An old vulnerability has been reintroduced in certain versions of the Linux Kernel that could be exploited by local unprivileged users to elevate their default system designated privileges to the higher kernel level privileges. The vulnerability is due to an error that kernel does not zero-extend x86_64 registers in the 32bit entry path on x86_64 platforms. An attacker could elevate their local privilege resulting in a privilege escalation.
Category Archives: Checkpoint
Checkpoint
Microsoft Office Memory Corruption (MS16-107: CVE-2016-3360; CVE-2016-3360)
A remote code execution vulnerability exists in Microsoft Office. The vulnerability is due to an error in the way Microsoft Office improperly handles objects in memory while parsing specially crafted files. A remote attacker can exploit this issue by enticing a victim to open a specially crafted file.
Microsoft Windows Session Object Elevation of Privilege (MS16-111: CVE-2016-3305; CVE-2016-3305)
An elevation of privilege vulnerability exists in Microsoft Windows. The vulnerability is due to an error in the way windows kernel handles session objects in concurrent logins. Successful exploitation may lead to a malicious user gaining access to a victim user’s session.
Microsoft Windows Elevation of Privilege (MS16-111: CVE-2016-3373; CVE-2016-3373)
An elevation of privilege vulnerability exists in Microsoft Windows. A malicious user can bypass a security check in Windows to read and write registry hive files under a hidden registry hive which could enable an elevation of privilege. Successful exploitation could allow an attacker to run arbitrary code or access protected files with elevated privileges.
Microsoft Office Memory Corruption (MS16-107: CVE-2016-3362; CVE-2016-3362)
A remote code execution vulnerability exists in Microsoft Office. The vulnerability is due to an error in the way Microsoft Office improperly handles objects in memory while parsing specially crafted files. A remote attacker can exploit this issue by enticing a victim to open a specially crafted file.
Microsoft Windows GDI Component Information Disclosure (MS16-106: CVE-2016-3355; CVE-2016-3355)
An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. A remote attacker could exploit this vulnerability by enticing a target user to open a malicious executable file. Successful exploitation of this issue can lead to local privilege escalation.
Microsoft Office Memory Corruption (MS16-107: CVE-2016-3358; CVE-2016-3358)
A remote code execution vulnerability exists in Microsoft Office. The vulnerability is due to an error in the way Microsoft Office improperly handles objects in memory while parsing specially crafted files. A remote attacker can exploit this issue by enticing a victim to open a specially crafted file.
PHP Exif_Process_User_Comment Null Pointer Dereference (CVE-2016-6292)
A denial of service vulnerability exists in the Exif module of PHP. The vulnerability is due to a null pointer dereference in exif_process_user_comment when trying to handle JIS encoded user comment Exif tags when multi-byte string support is enabled in PHP. A remote, unauthenticated attacker can exploit this vulnerability by having the target PHP application process Exif data on a maliciously crafted image. Successful exploitation would cause the PHP interpreter to crash, leading to a denial of service condition.
Micro Focus Rumba WallData.Macro PlayMacro Memory Corruption
A buffer overflow vulnerability has been reported in the WallData.Macro ActiveX control of Micro Focus Rumba. The vulnerability is due to a lack of bounds checking on an argument passed into the PlayMacro() function. A remote, unauthenticated attacker could exploit this vulnerability by enticing a victim user to browse to a malicious web page potentially leading to arbitrary code execution under the context of the user.
PHP TAR File Parsing Uninitialized Reference (CVE-2016-4343)
An uninitialized reference vulnerability exists in PHP. A remote attacker can exploit this vulnerability by uploading a crafted TAR file to a vulnerable PHP application. A successful attack will result in remote code execution under the context of the service running PHP. Unsuccessful exploitation will cause the web application to terminate abnormally.