KLA10856
Multiple vulnerabilities in Microsoft Windows

Обновлено: 22/07/2020
Дата обнаружения
09/08/2016
Уровень угрозы
Critical
Описание

Multiple serious vulnerabilities have been found in Microsoft Windows. Malicious users can exploit these vulnerabilities to bypass security restrictions, execute arbitrary code, gain privileges or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. An improper embedded fonts handling can be exploited remotely via a specially designed content to execute arbitrary code;
  2. An improper memory objects handling can be exploited by logged in attacker via a specially designed application to gain privileges;
  3. An improper boot manager load can be exploited by administer-rights attacker or locally via a specially designed boot manager to bypass security restrictions;
  4. An improper secure communication channel handling at Netlogon can be exploited from adjacent network via a specially designed application to gain privileges;
  5. An improper password change handling at Kerberos can be exploited from adjacent network via man-in-the-middle attack to gain privileges;
  6. An improper memory objects handling at Windows PDF library can be exploited remotely via a specially designed content to execute arbitrary code;
  7. An improper secure connection handling at Universal Outlook can be exploited remotely to obtain sensitive information;

Technical details

To mitigate vulnerability №3 configure BitLocker to use Trusted Platform Module (TPM)+PIN protection or disable Secure Boot integrity protection of BitLocker

To mitigate vulnerability №6 remove Microsoft Edge from the PDF reader default file type association (for Windows 10 only)

Пораженные продукты

Microsoft Windows Vista Service Pack 2
Microsoft Windows Server 2008 Service Pack 2
Microsoft Windows 7 Service Pack 1
Microsof windows Server 2008 R2 Service Pack 1
Microsoft Windows 8.1
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows RT 8.1
Microsoft Windows 10

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2016-3319
CVE-2016-3320
CVE-2016-3312
CVE-2016-3311
CVE-2016-3310
CVE-2016-3309
CVE-2016-3308
CVE-2016-3304
CVE-2016-3303
CVE-2016-3301
CVE-2016-3300
CVE-2016-3237
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

SB 
[?]

PE 
[?]
Связанные продукты
Microsoft Windows
Microsoft Windows Vista
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
CVE-IDS
CVE-2016-33199.3Critical
CVE-2016-33204.0Warning
CVE-2016-33125.0Critical
CVE-2016-33117.2High
CVE-2016-33107.2High
CVE-2016-33097.2High
CVE-2016-33087.2High
CVE-2016-33049.3Critical
CVE-2016-33039.3Critical
CVE-2016-33019.3Critical
CVE-2016-33007.2High
CVE-2016-32376.8High