MS16-085: Cumulative Security Update for Microsoft Edge (3169999)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote host has a web browser installed that is affected by
multiple vulnerabilities.

Description :

The version of Microsoft Edge installed on the remote Windows host is
missing Cumulative Security Update 3169999. It is, therefore, affected
by multiple vulnerabilities :

- A security feature bypass vulnerability exists due to a
failure to properly implement Address Space Layout
Randomization (ASLR). An unauthenticated, remote
attacker can exploit this, by convincing a user to visit
a website that hosts crafted content, to bypass the ASLR
security feature, resulting in the ability to predict
memory offsets in a call stack. (CVE-2016-3244)

- Multiple remote code execution vulnerabilities exist due
to improper handling of objects in memory. An
unauthenticated, remote attacker can exploit these, via a
crafted website or email, to corrupt memory, resulting in
the execution of arbitrary code within the context of the
current user. (CVE-2016-3246, CVE-2016-3264)

- Multiple remote code execution vulnerabilities exist in
the Chakra JavaScript engine due to improper handling of
objects in memory. An unauthenticated, remote attacker
can exploit these, by convincing a user to visit a
specially crafted website or open a specially crafted
Microsoft Office document that hosts the Edge rendering
engine, to corrupt memory, resulting in the execution of
arbitrary code within the context of the current user.
(CVE-2016-3248, CVE-2016-3259, CVE-2016-3260,
CVE-2016-3265, CVE-2016-3269)

- An information disclosure vulnerability exists in
VBScript due to improper disclosure of the contents of
its memory. An unauthenticated, remote attacker who has
knowledge of the memory address where an object was
created can exploit this issue to disclose potentially
sensitive information. (CVE-2016-3271)

- An information disclosure vulnerability exists in the
Microsoft Browser XSS Filter due to improper validation
of content. An unauthenticated, remote attacker can
exploit this, via a website that hosts content with
specially crafted JavaScript, to disclose potentially
sensitive information. (CVE-2016-3273)

- Multiple spoofing vulnerabilities exist due to improper
parsing of HTTP or HTML content. An unauthenticated,
remote attacker can exploit these to redirect a user
to a malicious website having spoofed contents.
(CVE-2016-3274, CVE-2016-3276)

- An unspecified information disclosure vulnerability
exists due to improper handling of objects in memory
that allows an unauthenticated, remote attacker to
disclose potentially sensitive information.
(CVE-2016-3277)

See also :

https://technet.microsoft.com/library/security/MS16-085

Solution :

Microsoft has released a set of patches for Windows 10.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.3
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now