SB2016110826 - Security Update for Microsoft Windows (3199172)



SB2016110826 - Security Update for Microsoft Windows (3199172)

Published: November 8, 2016

Security Bulletin ID SB2016110826
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Privilege escalation (CVE-ID: CVE-2016-7221)

A local attacker can obtain elevated privileges.

The vulnerability exists due to an error when loading DDL file in Windows Input Method Editor (IME). A local authenticated user can cause IME to load a specially crafted DLL file and execute arbitrary code on the system with elevated privileges.

Successful exploitation of this vulnerability will allow an attacker to gain elevated privileges on vulnerable system.


2) Privilege escalation (CVE-ID: CVE-2016-7222)

A local attacker can obtain elevated privileges.

The vulnerability exists due to an error when handling UNC paths in Windows Task Scheduler. A local authenticated user can create a task with specially crafted UNC path and execute it with elevated privileges.

Successful exploitation of this vulnerability will allow an attacker to gain elevated privileges on vulnerable system.


3) Remote code execution (CVE-ID: CVE-2016-7212)

A remote attacker can execute arbitrary code on the target system.

The vulnerability exists due to unknown error when handling images. A remote attacker can create a specially crafted image and execute arbitrary code on the target system with privileges of the current user, when malicious images is viewed.

Successful exploitation of the vulnerability may allow an attacker to execute arbitrary code on vulnerable system with privileges of the current user.


Remediation

Install update from vendor's website.