Internet Explorer iframe sandbox local file name disclosure vulnerability

Posted by Securify B.V. on Aug 09

————————————————————————
Internet Explorer iframe sandbox local file name disclosure
vulnerability
————————————————————————
Yorick Koster, March 2016

————————————————————————
Abstract
————————————————————————
It was found that Internet Explorer allows the…

MS16-095 – Critical: Cumulative Security Update for Internet Explorer (3177356) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (August 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

MS16-098 – Important: Security Update for Windows Kernel-Mode Drivers (3178466) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (August 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.

MS16-097 – Critical: Security Update for Microsoft Graphics Component (3177393) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (August 9, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows, Microsoft Office, Skype for Business, and Microsoft Lync. The vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.