Zenith Live Europe has begun. If you can't be there, view it here. Live Stream
Zenith Live Europe has begun. If you can't be there, view it here.
Live Stream

Zero trust security

Make it possible

Your Mission

 

Security Advisory - August 09, 2016

Zscaler protects against 17 new vulnerabilities for Internet Explorer, Kernel-Mode Drivers, Microsoft Office, and Windows PDF Library

 

 

Zscaler, working with Microsoft through their MAPP program, has proactively deployed protections for the following 17 vulnerabilities included in the August 2016 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the August release and deploy additional protections as necessary.

MS16-095 – Cumulative Security Update for Internet Explorer

This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Severity: Critical 

Affected Software

  • Internet Explorer 9-11

    CVE-2016-3288 – Internet Explorer Memory Corruption Vulnerability

    CVE-2016-3289 – Microsoft Browser Memory Corruption Vulnerability

    CVE-2016-3290 – Internet Explorer Memory Corruption Vulnerability

    CVE-2016-3293 – Microsoft Browser Memory Corruption Vulnerability

    CVE-2016-3321 – Internet Explorer Memory Corruption Vulnerability

    CVE-2016-3322 – Microsoft Browser Memory Corruption Vulnerabilit y

    CVE-2016-3326 – Microsoft Browser Information Disclosure Vulnerability

    CVE-2016-3327 – Microsoft Browser Information Disclosure Vulnerability

MS16-098 – Security Update for Windows Kernel-Mode Drivers

This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.

Severity: Important 

Affected Software

  • Windows Vista SP2
  • Windows Server 2008 SP2 and Windows Server 2008 R2 SP1
  • Windows 7 SP1
  • Windows 8.1
  • Windows Server 2012 and Windows Server 2012 R2
  • Windows RT 8.1
  • Windows 10

CVE-2016-3308 – Win32k Elevation of Privilege Vulnerability

CVE-2016-3309 – Win32k Elevation of Privilege Vulnerability

CVE-2016-3310 – Win32k Elevation of Privilege Vulnerability

CVE-2016-3311 – Win32k Elevation of Privilege Vulnerability

MS16-099 – Security Update for Microsoft Office

This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Severity: Important 

Affected Software

  • Microsoft Office 2007 SP3
  • Microsoft Office 2010 SP2
  • Microsoft Office 2013 SP1
  • Microsoft Office 2013 RT SP1
  • Microsoft Office 2016
  • Microsoft Office 2011 for Mac
  • Microsoft Office 2016 for Mac

CVE-2016-3313 – Microsoft Office Memory Corruption Vulnerability

CVE-2016-3316 – Microsoft Office Memory Corruption Vulnerability

CVE-2016-3317 – Microsoft Office Memory Corruption Vulnerability

CVE-2016-3318 – Graphics Component Memory Corruption Vulnerability

MS16-102 – Security Update for Microsoft Windows PDF Library

This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user views specially crafted PDF content online or opens a specially crafted PDF document. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Severity: Critical 

Affected Software

  • Windows 8.1
  • Windows Server 2012 
  • Windows Server 2012 RT
  • Windows 10

CVE-2016-3319 – Microsoft PDF Remote Code Execution Vulnerability