A remote code execution vulnerability has been reported in Microsoft Office. The vulnerability is caused when Microsoft Office does not properly handle rich text format files in memory. A remote attacker can exploit this issue by enticing a user to open a specially crafted file with an affected version of Microsoft Office.
Category Archives: Checkpoint
Checkpoint
Adobe Reader and Acrobat Security Bypass (APSB16-26 : CVE-2016-4215; CVE-2016-4215)
This vulnerability is an instance of same-origin policy violation. An attacker can exploit this vulnerability by enticing a user to open a maliciously crafted PDF file. Successful exploitation can trick embedded JavaScript code to run in the wrong context, potentially leading to a security bypass.
Microsoft Edge PDF Remote Code Execution (MS16-096: CVE-2016-3319; CVE-2016-3319)
A remote code execution vulnerability exists in Microsoft Edge. The vulnerability is due to the way Edge improperly accesses objects in memory. A remote attacker can exploit this issue by enticing a target victim to open a specially crafted PDF file.
Adobe Acrobat and Reader Memory Corruption (APSB16-14: CVE-2016-1071; CVE-2016-1071)
A memory corruption vulnerability has been reported in Adobe Reader and Acrobat. The vulnerability is due to an error in Adobe Reader and Acrobat while parsing a corrupted PDF file. A remote attacker may exploit this vulnerability by enticing a target user to open a specially crafted PDF file.
Microsoft Internet Explorer Information Disclosure (MS16-095: CVE-2016-3321; CVE-2016-3321)
An information disclosure vulnerability has been reported in Microsoft Internet Explorer. The vulnerability is due to an error in Microsoft Internet Explorer while handling URIs. A remote attacker can exploit this issue by enticing a user to open a specially crafted web-page with an affected version of Internet Explorer.
Microsoft Edge Use After Free (MS16-095: CVE-2016-3326; CVE-2016-3326)
A use after free vulnerability exists in Microsoft Edge. The vulnerability is due to incorrect memory handling leading to a use after free condition when processing a maliciously crafted file. Successful exploitation of this issue could allow an attacker to execute arbitrary code on the remote system.
Microsoft Windows Win32k Elevation of Privilege (MS16-098: CVE-2016-3308; CVE-2016-3308)
An out of bound memory access vulnerability was discovered within Microsoft Windows. The root cause is within win32kfull subsystem that performs an out of bound memory access leading to a heap memory corruption. A successful exploitation of this issue could allow an attacker to elevate his privileges on the system.
Adobe Flash Player Memory Corruption (APSB16-25: CVE-2016-4188; CVE-2016-4188)
A memory corruption vulnerability exists in Adobe Flash Player. The vulnerability is due to an error in Adobe Flash Player while parsing a specially crafted SWF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted SWF file.
Adobe Acrobat and Reader Use-After-Free (APSB16-14: CVE-2016-1066; CVE-2016-1066)
A use after free vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to an error in the way Adobe Acrobat and Reader handles objects in memory. A remote attacker can exploit this vulnerability by enticing the user to open a specially crafted PDF file.
Adobe Acrobat and Reader Security Bypass (APSB16-14: CVE-2016-1042; CVE-2016-1042)
A security bypass vulnerability exists in Adobe Reader and Acrobat. The vulnerability is due to an error in Adobe Reader and Acrobat while parsing a specially crafted PDF file. A remote attacker can exploit this issue by enticing a victim to open a specially crafted PDF file.