Now on Demand: Zero Trust Strategies Summit - Access All Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Microsoft Patches Critical Flaws in Internet Explorer, Edge

As part of its monthly security update cycle, Microsoft on Tuesday released 11 security bulletins to resolve multiple vulnerabilities in Internet Explorer, Edge, Office, JScript and VBScript, and .NET Framework.

As part of its monthly security update cycle, Microsoft on Tuesday released 11 security bulletins to resolve multiple vulnerabilities in Internet Explorer, Edge, Office, JScript and VBScript, and .NET Framework.

Microsoft’s security bulletin MS16-084 resolves 15 bugs in Internet Explorer (IE), most of which are Critical, highly likely to be exploited in the wild. The tech giant resolved multiple memory corruption vulnerabilities in the application, along with an IE security bypass flaw, information disclosure issues, and browser spoofing vulnerabilities.

Next in Microsoft’s update summary is the MS16-085 bulletin, which lists 13 security bugs in Edge, also rated Critical, as most of these flaws are likely to be exploited in the wild. Most of these flaws were scripting engine memory corruption bugs, but Microsoft also patched information disclosure issues and browser spoofing vulnerabilities.

The most severe of the vulnerabilities in IE and Edge could allow an attacker to execute code remotely on an affected system if a user views a specially crafted webpage using the browser. By successfully exploiting the vulnerability, the attacker would gain the same user rights as the current user and would be able to install programs; view, change, or delete data; or create new accounts with full user rights.

Today, Microsoft resolved a remote code execution bug (CVE-2016-3238) and an elevation of privilege issue in Windows Print Spooler CVE-2016-3239. The company also published a separate bulletin (MS16-086) for the scripting engine memory corruption vulnerability in JScript and VBScript tracked as CVE-2016-3204, which affects Internet Explorer.

Microsoft Office saw 7 vulnerabilities patched this Tuesday with the release of security bulletin MS16-088. One is a remote code execution bug (CVE-2016-3279) that can be exploited when the user opens a specially crafted file, while the remaining six are memory corruption flaws, yet a single one (CVE-2016-3281) is likely to be exploited.

The new round of updates also resolved information disclosure flaws in Windows Secure Kernel, .NET Framework, and Windows Kernel-Mode Drivers, five Elevation of Privilege flaws in Windows Kernel-Mode Drivers, security feature bypass in Secure Boot and Windows File System, and an information disclosure flaw in Windows Kernel.

 “Another glorious Patch Tuesday with a sprinkling of vulnerabilities quite a bit different than we’ve been seeing lately,” Bobby Kuzma, systems engineer at Core Security, told SecurityWeek.

Advertisement. Scroll to continue reading.

Kuzma further commented:

MS16-087: It’s been a while since we’ve seen remote code execution in the print spooler of all places. It fails to validate printer drivers, so an attacker would need to be in a position to coerce users into installing the drivers, and the users would need permissions to do so.


MS16-089: A memory-handling information disclosure vulnerability. An attacker with local access would be able to read things from memory that they have no permissions for, allowing this, in concern with other vulnerabilities, to lead to the compromise of a system.


MS16-090: A privilege escalation attack, involving both the kernel and the GDI subsystem.


MS16-092: This impacts the application whitelisting functionality on Windows 8.1 and newer. I suspect we’ll be seeing a lot more like this as researchers and attackers both look for ways to bypass this technology.


MS16-094: Secure boot isn’t very secure, I’m afraid, when policy application and handling errors strip away its most critical protections. An attacker being able to disable integrity checks is the first step in establishing difficult to detect and difficult to remove persistence. AND it could potentially disable BitLocker encryption. Sounds like this vulnerability was a great tool for Folks That Spy On People.

In this month’s update summary, Microsoft also included a bulletin (MS16-093) to detail the patches that Adobe released earlier today for its Flash Player runtime, and which affect Windows users, as well as Mac, Linux, and ChromeOS users.

Related: Microsoft Patches Critical Flaws in Windows, Edge, Office

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join SecurityWeek and Hitachi Vantara for this this webinar to gain valuable insights and actionable steps to enhance your organization's data security and resilience.

Register

Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

People on the Move

Former Darktrace CEO Poppy Gustafsson has joined the UK government as Minister for Investment.

Nupur Goyal has joined cloud identity security and management solutions provider Saviynt as VP of Product Marketing.

Threat intelligence firm Intel 471 has appointed Mark Huebeler as its COO and CFO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.