SB2016091307 - Multiple vulnerabilities in Microsoft Internet Explorer and Edge
Published: September 13, 2016 Updated: February 15, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 10 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2016-3375)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Memory corruption (CVE-ID: CVE-2016-3247)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error. A remote attacker can create a specially crafted Web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Cross-site scripting (CVE-ID: CVE-2016-3291)
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-input. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user’s browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
4) Privilege escalation (CVE-ID: CVE-2016-3292)
The vulnerability allows a remote attacker to gain elevated privileges on the target system.
The vulnerability exists due to improper checking of zone and integrity settings. A remote attacker can create a specially crafted content, trick the victim into opening it, escape the sandbox and gain elevated privileges.
Successful exploitation of this vulnerability results in information disclosure on the vulnerable system.
5) Memory corruption (CVE-ID: CVE-2016-3295)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
6) Memory corruption (CVE-ID: CVE-2016-3297)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error. A remote attacker can create a specially crafted Web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
7) Memory corruption (CVE-ID: CVE-2016-3324)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in complete compromise of the vulnerable system.
8) Memory corruption (CVE-ID: CVE-2016-3325)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to boundary error when handling a malicious file. A remote attacker can create a specially crafted content, trick the victim into opening it, trigger memory corruption and gain access to potentially sensitive data.
9) Memory corruption (CVE-ID: CVE-2016-3351)
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to boundary error when handling of malicious files. A remote attacker can create a specially crafted content, trick the victim into opening it, trigger memory corruption and gain access to arbitrary data.
Note: the vulnerability was being actively exploited.
10) Security bypass (CVE-ID: CVE-2016-3353)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to improper handling of .URL files from the Internet zone. A remot attacker can create a specially crafted .URL file, trick the victim into opening it and bypass security features in the victim's browser.
Successful exploitation of the vulnerability results in security bypass on the target system.
Remediation
Install update from vendor's website.