Microsoft Windows Remote Code Execution Vulnerabilities
Last Update Date:
11 Feb 2016 12:24
Release Date:
11 Feb 2016
3596
Views
RISK: High Risk
TYPE: Operating Systems - Windows OS
- Windows Elevation of Privilege Vulnerability
An elevation of privilege vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. - Multiple DLL Loading Remote Code Execution Vulnerabilities
Multiple remote code execution vulnerabilities exist when Windows improperly validates input before loading dynamic link library (DLL) files. An attacker who successfully exploited these vulnerabilities could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. - Windows DLL Loading Denial of Service Vulnerability
A denial of service vulnerability exists in Windows when Microsoft Sync Framework processes specially crafted input that uses the "change batch" structure. An attacker who successfully exploited the vulnerability could cause the target SyncShareSvc service to stop responding. Note that the denial of service would not allow an attacker to execute code or to elevate their user rights. However, it could prevent authenticated users from using the SyncShareSvc service. - Windows Kerberos Security Feature Bypass
A security feature bypass exists in Windows when Kerberos fails to check the password change of a user signing into a workstation. An attacker could bypass Kerberos authentication on a target machine and decrypt drives protected by BitLocker.
Impact
- Denial of Service
- Elevation of Privilege
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- Microsoft Windows Vista
- Microsoft Windows Server 2008
- Microsoft Windows 7
- Microsoft Windows Server 2008 R2
- Microsoft Windows 8.1
- Microsoft Windows Server 2012 and Windows Server 2012 R2
- Microsoft Windows RT 8.1
- Microsoft Windows 10
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
https://technet.microsoft.com/en-us/library/security/MS16-014
Vulnerability Identifier
Source
Related Link
Share with