KLA10897
Multiple vulnerabilities in Microsoft Windows

Обновлено: 12/11/2023
Дата обнаружения
08/11/2016
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, bypass security restrictions, cause denial of service, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  2. A remote code execution vulnerability in Microsoft Graphics can be exploited remotely via specially crafted embedded to execute arbitrary code.
  3. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  4. A remote code execution vulnerability in Microsoft Video Control can be exploited remotely via specially crafted file to execute arbitrary code.
  5. A security feature bypass vulnerability in Secure Boot Component can be exploited remotely to bypass security restrictions.
  6. An elevation of privilege vulnerability in Windows NTLM can be exploited remotely via specially crafted application to gain privileges.
  7. A denial of service vulnerability in Local Security Authority Subsystem Service can be exploited remotely via specially crafted request to cause denial of service.
  8. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.
  9. A memory corruption vulnerability in Windows Animation Manager can be exploited remotely to execute arbitrary code.
  10. An information disclosure vulnerability in Open Type Font can be exploited remotely via specially crafted to obtain sensitive information.
  11. A remote code execution vulnerability in Windows can be exploited remotely to execute arbitrary code.
  12. An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
  13. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  14. A memory corruption vulnerability in Media Foundation can be exploited remotely via specially crafted document to execute arbitrary code.
  15. An information disclosure vulnerability in Windows Bowser.sys can be exploited remotely via specially crafted application to obtain sensitive information.
  16. An information disclosure vulnerability in Virtual Secure Mode can be exploited remotely via specially crafted application to obtain sensitive information.
  17. An elevation of privilege vulnerability in Windows IME can be exploited remotely via specially crafted application to gain privileges.
  18. An elevation of privilege vulnerability in Task Scheduler can be exploited remotely via specially crafted to gain privileges.
  19. An elevation of privilege vulnerability in VHD Driver can be exploited remotely via specially crafted application to gain privileges.
Пораженные продукты

Windows 7 for 32-bit Systems Service Pack 1
Windows 10 Version 1511 for 32-bit Systems
Windows Vista Service Pack 2
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 1511 for x64-based Systems
Windows 8.1 for 32-bit systems
Windows Server 2012
Windows RT 8.1
Windows 10 Version 1607 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2012 (Server Core installation)
Microsoft Windows Hyperlink Object Library
Windows Server 2016
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2016 (Server Core installation)
Windows Server 2012 R2
Windows 10 for x64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows 8.1 for x64-based systems

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2016-7202
CVE-2016-7256
CVE-2016-7255
CVE-2016-7248
CVE-2016-7247
CVE-2016-7246
CVE-2016-7238
CVE-2016-7237
CVE-2016-0026
CVE-2016-3332
CVE-2016-3333
CVE-2016-3334
CVE-2016-3335
CVE-2016-3338
CVE-2016-3340
CVE-2016-3342
CVE-2016-3343
CVE-2016-7184
CVE-2016-7205
CVE-2016-7210
CVE-2016-7212
CVE-2016-7214
CVE-2016-7215
CVE-2016-7216
CVE-2016-7217
CVE-2016-7218
CVE-2016-7220
CVE-2016-7221
CVE-2016-7222
CVE-2016-7223
CVE-2016-7224
CVE-2016-7225
CVE-2016-7226
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]
Связанные продукты
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Vista
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
CVE-IDS
CVE-2016-72027.6Critical
CVE-2016-72569.3Critical
CVE-2016-72557.2High
CVE-2016-72489.3Critical
CVE-2016-72475.0Warning
CVE-2016-72467.2High
CVE-2016-72387.2High
CVE-2016-72376.8High
CVE-2016-00269.3Critical
CVE-2016-33329.3Critical
CVE-2016-33339.3Critical
CVE-2016-33349.3Critical
CVE-2016-33359.3Critical
CVE-2016-33389.3Critical
CVE-2016-33409.3Critical
CVE-2016-33429.3Critical
CVE-2016-33439.3Critical
CVE-2016-71849.3Critical
CVE-2016-72059.3Critical
CVE-2016-72104.3Warning
CVE-2016-72129.3Critical
CVE-2016-72142.1Warning
CVE-2016-72157.2High
CVE-2016-72162.1Warning
CVE-2016-72179.3Critical
CVE-2016-72181.9Warning
CVE-2016-72202.1Warning
CVE-2016-72217.2High
CVE-2016-72227.2High
CVE-2016-72233.6Warning
CVE-2016-72243.6Warning
CVE-2016-72253.6Warning
CVE-2016-72263.6Warning