Lucene search

K
kasperskyKaspersky LabKLA10806
HistoryMay 10, 2016 - 12:00 a.m.

KLA10806 Multiple vulnerabilities in Microsoft Internet Explorer and Edge

2016-05-1000:00:00
Kaspersky Lab
threats.kaspersky.com
358

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.973 High

EPSS

Percentile

99.9%

Multiple serious vulnerabilities have been found in Microsoft Internet Explorer and Edge. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. An improper memory objects handling at JScript and VBScript engines can be exploited remotely via a specially designed content to execute arbitrary code;
  2. An improper code integrity validation at Device Guard can be exploited via a specially designed code to bypass security restrictions;
  3. An improper memory objects handling can be exploited remotely via a specially designed content to execute arbitrary code;
  4. An improper access permissions handling can be exploited remotelyvia a specially designed content to obtain sensitive information.

Technical details

Vulnerability (2) related to User Mode Code Integrity component of Device Guard which allows running unsigned malicious code as though it were signed by a trusted source.

To mitigate vulnerability (3) user can restrict access to the VBScript and JScript engines. For further instructions take a look at MS16-051 listed in original advisories section.

Original advisories

CVE-2016-0189

CVE-2016-0187

CVE-2016-0194

CVE-2016-0193

CVE-2016-0192

CVE-2016-0191

CVE-2016-0188

CVE-2016-0186

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Internet-Explorer

Microsoft-Edge

CVE list

CVE-2016-0189 critical

CVE-2016-0187 critical

CVE-2016-0194 warning

CVE-2016-0193 critical

CVE-2016-0192 critical

CVE-2016-0191 critical

CVE-2016-0188 critical

CVE-2016-0186 critical

KB list

3156421

3156387

3154070

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

Affected Products

  • Microsoft Internet Explorer versions 9 through 11Microsoft Edge

References

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.3 High

AI Score

Confidence

High

0.973 High

EPSS

Percentile

99.9%