Korean
<< Back
VID 26750
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Hotfix (MS16-009, 3134220) for 'Cumulative Security Update for Internet Explorer' has not been applied.
This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

DLL Loading Remote Code Execution Vulnerability - CVE-2016-0041
A remote code execution vulnerability exists when Internet Explorer improperly validates input before loading dynamic link library (DLL) files. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Internet Explorer Information Disclosure Vulnerability - CVE-2016-0059
An information disclosure vulnerability exists in Internet Explorer when Hyperlink Object Library improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user¡¯s system.

Multiple Internet Explorer Memory Corruption Vulnerabilities
Multiple remote code execution vulnerabilities exist when Internet Explorer improperly accesses objects in memory. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.

Microsoft Browser Spoofing Vulnerability - CVE-2016-0077
A spoofing vulnerability exists when a Microsoft browser does not properly parse HTTP responses. An attacker who successfully exploited this vulnerability could trick a user by redirecting them to a specially crafted website. The specially crafted website could spoof content or be used as a pivot to chain an attack with other vulnerabilities in web services.

Multiple Internet Explorer Elevation of Privilege Vulnerabilities
Multiple elevation of privilege vulnerabilities exist when Internet Explorer does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain.

* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
https://technet.microsoft.com/en-us/library/security/ms16-009

* Platforms Affected:
Internet Explorer 9
Internet Explorer 10
Internet Explorer 11
Recommendation Apply the appropriate patch(3134220) for your system, as listed in Microsoft Security Bulletin MS16-009 at https://technet.microsoft.com/en-us/library/security/ms16-009
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2016-0041,CVE-2016-0059,CVE-2016-0060,CVE-2016-0061,CVE-2016-0062,CVE-2016-0063,CVE-2016-0064,CVE-2016-0067,CVE-2016-0068,CVE-2016-0069 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)