==================================================================== CERT-Renater Note d'Information No. 2016/VULN284 _____________________________________________________________________ DATE : 10/08/2016 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Windows, Microsoft Office, Skype for Business, Microsoft Lync. ===================================================================== KB3177393 https://technet.microsoft.com/en-us/library/security/MS16-097 ____________________________________________________________________ Microsoft Security Bulletin MS16-097: Critical - Security Update for Microsoft Graphics Component (3177393) Executive Summary This security update resolves vulnerabilities in Microsoft Windows, Microsoft Office, Skype for Business, and Microsoft Lync. The vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This security update is rated Critical for: - - All supported releases of Microsoft Windows - - Affected editions of Microsoft Office 2007 and Microsoft Office 2010 - - Affected editions of Skype for Business 2016, Microsoft Lync 2013, and Microsoft Lync 2010 The security update addresses the vulnerabilities by correcting how the Windows font library handles embedded fonts. Affected Software Windows Vista Windows Server 2008 Windows 7 Windows Server 2008 R2 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows RT 8.1 Windows 10 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 (Server Core installation) Windows Server 2012 R2 (Server Core installation) Microsoft Office 2007 Microsoft Office 2010 Microsoft Word Viewer Skype for Business 2016 Microsoft Lync 2013 Microsoft Lync 2010 Microsoft Live Meeting 2007 Console Vulnerability Information Multiple Windows Graphics Component RCE Vulnerabilities Multiple remote code execution vulnerabilities exist when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerabilities could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerabilities: - - In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerabilities and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email or Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email. - - In a file sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit the vulnerabilities, and then convince users to open the document file. The security update addresses the vulnerabilities by correcting how the Windows font library handles embedded fonts. In the Affected Software and Vulnerability Severity Ratings table for Microsoft Office, the Preview Pane is an attack vector for CVE-2016-3301, CVE-2016-3303, and CVE-2016-3304. The security update addresses the vulnerabilities by correcting how the Windows font library handles embedded fonts. The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list: Vulnerability title CVE number Publicly disclosed Exploited Windows Graphics Component RCE Vulnerability CVE-2016-3301 No No Windows Graphics Component RCE Vulnerability CVE-2016-3303 No No Windows Graphics Component RCE Vulnerability CVE-2016-3304 No No ========================================================== Serveur de référence du CERT-Renater https://services.renater.fr/ssi/ ========================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + ==========================================================