SB2016101103 - Multiple vulnerabilities in Microsoft Internet Explorer
Published: October 11, 2016 Updated: February 27, 2017
Security Bulletin ID
SB2016101103
Severity
High
Patch available
YES
Number of vulnerabilities
11
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 11 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2016-3298)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The vulnerablity exists due to improper handling of objects in memory by the Internet Messaging API. A remote attacker can create a specially crafted content, trick the victim into opening it, bypass security restrictions and determine the existence of arbitrary files.
Successful exploitation of the vulnerability results in information disclosure on the vulnerable system.
Note: the vulnerability was being actively exploited.
2) Information disclosure (CVE-ID: CVE-2016-3267)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to object memory handling error. A remote attacker can create a specially crafted content, trick the victim inro downloading it, trigger memory corruption and determine arbitrary files on the target system.
Successful exploitation of the vulnerability will result in information disclosure on the vulnerable system.
3) Memory corruption (CVE-ID: CVE-2016-3331)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness is due to boundary error when handling malicious files. A remote attacker can create a specially crafted content, trick the victim into downloading it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
4) Memory corruption (CVE-ID: CVE-2016-3382)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error in the Scripting Engine when handling malicious files. A remote attacker can create a specially crafted content, trick the victim into downloading it, trigger memory corruption and execute arbitrary code.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
5) Memory corruption (CVE-ID: CVE-2016-3383)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error when handling malicious files. A remote attacker can create a specially crafted content, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
6) Memory corruption (CVE-ID: CVE-2016-3384)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error when handling malicious files. A remote attacker can create a specially crafted content, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
7) Memory corruption (CVE-ID: CVE-2016-3385)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error when handling malicious files. A remote attacker can create a specially crafted content, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
8) Privilege Escalation (CVE-ID: CVE-2016-3387)
The vulnerability allows a remote attacker to gain elevated privileges.The weakness exists due to improper defense of private namespace by the browser. A remote attacker can create a specially crafted content, trick the victim into downloading it, gain privileged permissions to the namespace directory on the system.
Successful exploitation of the vulnerability will result in privilege escalation on the vulnerable system.
9) Privilege Escalation (CVE-ID: CVE-2016-3388)
The vulnerability allows a remote attacker to gain elevated privileges.The weakness is due to improper defense of private namespace by the browser. A remote attacker can create a specially crafted content, trick the victim into downloading it, gain privileged permissions to the namespace directory on the system.
Successful exploitation of the vulnerability will result in privilege escalation on the vulnerable system.
10) Memory corruption (CVE-ID: CVE-2016-3390)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to boundary error in the Scripting Engine when handling malicious files. A remote attacker can create a specially crafted content, trick the victim into downloading it, trigger memory corruption and execute arbitrary code.
Successful exploitation of the vulnerability will result in arbitrary code execution.
11) Information disclosure (CVE-ID: CVE-2016-3391)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.The weakness exists due to improper storage of credential data in memory. A remote attacker can access access a memory dump and get credential information.
Successful exploitation of the vulnerability will result in personal data disclosure.
Remediation
Install update from vendor's website.