KLA11907
Multiple vulnerabilities in Microsoft Products (ESU)

Обновлено: 22/07/2020
Дата обнаружения
13/09/2016
Уровень угрозы
Critical
Описание

Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, cause denial of service, obtain sensitive information, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Windows can be exploited remotely via specially crafted request to execute arbitrary code.
  2. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  3. An elevation of privilege vulnerability in Windows Session Object can be exploited remotely via specially crafted application to gain privileges.
  4. A remote code execution vulnerability in Windows SMB Authenticated can be exploited remotely via specially crafted packets to cause denial of service.
  5. An elevation of privilege vulnerability in Windows GDI can be exploited remotely via specially crafted application to gain privileges.
  6. A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
  7. A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  8. An information disclosure vulnerability in GDI+ can be exploited remotely via specially crafted application to obtain sensitive information.
  9. An information disclosure vulnerability in Microsoft Browser can be exploited remotely via specially crafted content to obtain sensitive information.
  10. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  11. A memory corruption vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to execute arbitrary code.
  12. An elevation of privilege vulnerability in Windows Kernel Local can be exploited remotely via specially crafted application to gain privileges.
  13. A security feature bypass vulnerability in Internet Explorer can be exploited remotely via specially crafted to bypass security restrictions.
Эксплуатация

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/40748

https://www.exploit-db.com/exploits/40430

https://www.exploit-db.com/exploits/40429

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Пораженные продукты

Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 10 for 32-bit Systems
Windows Vista x64 Edition Service Pack 2
Internet Explorer 9
Windows 10 for x64-based Systems
Windows Server 2012 (Server Core installation)
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2012
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 8.1 for x64-based systems
Windows 8.1 for 32-bit systems
Windows Vista Service Pack 2
Internet Explorer 11
Windows Server 2008 for x64-based Systems Service Pack 2
Windows RT 8.1
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows 10 Version 1703 for x64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows 10 Version 1511 for 32-bit Systems
Internet Explorer 8
Microsoft Edge (EdgeHTML-based)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows 10 Version 1511 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Internet Explorer 10
Windows 10 Version 1703 for 32-bit Systems
Windows Server 2012 R2

Решение

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Первичный источник обнаружения
CVE-2016-3368
CVE-2016-3371
CVE-2016-3305
CVE-2016-3306
CVE-2016-3345
CVE-2016-3355
CVE-2016-3324
CVE-2016-3375
CVE-2016-3354
CVE-2016-3351
CVE-2016-3372
CVE-2016-3348
CVE-2016-3297
CVE-2016-3373
CVE-2016-3353
Оказываемое влияние
?
ACE 
[?]

OSI 
[?]

DoS 
[?]

SB 
[?]

PE 
[?]
Связанные продукты
Microsoft Internet Explorer
Microsoft Windows
Microsoft Windows Server
Microsoft Windows Vista
Microsoft Windows Server 2012
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows Server 2008
Windows RT
Microsoft Windows 10
Microsoft Edge
CVE-IDS
CVE-2016-33246.8High
CVE-2016-33757.6Critical
CVE-2016-32976.8High
CVE-2016-33512.6Warning
CVE-2016-33535.1High
CVE-2016-33734.3Warning
CVE-2016-33689.0Critical
CVE-2016-33714.3Warning
CVE-2016-33723.6Warning
CVE-2016-33064.6Warning
CVE-2016-33459.0Critical
CVE-2016-33489.3Critical
CVE-2016-33544.3Warning
CVE-2016-33557.2High
CVE-2016-33054.6Warning
KB list

3184122
3185911
3177186
3184471
3175024
3185319