SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Windows Kernel Vendors:   Microsoft
Microsoft Windows Bugs Let Local Users Gain Elevated Privileges and Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1037241
SecurityTracker URL:  http://securitytracker.com/id/1037241
CVE Reference:   CVE-2016-7212, CVE-2016-7221, CVE-2016-7222   (Links to External Site)
Date:  Nov 8 2016
Impact:   Execution of arbitrary code via network, Root access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Vista SP2, 2008 SP2, 2008 R2 SP1, 7 SP1, 8.1, RT 8.1, 2012, 2012 R2, 10, 10 Version 1511, 10 Version 1607, 2016
Description:   Several vulnerabilities were reported in Microsoft Windows. A remote user can cause arbitrary code to be executed on the target user's system. A local user can gain system privileges on the target system.

A remote user can create a specially crafted image file that, when loaded by the target user, will execute arbitrary code on the target system [CVE-2016-7212]. The code will run with the privileges of the target user.

The Windows Input Method Editor (IME) does not properly handle DLL loading [CVE-2016-7221]. A local user can run a specially crafted application to gain elevated privileges on the target system.

The Windows Task Scheduler does not properly handle UNC path values [CVE-2016-7222]. A local user can invoke Windows Task Scheduler to schedule a task with a specially crafted UNC path execute arbitrary code with system level privileges on the target system.

Takashi Yoshikawa of Mitsui Bussan Secure Directions, Inc., Aral Yaman, and Shanti Lindstrom reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A local user can obtain system privileges on the target system.

Solution:   The vendor has issued a fix.

A patch matrix is available in the vendor advisory.

A restart is required.

The Microsoft advisory is available at:

https://technet.microsoft.com/library/security/ms16-130

Vendor URL:  technet.microsoft.com/library/security/ms16-130 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC