CERT-In Vulnerability Note
CIVN-2016-0313
Remote Code Execution vulnerability in Microsoft Windows Uniscribe
Original Issue Date:December 14, 2016
Severity Rating: HIGH
Software Affected
- Windows Vista Service Pack 2
- Windows Vista x64 Edition Service Pack 2
- Windows Server 2008 for 32-bit Systems Service Pack 2
- Windows Server 2008 for x64-based Systems Service Pack 2
- Windows Server 2008 for Itanium-based Systems Service Pack 2
- Windows 7 for 32-bit Systems Service Pack 1
- Windows 7 for x64-based Systems Service Pack 1
- Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
- Windows 8.1 for 32-bit Systems
- Windows 8.1 for x64-based Systems
- Windows Server 2012
- Windows Server 2012 R2
- Windows RT 8.1
- Windows 10 for 32-bit Systems
- Windows 10 for x64-based Systems
- Windows 10 Version 1511 for 32-bit Systems
- Windows 10 Version 1511 for x64-based Systems
- Windows 10 Version 1607 for 32-bit Systems
- Windows 10 Version 1607 for x64-based Systems
- Windows Server 2016 for x64-based Systems
- Windows Server 2008 for 32-bit Systems Service Pack 2(Server Core installation)
- Windows Server 2008 for x64-based Systems Service Pack 2(Server Core installation)
- Windows Server 2008 R2 for x64-based Systems Service Pack 1(Server Core installation)
- Windows Server 2012(Server Core installation)
- Windows Server 2012 R2(Server Core installation)
- Windows Server 2016 for x64-based Systems(Server Core installation)
Overview
A vulnerability has been reported in Microsoft Windows Uniscribe, which could allow a remote attacker to execute arbitrary code on the targeted system.
Description
This vulnerability exists in Windows Uniscribe due to improper handling objects in memory. A remote attacker could exploit this vulnerability by convincing a user to visit a malicious site or open a crafted document file.
Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the system with the privileges of the targeted user. If the user holds administrative privileges, the attacker could completely compromise the targeted system.
Solution
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
MS-16-147
Vendor Information
Microsoft
https://technet.microsoft.com/en-us/library/security/MS16-147
References
Microsoft
https://technet.microsoft.com/en-us/library/security/MS16-147
Cisco
https://tools.cisco.com/security/center/viewAlert.x?alertId=49969
Security Tracker
http://www.securitytracker.com/id/1037440
Security Focus
http://www.securityfocus.com/bid/94758
Symantec
https://www.symantec.com/security_response/vulnerability.jsp?bid=94758
CVE Name
CVE-2016-7274
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|