SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Microsoft)  >   Microsoft GDI+ Vendors:   Microsoft
Microsoft Graphics Component Flaws Let Remote Users Execute Arbitrary Code and Obtain Potentially Sensitive Information
SecurityTracker Alert ID:  1037243
SecurityTracker URL:  http://securitytracker.com/id/1037243
CVE Reference:   CVE-2016-7205, CVE-2016-7210, CVE-2016-7217, CVE-2016-7256   (Links to External Site)
Date:  Nov 8 2016
Impact:   Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): Vista SP2, 2008 SP2, 2008 R2 SP1, 7 SP1, 8.1, RT 8.1, 2012, 2012 R2, 10, 10 Version 1511, 10 Version 1607, 2016
Description:   Several vulnerabilities were reported in Microsoft GDI+. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially sensitive information on the target system.

A remote user can create specially crafted content that, when loaded by the target user, will trigger a flaw in the ATMFD component and obtain potentially sensitive information from memory on the target user's system [CVE-2016-7210].

A remote user can create a specially crafted web page that, when loaded by the target user, will trigger an object memory handling error in Windows Animation Manager and execute arbitrary code on the target system [CVE-2016-7205]. The code will run with the privileges of the target user.

A remote user can create specially crafted content that, when loaded by the target user, will trigger an object memory handling error in Windows Media Foundation and execute arbitrary code on the target system [CVE-2016-7217]. The code will run with the privileges of the target user.

A remote user can create a specially crafted document that, when loaded by the target user, will trigger a flaw in the Windows font library in the processing of embedded fonts and execute arbitrary code on the target system [CVE-2016-7256]. The code will run with the privileges of the target user.

Hossein Lotfi, Secunia Research at Flexera Software, Kijong Son of KrCERT/CC in Korean Internet & Security Agency(KISA), Liu Long of Qihoo 360, Scott Bell of Security-Assessment.com, and Kai Song of Tencent's Xuanwu LAB reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can obtain potentially sensitive information on the target system.

Solution:   The vendor has issued a fix.

A patch matrix is available in the vendor advisory.

A restart is required.

The Microsoft advisory is available at:

https://technet.microsoft.com/library/security/ms16-132

Vendor URL:  technet.microsoft.com/library/security/ms16-132 (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC