Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Microsoft Patches Critical Flaws in Internet Explorer, Edge

As part of its monthly security update cycle, Microsoft on Tuesday released 11 security bulletins to resolve multiple vulnerabilities in Internet Explorer, Edge, Office, JScript and VBScript, and .NET Framework.

As part of its monthly security update cycle, Microsoft on Tuesday released 11 security bulletins to resolve multiple vulnerabilities in Internet Explorer, Edge, Office, JScript and VBScript, and .NET Framework.

Microsoft’s security bulletin MS16-084 resolves 15 bugs in Internet Explorer (IE), most of which are Critical, highly likely to be exploited in the wild. The tech giant resolved multiple memory corruption vulnerabilities in the application, along with an IE security bypass flaw, information disclosure issues, and browser spoofing vulnerabilities.

Next in Microsoft’s update summary is the MS16-085 bulletin, which lists 13 security bugs in Edge, also rated Critical, as most of these flaws are likely to be exploited in the wild. Most of these flaws were scripting engine memory corruption bugs, but Microsoft also patched information disclosure issues and browser spoofing vulnerabilities.

The most severe of the vulnerabilities in IE and Edge could allow an attacker to execute code remotely on an affected system if a user views a specially crafted webpage using the browser. By successfully exploiting the vulnerability, the attacker would gain the same user rights as the current user and would be able to install programs; view, change, or delete data; or create new accounts with full user rights.

Today, Microsoft resolved a remote code execution bug (CVE-2016-3238) and an elevation of privilege issue in Windows Print Spooler CVE-2016-3239. The company also published a separate bulletin (MS16-086) for the scripting engine memory corruption vulnerability in JScript and VBScript tracked as CVE-2016-3204, which affects Internet Explorer.

Microsoft Office saw 7 vulnerabilities patched this Tuesday with the release of security bulletin MS16-088. One is a remote code execution bug (CVE-2016-3279) that can be exploited when the user opens a specially crafted file, while the remaining six are memory corruption flaws, yet a single one (CVE-2016-3281) is likely to be exploited.

The new round of updates also resolved information disclosure flaws in Windows Secure Kernel, .NET Framework, and Windows Kernel-Mode Drivers, five Elevation of Privilege flaws in Windows Kernel-Mode Drivers, security feature bypass in Secure Boot and Windows File System, and an information disclosure flaw in Windows Kernel.

 “Another glorious Patch Tuesday with a sprinkling of vulnerabilities quite a bit different than we’ve been seeing lately,” Bobby Kuzma, systems engineer at Core Security, told SecurityWeek.

Advertisement. Scroll to continue reading.

Kuzma further commented:

MS16-087: It’s been a while since we’ve seen remote code execution in the print spooler of all places. It fails to validate printer drivers, so an attacker would need to be in a position to coerce users into installing the drivers, and the users would need permissions to do so.


MS16-089: A memory-handling information disclosure vulnerability. An attacker with local access would be able to read things from memory that they have no permissions for, allowing this, in concern with other vulnerabilities, to lead to the compromise of a system.


MS16-090: A privilege escalation attack, involving both the kernel and the GDI subsystem.


MS16-092: This impacts the application whitelisting functionality on Windows 8.1 and newer. I suspect we’ll be seeing a lot more like this as researchers and attackers both look for ways to bypass this technology.


MS16-094: Secure boot isn’t very secure, I’m afraid, when policy application and handling errors strip away its most critical protections. An attacker being able to disable integrity checks is the first step in establishing difficult to detect and difficult to remove persistence. AND it could potentially disable BitLocker encryption. Sounds like this vulnerability was a great tool for Folks That Spy On People.

In this month’s update summary, Microsoft also included a bulletin (MS16-093) to detail the patches that Adobe released earlier today for its Flash Player runtime, and which affect Windows users, as well as Mac, Linux, and ChromeOS users.

Related: Microsoft Patches Critical Flaws in Windows, Edge, Office

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.