Security Experts:

Microsoft Patches Browser Vulnerability Exploited in Attacks

Microsoft announced on Tuesday the availability of 13 security bulletins that patch roughly 50 vulnerabilities in Windows, Internet Explorer, Edge, Office and Exchange. The company said one of the browser flaws has been exploited in the wild.

Two of the bulletins rated critical, MS16-104 and MS16-105, resolve vulnerabilities in Windows, Internet Explorer and Edge. Six of the flaws affect both the Internet Explorer and Edge web browsers, including CVE-2016-3351, a security hole that allows an attacker to obtain information that can be used to further compromise a targeted system.

This information disclosure flaw can be exploited if the attacker can trick the victim into accessing a malicious or a compromised website hosting an exploit. Microsoft’s advisory shows that CVE-2016-3351 has been exploited against Internet Explorer users, but provides no further details. If Microsoft learned about the vulnerability from a cybersecurity firm, it’s possible that the details of the attack will be made public in the upcoming days.

The other vulnerabilities patched by the MS16-104 and MS16-105 bulletins affect various components and they can lead to information disclosure or remote code execution.

Other critical bulletins for Windows are MS16-106 and MS16-116, which resolve six flaws that can lead to privilege escalation, information disclosure and arbitrary code execution.

MS16-116 fixes CVE-2016-3375, a memory corruption issue caused by the way the Microsoft OLE Automation mechanism and the VBScript scripting engine in Internet Explorer access objects in memory. The flaw, which can be exploited for remote code execution if the attacker can convince the victim to access a malicious website, can be patched by applying both the MS16-116 and MS16-104 updates.

A critical security bulletin released for Office (MS16-107) addresses ASLR bypass, information disclosure, Outlook spoofing, and remote code execution vulnerabilities.

The ASLR bypass issue, tracked as CVE-2016-0137, is a vulnerability reported to Microsoft by security firm enSilo nearly nine months ago. According to enSilo, the issue affects Detours, a hooking engine used by more than 100 vendors. Researchers identified similar flaws in software products from several major companies.

A total of three flaws have been fixed in Microsoft Exchange, including information disclosure, open redirect and privilege escalation issues.

Another noteworthy bulletin is MS16-110, which patches several Windows vulnerabilities, including a weakness that allows an attacker to brute force a user’s NTLM password hash (CVE-2016-3352). Microsoft says the details of this attack method have already been publicly disclosed.

Microsoft also released a security bulletin that updates Adobe Flash Player in the company’s products. Adobe announced on Tuesday that it has fixed a total of 29 vulnerabilities in Flash Player.

Related: Microsoft Patches Flaws in Windows, Office, Browsers

Related: Microsoft Patches Flaw Related to "Malicious Butler" Attack

view counter
Eduard Kovacs is an international correspondent for SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.