Lucene search

K
symantecSymantec Security ResponseSMNTC-82505
HistoryFeb 09, 2016 - 12:00 a.m.

Microsoft Windows CVE-2016-0041 DLL Loading Multiple Local Privilege Escalation Vulnerabilities

2016-02-0900:00:00
Symantec Security Response
www.symantec.com
18

0.91 High

EPSS

Percentile

98.9%

Description

Microsoft Windows is prone to a multiple local privilege-escalation vulnerabilities. A local attacker can leverage these issues to execute arbitrary code with elevated privileges.

Technologies Affected

  • Microsoft Internet Explorer 10
  • Microsoft Internet Explorer 11
  • Microsoft Windows 10 for 32-bit Systems
  • Microsoft Windows 10 for x64-based Systems
  • Microsoft Windows 10 version 1511 for 32-bit Systems
  • Microsoft Windows 10 version 1511 for x64-based Systems
  • Microsoft Windows 7 for 32-bit Systems SP1
  • Microsoft Windows 7 for x64-based Systems SP1
  • Microsoft Windows 8.1 for 32-bit Systems
  • Microsoft Windows 8.1 for x64-based Systems
  • Microsoft Windows RT 8.1
  • Microsoft Windows Server 2008 R2 for Itanium-based Systems SP1
  • Microsoft Windows Server 2008 R2 for x64-based Systems SP1
  • Microsoft Windows Server 2008 for 32-bit Systems SP2
  • Microsoft Windows Server 2008 for Itanium-based Systems SP2
  • Microsoft Windows Server 2008 for x64-based Systems SP2
  • Microsoft Windows Server 2012
  • Microsoft Windows Server 2012 R2
  • Microsoft Windows Vista Service Pack 2
  • Microsoft Windows Vista x64 Edition SP2

Recommendations

Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
Ensure that only trusted users have local, interactive access to affected computers.

Implement multiple redundant layers of security.
Since this issue may be leveraged to execute code, we recommend memory-protection schemes, such as non-executable stack/heap configurations and randomly mapped memory segments. This tactic may complicate exploits of memory-corruption vulnerabilities.

Updates are available. Please see the references or vendor advisory for more information.