Risk | High |
Patch available | YES |
Number of vulnerabilities | 11 |
CVE-ID | CVE-2016-3298 CVE-2016-3267 CVE-2016-3331 CVE-2016-3382 CVE-2016-3383 CVE-2016-3384 CVE-2016-3385 CVE-2016-3387 CVE-2016-3388 CVE-2016-3390 CVE-2016-3391 |
CWE-ID | CWE-200 CWE-119 CWE-46 |
Exploitation vector | Network |
Public exploit |
Vulnerability #1 is being exploited in the wild. Public exploit code for vulnerability #8 is available. Public exploit code for vulnerability #9 is available. |
Vulnerable software Subscribe |
Microsoft Internet Explorer Client/Desktop applications / Web browsers Microsoft Edge Client/Desktop applications / Web browsers |
Vendor | Microsoft |
This security bulletin contains information about 11 vulnerabilities.
EUVDB-ID: #VU992
Risk: High
CVSSv3.1:
CVE-ID: CVE-2016-3298
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The vulnerablity exists due to improper handling of objects in memory by the Internet Messaging API. A remote attacker can create a specially crafted content, trick the victim into opening it, bypass security restrictions and determine the existence of arbitrary files.
Successful exploitation of the vulnerability results in information disclosure on the vulnerable system.
Note: the vulnerability was being actively exploited.
Install update from vendor's website.
Microsoft Internet Explorer: 9 - 11
http://technet.microsoft.com/en-us/library/security/ms16-118
http://technet.microsoft.com/en-us/library/security/ms16-126
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU848
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2016-3267
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to object memory handling error. A remote attacker can create a specially crafted content, trick the victim inro downloading it, trigger memory corruption and determine arbitrary files on the target system.
Successful exploitation of the vulnerability will result in information disclosure on the vulnerable system.
Install update from vendor's website.
Microsoft Internet Explorer: 9 - 11
Microsoft Edge: All versions
http://technet.microsoft.com/en-us/library/security/ms16-118
http://technet.microsoft.com/en-us/library/security/ms16-119
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU932
Risk: High
CVSSv3.1:
CVE-ID: CVE-2016-3331
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness is due to boundary error when handling malicious files. A remote attacker can create a specially crafted content, trick the victim into downloading it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Install update from vendor's website.
Microsoft Internet Explorer: 9 - 11
Microsoft Edge: All versions
http://technet.microsoft.com/en-us/library/security/ms16-118
http://technet.microsoft.com/en-us/library/security/ms16-119
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU930
Risk: High
CVSSv3.1:
CVE-ID: CVE-2016-3382
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in the Scripting Engine when handling malicious files. A remote attacker can create a specially crafted content, trick the victim into downloading it, trigger memory corruption and execute arbitrary code.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Install update from vendor's website.
Microsoft Internet Explorer: 9 - 11
Microsoft Edge: All versions
http://technet.microsoft.com/en-us/library/security/ms16-118
http://technet.microsoft.com/en-us/library/security/ms16-119
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU931
Risk: High
CVSSv3.1:
CVE-ID: CVE-2016-3383
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error when handling malicious files. A remote attacker can create a specially crafted content, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Install update from vendor's website.
Microsoft Internet Explorer: 10 - 11
http://technet.microsoft.com/en-us/library/security/ms16-118
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU845
Risk: High
CVSSv3.1:
CVE-ID: CVE-2016-3384
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error when handling malicious files. A remote attacker can create a specially crafted content, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Install update from vendor's website.
Microsoft Internet Explorer: 9 - 11
http://technet.microsoft.com/en-us/library/security/ms16-118
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU929
Risk: High
CVSSv3.1:
CVE-ID: CVE-2016-3385
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error when handling malicious files. A remote attacker can create a specially crafted content, trick the victim into opening it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.
Install update from vendor's website.
Microsoft Internet Explorer: 9 - 11
http://technet.microsoft.com/en-us/library/security/ms16-118
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU928
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2016-3387
CWE-ID:
CWE-46 - Path Equivalence: 'filename ' (Trailing Space)
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to gain elevated privileges.
The weakness exists due to improper defense of private namespace by the browser. A remote attacker can create a specially crafted content, trick the victim into downloading it, gain privileged permissions to the namespace directory on the system.
Successful exploitation of the vulnerability will result in privilege escalation on the vulnerable system.
Install update from vendor's website.
Microsoft Internet Explorer: 10 - 11
Microsoft Edge: All versions
http://technet.microsoft.com/en-us/library/security/ms16-118
http://technet.microsoft.com/en-us/library/security/ms16-119
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU847
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2016-3388
CWE-ID:
CWE-46 - Path Equivalence: 'filename ' (Trailing Space)
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to gain elevated privileges.
The weakness is due to improper defense of private namespace by the browser. A remote attacker can create a specially crafted content, trick the victim into downloading it, gain privileged permissions to the namespace directory on the system.
Successful exploitation of the vulnerability will result in privilege escalation on the vulnerable system.
Install update from vendor's website.
Microsoft Internet Explorer: 10 - 11
Microsoft Edge: All versions
http://technet.microsoft.com/en-us/library/security/ms16-118
http://technet.microsoft.com/en-us/library/security/ms16-119
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU855
Risk: High
CVSSv3.1:
CVE-ID: CVE-2016-3390
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in the Scripting Engine when handling malicious files. A remote attacker can create a specially crafted content, trick the victim into downloading it, trigger memory corruption and execute arbitrary code.
Successful exploitation of the vulnerability will result in arbitrary code execution.
Install update from vendor's website.
Microsoft Edge: All versions
Microsoft Internet Explorer: 11
http://technet.microsoft.com/en-us/library/security/ms16-118
http://technet.microsoft.com/en-us/library/security/ms16-119
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU849
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2016-3391
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to improper storage of credential data in memory. A remote attacker can access access a memory dump and get credential information.
Successful exploitation of the vulnerability will result in personal data disclosure.
Install update from vendor's website.
Microsoft Internet Explorer: 9 - 11
http://technet.microsoft.com/en-us/library/security/ms16-118
http://technet.microsoft.com/en-us/library/security/ms16-119
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?