CVE-2016-3372

The kernel API in Microsoft Windows Vista SP2 and Windows Server 2008 SP2 does not properly enforce permissions, which allows local users to spoof processes, spoof inter-process communication, or cause a denial of service via a crafted application, aka “Windows Kernel Elevation of Privilege Vulnerability.”

CVE-2016-3373 (windows_10, windows_7, windows_8.1, windows_rt_8.1, windows_server_2008, windows_server_2012, windows_vista)

The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 does not properly implement registry access control, which allows local users to obtain sensitive account information via a crafted application, aka “Windows Kernel Elevation of Privilege Vulnerability.”

CVE-2016-3374

The PDF library in Microsoft Edge, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information via a crafted web site, aka “PDF Library Information Disclosure Vulnerability,” a different vulnerability than CVE-2016-3370.

CVE-2016-3375

The OLE Automation mechanism and VBScript scripting engine in Microsoft Internet Explorer 9 through 11, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Scripting Engine Memory Corruption Vulnerability.”

CVE-2016-3377 (edge)

The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Scripting Engine Memory Corruption Vulnerability,” a different vulnerability than CVE-2016-3350.

CVE-2016-3378

Open redirect vulnerability in Microsoft Exchange Server 2013 SP1, 2013 Cumulative Update 12, 2013 Cumulative Update 13, 2016 Cumulative Update 1, and 2016 Cumulative Update 2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted URL, aka “Microsoft Exchange Open Redirect Vulnerability.”

CVE-2016-3379 (exchange_server)

Cross-site scripting (XSS) vulnerability in Microsoft Exchange Server 2016 Cumulative Update 1 and 2 allows remote attackers to inject arbitrary web script or HTML via a meeting-invitation request, aka “Microsoft Exchange Elevation of Privilege Vulnerability.”

Nougat, the new, more secure version of Android

nougat panda security

The most recent update to Google’s operating system, the most widely used around the world, is now available for Nexus devices and will soon be out there for users of all other devices, as manufacturers begin to include it.

As is often the case, it will be some time before it is universally adopted, though there appear to be good reasons to take the leap as soon as possible, many of them related to security.

Firstly, the new version of Android includes a feature dubbed DirectBoot, designed so that the device begins to operate immediately after a restart. This means that if it is switched off and on again without the user noticing, the services and programs configured to do so will start to operate right away, without having to wait for the device to be unlocked. This includes critical apps such as antivirus solutions, which will be able to protect the device from the moment it is active.

When the device restarts, apps will start to operate without having to wait for the phone to be unlocked.

Nougat also includes a new file encryption system allowing files to be secured individually, without having to encrypt the entire device. For business users, Android for Work also delivers improvements to VPN usage. Company security managers will now be able to force all company devices to be connected at all times, and exclusively through secure VPNs.

android-nougat-2

The Android update also places restrictions on permissions shared across applications, and prevents apps with administrator privileges from accessing particularly sensitive features, such as changing device PINs or passwords.

Nougat will prevent ‘apps’ from changing the PIN or password of a device.

Another welcome new feature that will simplify the essential task of installing new updates is that Nougat users won’t have to wait for apps to configure one by one after an update (but only for new phones optimized for Nougat). This was something that could take up to half an hour, depending on the apps on a device, and in the future will take place in the background, without interfering with the ability to use the phone.

All these improvements, along with some minor changes, mean that making the switch to Nougat should be a priority for all companies that work with Android. It’s just a question of waiting for device manufacturers to have the update ready.

The post Nougat, the new, more secure version of Android appeared first on Panda Security Mediacenter.