дата обнаружения:
12/07/2016
Обновлено:
03/02/2024

Описание

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, gain privileges or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. Lack of print driver validation restrictions at Windows Print Spooler can be exploited from adjacent network via man-in-the-middle attack or spoofing printer to execute arbitrary code;
  2. Lack of filesystem writing restrictions at Windows Print Spooler can be exploited by logged in attacker via a specially designed application to gain privileges;
  3. An improper memory objects handling at Windows Kernel Mode can be exploited by logged in attacker via a specially designed application to obtain sensitive information, gain privileges;
  4. Lack of memory information disclosure restrictions at Windows GDI can be exploited by logged in attacker via a specially designed application to obtain sensitive information;
  5. An unknown vulnerability at Windows Kernel can be exploited by logged in attacker to bypass security restrictions;
  6. An improper page fault calls handling can be exploited by logged in attacker via a specially designed application to obtain sensitive information;
  7. An improper policy handling can be exploited locally or by administer-rights attacker via a policy manipulations to bypass security restrictions.

Technical details

To mitigate (1) vulnerability you can change Point and Print Restrictions policies to enable users to print only to specific trusted print servers. More detailed information about this mitigation could be found at MS16-087 advisory, listed in original advisories section.

To mitigate (7) vulnerability you can configure BitLocker to use TPM+PIN protection or disable Secure Boot integrity protection of BitLocker. More detailed information about these mitigations could be found at MS16-094 advisory listed in original advisories section.

Первичный источник обнаружения

Эксплуатация

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2016-3238
    critical
  • CVE-2016-3239
    critical
  • CVE-2016-3249
    high
  • CVE-2016-3287
    warning
  • CVE-2016-3258
    warning
  • CVE-2016-3256
    warning
  • CVE-2016-3254
    critical
  • CVE-2016-3286
    high
  • CVE-2016-3252
    high
  • CVE-2016-3250
    high
  • CVE-2016-3251
    warning

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.