The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Windows 2008 R2

computer vulnerability note CVE-2016-7216

Windows: privilege escalation via Kernel API

Synthesis of the vulnerability

An attacker can bypass restrictions via Kernel API of Windows, in order to escalate his privileges.
Impacted products: Windows 2008 R0, Windows 2008 R2, Windows 7, Windows Vista.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 09/11/2016.
Identifiers: 3199720, 874, CERTFR-2016-AVI-374, CVE-2016-7216, MS16-139, VIGILANCE-VUL-21079.

Description of the vulnerability

An attacker can bypass restrictions via Kernel API of Windows, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2016-7220 CVE-2016-7237 CVE-2016-7238

Windows: three vulnerabilities via Authentication Methods

Synthesis of the vulnerability

An attacker can use several vulnerabilities via Authentication Methods of Windows.
Impacted products: Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, data reading.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 3.
Creation date: 09/11/2016.
Identifiers: 3199173, CERTFR-2016-AVI-374, CVE-2016-7220, CVE-2016-7237, CVE-2016-7238, MS16-137, VIGILANCE-VUL-21077.

Description of the vulnerability

Several vulnerabilities were announced in Windows.

An attacker can force a read at an invalid address via Virtual Secure Mode, in order to trigger a denial of service, or to obtain sensitive information. [severity:2/4; CVE-2016-7220]

An attacker can trigger a fatal error via Local Security Authority Subsystem, in order to trigger a denial of service. [severity:1/4; CVE-2016-7237]

An attacker can bypass security features via Windows NTLM, in order to escalate his privileges. [severity:2/4; CVE-2016-7238]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2016-7214 CVE-2016-7215 CVE-2016-7218

Windows: four vulnerabilities via Kernel-Mode Drivers

Synthesis of the vulnerability

An attacker can use several vulnerabilities via Kernel-Mode Drivers of Windows.
Impacted products: Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, data reading.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 4.
Creation date: 09/11/2016.
Identifiers: 3199135, CERTFR-2016-AVI-374, CVE-2016-7214, CVE-2016-7215, CVE-2016-7218, CVE-2016-7246, MS16-135, VIGILANCE-VUL-21075, ZDI-16-592, ZDI-16-594.

Description of the vulnerability

Several vulnerabilities were announced in Windows.

An attacker can bypass security features, in order to obtain sensitive information on ASLR. [severity:2/4; CVE-2016-7214]

An attacker can bypass security features via Win32k, in order to escalate his privileges. [severity:2/4; CVE-2016-7215, ZDI-16-592]

An attacker can bypass security features via Win32k, in order to escalate his privileges. [severity:2/4; CVE-2016-7246, ZDI-16-594]

An attacker can bypass security features via Bowser.sys, in order to obtain sensitive information. [severity:2/4; CVE-2016-7218]
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2016-0026 CVE-2016-3332 CVE-2016-3333

Windows: multiple vulnerabilities via Common Log File System Driver

Synthesis of the vulnerability

An attacker can use several vulnerabilities via Common Log File System Driver of Windows.
Impacted products: Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 10.
Creation date: 09/11/2016.
Identifiers: 3193706, CERTFR-2016-AVI-374, CVE-2016-0026, CVE-2016-3332, CVE-2016-3333, CVE-2016-3334, CVE-2016-3335, CVE-2016-3338, CVE-2016-3340, CVE-2016-3342, CVE-2016-3343, CVE-2016-7184, MS16-134, VIGILANCE-VUL-21074.

Description of the vulnerability

Several vulnerabilities were announced in Windows.

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2016-0026]

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2016-3332]

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2016-3333]

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2016-3334]

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2016-3335]

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2016-3338]

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2016-3340]

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2016-3342]

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2016-3343]

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2016-7184]
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2016-7205 CVE-2016-7210 CVE-2016-7217

Windows: four vulnerabilities via Graphics Component

Synthesis of the vulnerability

An attacker can use several vulnerabilities via Graphics Component of Windows.
Impacted products: Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 4/4.
Consequences: user access/rights, data reading, denial of service on service, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 4.
Creation date: 09/11/2016.
Identifiers: 3199120, CERTFR-2016-AVI-374, CVE-2016-7205, CVE-2016-7210, CVE-2016-7217, CVE-2016-7256, MS16-132, VIGILANCE-VUL-21072.

Description of the vulnerability

Several vulnerabilities were announced in Windows.

An attacker can bypass security features via Open Type Font, in order to obtain sensitive information. [severity:2/4; CVE-2016-7210]

An attacker can generate a memory corruption via Windows Animation Manager, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2016-7205]

An attacker can generate a memory corruption via Media Foundation, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2016-7217]

An attacker can generate a memory corruption via Open Type Font, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2016-7256]
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2016-7212 CVE-2016-7221 CVE-2016-7222

Windows: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Windows.
Impacted products: Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 4/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights.
Provenance: intranet client.
Number of vulnerabilities in this bulletin: 3.
Creation date: 09/11/2016.
Identifiers: 3199172, CERTFR-2016-AVI-374, CVE-2016-7212, CVE-2016-7221, CVE-2016-7222, MS16-130, VIGILANCE-VUL-21070.

Description of the vulnerability

Several vulnerabilities were announced in Windows.

An attacker can bypass security features via Input Method Editor, in order to escalate his privileges. [severity:2/4; CVE-2016-7221]

An attacker can bypass security features via Task Scheduler, in order to escalate his privileges. [severity:2/4; CVE-2016-7222]

An attacker can generate a memory corruption via Image File, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2016-7212]
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2016-7255

Windows: privilege escalation via NtSetWindowLongPtr

Synthesis of the vulnerability

A local attacker can call NtSetWindowLongPtr() on Windows, in order to escalate his privileges.
Impacted products: Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 02/11/2016.
Identifiers: 3199135, CERTFR-2016-ACT-045, CERTFR-2016-ALE-008, CVE-2016-7255, MS16-135, VIGILANCE-VUL-21014.

Description of the vulnerability

The win32k.sys driver of Windows provides the NtSetWindowLongPtr() function, which changes an attribute of a window. The nIndex GWLP_ID parameter changes the identifier of a window, and GWL_STYLE changes its displayed style.

However, using GWLP_ID=otherWindow and GWL_STYLE=WS_CHILD, a local attacker can escalate his privileges.

A local attacker can therefore call NtSetWindowLongPtr() on Windows, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2016-3298

Internet Explorer: information disclosure via Microsoft Internet Messaging API

Synthesis of the vulnerability

An attacker can use a vulnerability via Microsoft Internet Messaging API of Internet Explorer, in order to obtain sensitive information.
Impacted products: IE, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 2/4.
Consequences: data reading.
Provenance: document.
Creation date: 12/10/2016.
Identifiers: 3196067, CERTFR-2016-AVI-340, CVE-2016-3298, MS16-126, VIGILANCE-VUL-20835.

Description of the vulnerability

The Internet Explorer product can use the Microsoft Internet Messaging API.

However, an attacker can bypass restrictions, to detect the presence of files on victim's system.

An attacker can therefore use a vulnerability via Microsoft Internet Messaging API of Internet Explorer, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2016-0070 CVE-2016-0073 CVE-2016-0075

Windows: four vulnerabilities via Windows Registry

Synthesis of the vulnerability

An attacker can use several vulnerabilities via Windows Registry of Windows.
Impacted products: Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 4.
Creation date: 12/10/2016.
Identifiers: 3193227, 871, 872, 873, 875, CERTFR-2016-AVI-340, CVE-2016-0070, CVE-2016-0073, CVE-2016-0075, CVE-2016-0079, MS16-124, VIGILANCE-VUL-20833.

Description of the vulnerability

Several vulnerabilities were announced in Windows.

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2016-0070]

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2016-0073]

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2016-0075]

An attacker can bypass security features, in order to escalate his privileges. [severity:2/4; CVE-2016-0079]
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2016-3266 CVE-2016-3341 CVE-2016-3376

Windows: five vulnerabilities via Kernel

Synthesis of the vulnerability

An attacker can use several vulnerabilities via Kernel of Windows.
Impacted products: Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 5.
Creation date: 12/10/2016.
Identifiers: 3192892, 876, 885, CERTFR-2016-AVI-340, CVE-2016-3266, CVE-2016-3341, CVE-2016-3376, CVE-2016-7185, CVE-2016-7211, MS16-123, VIGILANCE-VUL-20832.

Description of the vulnerability

Several vulnerabilities were announced in Windows.

An attacker can bypass security features via Win32k, in order to escalate his privileges. [severity:2/4; CVE-2016-3266]

An attacker can bypass security features via Win32k, in order to escalate his privileges. [severity:2/4; CVE-2016-3376]

An attacker can bypass security features via Win32k, in order to escalate his privileges. [severity:2/4; CVE-2016-7185]

An attacker can bypass security features via Win32k, in order to escalate his privileges. [severity:2/4; CVE-2016-7211]

An attacker can bypass security features via Windows Transaction Manager, in order to escalate his privileges. [severity:2/4; CVE-2016-3341]
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Windows 2008 R2: