
====================================================================

                                CERT-Renater

                    Note d'Information No. 2016/VULN283
_____________________________________________________________________

DATE                : 10/08/2016

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Microsoft Edge.

=====================================================================
KB3177358
https://technet.microsoft.com/en-us/library/security/MS16-096
____________________________________________________________________

MS16-096 - Critical Cumulative Security Update for Microsoft Edge (3177358)

Executive Summary

This security update resolves vulnerabilities in Microsoft Edge. The
most severe of the vulnerabilities could allow remote code execution
if a user views a specially crafted webpage using Microsoft Edge. An
attacker who successfully exploited the vulnerabilities could gain
the same user rights as the current user. Customers whose accounts
are configured to have fewer user rights on the system could be less
impacted than users with administrative user rights.

This security update is rated Critical for Microsoft Edge on Windows 10.


Affected Software

Microsoft Edge

Windows 10 [1]

[1] Windows 10 updates are cumulative. The monthly security release
includes all security fixes for vulnerabilities that affect Windows 10,
in addition to non-security updates. The updates are available via the
Microsoft Update Catalog.

Multiple Edge Memory Corruption Vulnerabilities

Multiple remote code execution vulnerabilities exist when Microsoft
Edge improperly accesses objects in memory. The vulnerabilities could
corrupt memory in a way that enables an attacker to execute arbitrary
code in the context of the current user. An attacker who successfully
exploited the vulnerabilities could gain the same user rights as the
current user. If the current user is logged on with administrative
user rights, an attacker could take control of an affected system. An
attacker could then install programs; view, change, or delete data;
or create new accounts with full user rights.

An attacker could host a specially crafted website that is designed to
exploit the vulnerabilities through Microsoft Edge, and then convince
a user to view the website. The attacker could also take advantage of
compromised websites and websites that accept or host user-provided
content or advertisements by adding specially crafted content that
could exploit the vulnerabilities. In all cases, however, an attacker
would have no way to force users to view the attacker-controlled
content. Instead, an attacker would have to convince users
to take action, typically by way of an enticement in an email or
instant message, or by getting them to open an email attachment.
The update addresses the vulnerabilities by modifying how Microsoft
Edge handles objects in memory.

The following table contains links to the standard entry for each
vulnerability in the Common Vulnerabilities and Exposures list:

Vulnerability title 	CVE number   Publicly disclosed   Exploited

Microsoft Browser Memory
Corruption Vulnerability 	CVE-2016-3289 	No 	No

Microsoft Browser Memory
Corruption Vulnerability 	CVE-2016-3293 	No 	No

Microsoft PDF Remote Code
Execution Vulnerability 	CVE-2016-3319 	No 	No

Microsoft Browser Memory
Corruption Vulnerability 	CVE-2016-3322 	No 	No


Scripting Engine Memory Corruption Vulnerability - CVE-2016-3296

A remote code execution vulnerability exists in the way that the Chakra
JavaScript engine renders when handling objects in memory in Microsoft
Edge.
The vulnerability could corrupt memory in such a way that an attacker
could execute arbitrary code in the context of the current user. An
attacker who successfully exploited the vulnerability could gain the
same user rights as the current user. If the current user is logged on
with administrative user rights, an attacker who successfully exploited
the vulnerability could take control of an affected system. An attacker
could then install programs; view, change, or delete data; or create
new accounts with full user rights.

In a web-based attack scenario, an attacker could host a specially
crafted website that is designed to exploit the vulnerability through
Microsoft Edge and then convince a user to view the website. An
attacker could also embed an ActiveX control marked "safe for
initialization" in an application or Microsoft Office document that
hosts the Edge rendering engine. The attacker could also take advantage
of compromised websites, and websites that accept or host user-provided
content or advertisements. These websites could contain specially
crafted content that could exploit the vulnerability. The update
addresses the vulnerability by modifying how the Chakra JavaScript
scripting engine handles objects in memory.

The following table contains links to the standard entry for the
vulnerability in the Common Vulnerabilities and Exposures list:

Vulnerability title   CVE number   Publicly disclosed 	Exploited

Scripting Engine Memory
Corruption Vulnerability 	CVE-2016-3296 	No 	No


Multiple Microsoft Edge Information Disclosure Vulnerabilities

Multiple information disclosure vulnerabilities exist when Microsoft
Edge improperly handles objects in memory. An attacker who successfully
exploited the vulnerabilities could obtain information to further
compromise the users system.

To exploit the vulnerabilities, in a web-based attack scenario, an
attacker could host a website that is used to attempt to exploit the
vulnerabilities.
In addition, compromised websites and websites that accept or host
user-provided content could contain specially crafted content that
could exploit the vulnerabilities. In all cases, however, an attacker
would have no way to force users to view the attacker-controlled
content. Instead, an attacker would have to convince users to take
action. For example, an attacker could trick users into clicking a
link that takes them to the attacker's site.
The update addresses the vulnerabilities by changing how certain
functions handle objects in memory.

The following table contains links to the standard entry for each
vulnerability in the Common Vulnerabilities and Exposures list:

Vulnerability title 	CVE number   Publicly disclosed   Exploited

Microsoft Browser Information
Disclosure Vulnerability 	CVE-2016-3326 	No 	No

Microsoft Browser Information
Disclosure Vulnerability 	CVE-2016-3327 	No 	No


Microsoft Edge Information Disclosure Vulnerability - CVE-2016-3329

An information disclosure vulnerability exists when Microsoft Edge
improperly handles page content, which could allow an attacker to
detect the existence of specific files on the user's system. The update
addresses the vulnerability by helping to ensure that page content is
properly validated in Microsoft Edge.

To exploit the vulnerability, in a web-based attack scenario, an
attacker could host a website that is used to attempt to exploit the
vulnerability. In addition, compromised websites and websites that
accept or host user-provided content could contain specially crafted
content that could exploit the vulnerability. In all cases, however,
an attacker would have no way to force users to view the
attacker-controlled content. Instead, an attacker would have to
convince users to take action. For example, an attacker could trick
users into clicking a link that takes them to the attacker's site.
The update addresses the vulnerability by changing how certain
functions handle objects in memory.

The following table contains links to the standard entry for each
vulnerability in the Common Vulnerabilities and Exposures list:

Vulnerability title  CVE number   Publicly disclosed 	Exploited

Microsoft Browser Information
Disclosure Vulnerability 	CVE-2016-3329 	No 	No

==========================================================
Serveur de référence du CERT-Renater
https://services.renater.fr/ssi/
==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================



