Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
 
HP ThinPro CVE-2016-2246 Local Privilege Escalation Vulnerability
 
Linux Kernel CVE-2016-7039 Stack Overflow Denial of Service Vulnerability
 
Multiple Cisco Products CVE-2016-6360 Denial of Service Vulnerability
 

I tested the process replacement maldoc (Hancitor Maldoc Bypasses Application Whitelisting) on Windows 10 and Word 2016. Its not blocked.

However, its not stable. The shellcode is executed and the embedded malware is launched (9 times out of 10 successfully), but then the Word process crashes.
To be 100% sure, I made my own PoC Word document that injects shellcode and then starts calculator. This PoC is always successful on Windows 10 without EMET, and doesnt crash the Word process. As expected, when EMET is installed on Windows 10, execution of the shellcode is blocked and calc.exe cant be launched.

Didier Stevens
Microsoft MVP Consumer Security
blog.DidierStevens.com DidierStevensLabs.com
NVISO

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Internet Storm Center Infocon Status