Quantcast
Channel: Windows – Born's Tech and Windows World
Viewing all articles
Browse latest Browse all 1208

Microsoft September 2016 Patch day

$
0
0

Windows UpdateMicrosoft has released a couple of security updates at September 13, 2016 for Windows, Internet Explorer, Edge and Office. Some Updates are critical, other are quoted as “high”. 

A description of all updates may be found within this Security Bulletin. Below is a compilation of several sources what’s important to know.

Critical security updates

MS16-104: Cumulative Security Update for Internet Explorer (3183038)

This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

This security update is rated Critical for Internet Explorer 9 (IE 9), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers. The update addresses the vulnerabilities by correcting how Internet Explorer handles:

  • zone and integrity settings.
  • cross-origin content.
  • objects in memory.
  • .URL files.

Affected software:
    – Windows Vista Service Pack 2:
      – Internet Explorer 9
    – Windows Vista x64 Edition Service Pack 2:
      – Internet Explorer 9
    – Windows Server 2008 for 32-bit Systems Service Pack 2:
      – Internet Explorer 9
      (Windows Server 2008 Server Core installation not affected)
    – Windows Server 2008 for x64-based Systems Service Pack 2:
      – Internet Explorer 9
      (Windows Server 2008 Server Core installation not affected)
    – Windows 7 for 32-bit Systems Service Pack 1:
      – Internet Explorer 11
    – Windows 7 for x64-based Systems Service Pack 1:
      – Internet Explorer 11
    – Windows Server 2008 R2 for x64-based Systems
      Service Pack 1:
      – Internet Explorer 11
      (Windows Server 2008 R2 Server Core installation
      not affected)
    – Windows 8.1 for 32-bit Systems:
      – Internet Explorer 11
    – Windows 8.1 for x64-based Systems:
      – Internet Explorer 11
    – Windows Server 2012
      – Internet Explorer 10
    – Windows Server 2012 R2:
      – Internet Explorer 11
      (Windows Server 2012 R2 Server Core installation not affected)
    – Windows RT 8.1:
      – Internet Explorer 11
    – Windows 10 for 32-bit Systems:
      – Internet Explorer 11
    – Windows 10 for x64-based Systems:
      – Internet Explorer 11
    – Windows 10 Version 1511 for 32-bit Systems:
      – Internet Explorer 11
    – Windows 10 Version 1511 for x64-based Systems:
      – Internet Explorer 11
    – Windows 10 Version 1607 for 32-bit Systems
      – Internet Explorer 11
    – Windows 10 Version 1607 for x64-based Systems
      – Internet Explorer 11
  – Impact: Remote Code Execution
  – Version Number: 1.0

MS16-105: Cumulative Security Update for Microsoft Edge (3183043)

his security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.

This security update is rated Critical for Microsoft Edge on Windows 10.  The update addresses the vulnerabilities by:

  • modifying how Microsoft Edge and certain functions handle objects in memory.
  • modifying how the Chakra JavaScript scripting engine handles objects in memory.
  • correcting how Microsoft Edge handles cross-origin requests.
  • ensuring that Microsoft Edge properly implements the Address Space Layout Randomization (ASLR) security feature.
  • helping to ensure that Microsoft Edge properly validates page content.

Affected software:
    – Windows 10 for 32-bit Systems
      – Microsoft Edge
    – Windows 10 for x64-based Systems
      – Microsoft Edge
    – Windows 10 Version 1511 for 32-bit Systems
      – Microsoft Edge
    – Windows 10 Version 1511 for x64-based Systems
      – Microsoft Edge
    – Windows 10 Version 1607 for 32-bit Systems
      – Microsoft Edge
    – Windows 10 Version 1607 for x64-based Systems
      – Microsoft Edge
  – Impact: Remote Code Execution
  – Version Number: 1.0

MS16-106: Security Update for Microsoft Graphics Component (3185848)

This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

This security update is rated Critical for supported editions of Windows 10 Version 1607 and rated Important for all other supported releases of Windows:  The security update addresses the vulnerabilities by correcting how certain Windows kernel-mode drivers and the Windows Graphics Device Interface(GDI) handle objects in memory and by preventing instances of unintended user-mode privilege elevation.

Affected software:
    – Windows Vista Service Pack 2
    – Windows Vista x64 Edition Service Pack 2
    – Windows Server 2008 for 32-bit Systems Service Pack 2
     (Windows Server 2008 Server Core installation affected)
    – Windows Server 2008 for x64-based Systems Service Pack 2
     (Windows Server 2008 Server Core installation affected)
    – Windows Server 2008 for Itanium-based Systems Service Pack 2
     (Windows Server 2008 Server Core installation affected)
    – Windows 7 for 32-bit Systems Service Pack 1
    – Windows 7 for x64-based Systems Service Pack 1
    – Windows Server 2008 R2 for x64-based Systems Service Pack 1
      (Windows Server 2008 R2 Server Core installation affected)
    – Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
    – Windows 8.1 for 32-bit Systems
    – Windows 8.1 for x64-based Systems
    – Windows Server 2012
     (Windows Server 2012 Server Core installation affected)
    – Windows Server 2012 R2
     (Windows Server 2012 R2 Server Core installation affected)
    – Windows RT 8.1
    – Windows 10 for 32-bit Systems
    – Windows 10 for x64-based Systems
    – Windows 10 Version 1511 for 32-bit Systems
    – Windows 10 Version 1511 for x64-based Systems
    – Windows 10 Version 1607 for 32-bit Systems
    – Windows 10 Version 1607 for x64-based Systems
  – Impact: Remote Code Execution
  – Version Number: 1.0

MS16-107: Security Update for Microsoft Office (3185852)

This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. The security update addresses the vulnerabilities by correcting how:

  • Microsoft Office saves documents.
  • Click-to-Run components handle memory addresses.
  • affected versions of Office and Office components handle objects in memory.
  • Microsoft Outlook determines the end of MIME messages.

Affected software:

    – Microsoft Office 2007 Service Pack 3
    – Microsoft Excel 2007 Service Pack 3
    – Microsoft Outlook 2007 Service Pack 3
    – Microsoft PowerPoint 2007 Service Pack 3
    – Microsoft Office 2010 Service Pack 2 (32-bit editions)
    – Microsoft Office 2010 Service Pack 2 (64-bit editions)
    – Microsoft Excel 2010 Service Pack 2 (32-bit editions)
    – Microsoft Excel 2010 Service Pack 2 (64-bit editions)
    – Microsoft Outlook 2010 Service Pack 2 (32-bit editions)
    – Microsoft Outlook 2010 Service Pack 2 (64-bit editions)
    – Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions)
    – Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions)
    – Microsoft Office 2013 Service Pack 1 (32-bit editions)
    – Microsoft Office 2013 Service Pack 1 (64-bit editions)
    – Microsoft Excel 2013 Service Pack 1 (32-bit editions)
    – Microsoft Excel 2013 Service Pack 1 (64-bit editions)
    – Microsoft Outlook 2013 Service Pack 1 (32-bit editions)
    – Microsoft Outlook 2013 Service Pack 1 (64-bit editions)
    – Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions)
    – Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions)
    – Microsoft Office 2013 RT Service Pack 1
    – Microsoft Excel 2013 RT Service Pack 1
    – Microsoft Outlook 2013 RT Service Pack 1
    – Microsoft PowerPoint 2013 RT Service Pack 1
    – Microsoft Office 2016 (32-bit edition)
    – Microsoft Office 2016 (64-bit edition)
    – Microsoft Excel 2016 (32-bit edition)
    – Microsoft Excel 2016 (64-bit edition)
    – Microsoft Outlook 2016 (32-bit edition)
    – Microsoft Outlook 2016 (64-bit edition)
    – Microsoft Visio 2016 (32-bit editions)
    – Microsoft Visio 2016 (64-bit editions)
    – Microsoft Word for Mac 2011
    – Microsoft Excel 2016 for Mac
    – Microsoft PowerPoint 2016 for Mac
    – Microsoft Word 2016 for Mac
    – Microsoft Office Compatibility Pack Service Pack 3
    – Microsoft Excel Viewer
    – Microsoft PowerPoint Viewer
    – Microsoft Word Viewer
    – Excel Services on Microsoft SharePoint Server 2007 Service
      Pack 3 (32-bit editions)
    – Excel Services on Microsoft SharePoint Server 2007 Service
      Pack 3 (64-bit editions)
    – Excel Services on Microsoft SharePoint Server 2010 Service
      Pack 2
    – Word Automation Services on Microsoft SharePoint Server 2010
      Service Pack 2
    – Microsoft SharePoint Server 2013 Service Pack 1
    – Excel Automation Services on Microsoft SharePoint Server 2013
      Service Pack 1
    – Word Automation Services on Microsoft SharePoint Server 2013
      Service Pack 1
    – Microsoft Office Web Apps 2010 Service Pack 2
    – Microsoft Office Web Apps Server 2013 Service Pack 1
    – Office Online Server
  – Impact: Remote Code Execution
  – Version Number: 1.0

MS16-108: Security Update for Microsoft Exchange Server (3185883)

This security update resolves vulnerabilities in Microsoft Exchange Server. The most severe of the vulnerabilities could allow remote code execution in some Oracle Outside In libraries that are built into Exchange Server if an attacker sends an email with a specially crafted attachment to a vulnerable Exchange server.

This security update is rated Critical for all supported editions of Microsoft Exchange Server 2007, Microsoft Exchange Server 2010, Microsoft Exchange Server 2013, and Microsoft Exchange Server 2016. The security update addresses the vulnerabilities by correcting how Microsoft Exchange:

  • parses certain unstructured file formats.
  • handles open redirect requests.
  • handles Microsoft Outlook meeting invitation requests.

Affected software:

    – Microsoft Exchange Server 2007 Service Pack 3
    – Microsoft Exchange Server 2010 Service Pack 3
    – Microsoft Exchange Server 2013 Service Pack 1
    – Microsoft Exchange Server 2013 Cumulative Update 12
    – Microsoft Exchange Server 2013 Cumulative Update 13
    – Microsoft Exchange Server 2016 Cumulative Update 1
    – Microsoft Exchange Server 2016 Cumulative Update 2
  – Impact: Remote Code Execution
  – Version Number: 1.0

MS16-116: Security Update in OLE Automation for VBScript Scripting Engine (3188724)

This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker successfully convinces a user of an affected system to visit a malicious or compromised website. Note that you must install two updates to be protected from the vulnerability discussed in this bulletin: The update in this bulletin, MS16-116, and the update in MS16-104.

The security update affects all supported releases of Microsoft Windows and is rated Critical on client operating systems and Moderate on servers.

Affected software:
    – Windows Vista Service Pack 2
    – Windows Vista x64 Edition Service Pack 2
    – Windows Server 2008 for 32-bit Systems Service Pack 2
     (Windows Server 2008 Server Core installation affected)
    – Windows Server 2008 for x64-based Systems Service Pack 2
     (Windows Server 2008 Server Core installation affected)
    – Windows Server 2008 for Itanium-based Systems Service Pack 2
     (Windows Server 2008 Server Core installation affected)
    – Windows 7 for 32-bit Systems Service Pack 1
    – Windows 7 for x64-based Systems Service Pack 1
    – Windows Server 2008 R2 for x64-based Systems Service Pack 1
      (Windows Server 2008 R2 Server Core installation affected)
    – Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
    – Windows 8.1 for 32-bit Systems
    – Windows 8.1 for x64-based Systems
    – Windows Server 2012
     (Windows Server 2012 Server Core installation affected)
    – Windows Server 2012 R2
     (Windows Server 2012 R2 Server Core installation affected)
    – Windows RT 8.1
    – Windows 10 for 32-bit Systems
    – Windows 10 for x64-based Systems
    – Windows 10 Version 1511 for 32-bit Systems
    – Windows 10 Version 1511 for x64-based Systems
    – Windows 10 Version 1607 for 32-bit Systems
    – Windows 10 Version 1607 for x64-based Systems
  – Impact: Remote Code Execution
  – Version Number: 1.0

MS16-117: Security Update for Adobe Flash Player (3188128)

This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.

This security update is rated Critical. The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10, Internet Explorer 11, and Microsoft Edge.

Affected software:
    – Windows 8.1 for 32-bit Systems
    – Windows 8.1 for x64-based Systems
    – Windows Server 2012
      (Windows Server 2012 Server Core installation not affected)
    – Windows Server 2012 R2
      (Windows Server 2012 R2 Server Core installation not affected)
    – Windows RT 8.1
    – Windows 10 for 32-bit Systems
    – Windows 10 for x64-based Systems
    – Windows 10 Version 1511 for 32-bit Systems
    – Windows 10 Version 1511 for x64-based Systems
    – Windows 10 Version 1607 for 32-bit Systems
    – Windows 10 Version 1607 for x64-based Systems
  – Impact: Remote Code Execution
  – Version Number: 1.0

Important Security Updates

MS16-109: Security Update for Silverlight (3182373)

This security update resolves a vulnerability in Microsoft Silverlight. The vulnerability could allow remote code execution if a user visits a compromised website that contains a specially crafted Silverlight application. An attacker would have no way to force a user to visit a compromised website. Instead, an attacker would have to convince the user to visit the website, typically by enticing the user to click a link in either an email or instant message that takes the user to the attacker’s website.

This security update is rated Important for Microsoft Silverlight 5 and Microsoft Silverlight 5 Developer Runtime when installed on Mac or all supported releases of Microsoft Windows.

Affected software:
    – Microsoft Silverlight 5 when installed on Mac
    – Microsoft Silverlight 5 Developer Runtime when installed
      on Mac
    – Microsoft Silverlight 5 when installed on all supported
      releases of Microsoft Windows clients
    – Microsoft Silverlight 5 Developer Runtime when installed
      on all supported releases of Microsoft Windows clients
    – Microsoft Silverlight 5 when installed on all supported
      releases of Microsoft Windows servers
    – Microsoft Silverlight 5 Developer Runtime when installed
      on all supported releases of Microsoft Windows servers
  – Impact: Remote Code Execution
  – Version Number: 1.0

MS16-110: Security Update for Microsoft Windows (3178467)

This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker creates a specially crafted request and executes arbitrary code with elevated permissions on a target system.

This security update is rated Important for all supported releases of Microsoft Windows excluding Itanium servers, which are not affected. The security update addresses the vulnerabilities by:

  • correcting how Windows enforces permissions.
  • preventing NT LAN Manager (NTLM) Single Sign-On (SSO) authentication to non-private SMB resources when users are signed in to Windows via a Microsoft Account (https://www.microsoft.com/account) and connected to a “Guest or public networks” firewall profile.
  • correcting how Windows handles objects in memory.

Affected software:
    – Windows Vista Service Pack 2
    – Windows Vista x64 Edition Service Pack 2
    – Windows Server 2008 for 32-bit Systems Service Pack 2
      (Windows Server 2008 Server Core installation affected)
    – Windows Server 2008 for x64-based Systems Service Pack 2
      (Windows Server 2008 Server Core installation affected)
    – Windows 7 for 32-bit Systems Service Pack 1
    – Windows 7 for x64-based Systems Service Pack 1
    – Windows Server 2008 R2 for x64-based Systems Service Pack 1
      (Windows Server 2008 R2 Server Core installation affected)
    – Windows 8.1 for 32-bit Systems
    – Windows 8.1 for x64-based Systems
    – Windows Server 2012
      (Windows Server 2012 Server Core installation affected)
    – Windows Server 2012 R2
      (Windows Server 2012 R2 Server Core installation affected)
    – Windows RT 8.1
    – Windows 10 for 32-bit Systems
    – Windows 10 for x64-based Systems
    – Windows 10 Version 1511 for 32-bit Systems
    – Windows 10 Version 1511 for x64-based Systems
    – Windows 10 Version 1607 for 32-bit Systems
    – Windows 10 Version 1607 for x64-based Systems
  – Impact: Remote Code Execution
  – Version Number: 1.0

MS16-111: Security Update for Windows Kernel (3186973)

This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application on a target system. This security update is rated Important for all supported releases of Microsoft Windows.

Affected software:

    – Windows Vista Service Pack 2
    – Windows Vista x64 Edition Service Pack 2
    – Windows Server 2008 for 32-bit Systems Service Pack 2
     (Windows Server 2008 Server Core installation affected)
    – Windows Server 2008 for x64-based Systems Service Pack 2
     (Windows Server 2008 Server Core installation affected)
    – Windows Server 2008 for Itanium-based Systems Service Pack 2
     (Windows Server 2008 Server Core installation affected)
    – Windows 7 for 32-bit Systems Service Pack 1
    – Windows 7 for x64-based Systems Service Pack 1
    – Windows Server 2008 R2 for x64-based Systems Service Pack 1
      (Windows Server 2008 R2 Server Core installation affected)
    – Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
    – Windows 8.1 for 32-bit Systems
    – Windows 8.1 for x64-based Systems
    – Windows Server 2012
     (Windows Server 2012 Server Core installation affected)
    – Windows Server 2012 R2
     (Windows Server 2012 R2 Server Core installation affected)
    – Windows RT 8.1
    – Windows 10 for 32-bit Systems
    – Windows 10 for x64-based Systems
    – Windows 10 Version 1511 for 32-bit Systems
    – Windows 10 Version 1511 for x64-based Systems
    – Windows 10 Version 1607 for 32-bit Systems
    – Windows 10 Version 1607 for x64-based Systems
  – Impact: Elevation of Privilege
  – Version Number: 1.0

MS16-112: Security Update for Windows Lock Screen (3178469)

This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if Windows improperly allows web content to load from the Windows lock screen. This security update is rated Important for all supported editions of Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, and Windows 10.

Affected software:
    – Windows 8.1 for 32-bit Systems
    – Windows 8.1 for x64-based Systems
    – Windows Server 2012 R2
      (Windows Server 2012 R2 Server Core installation affected)
    – Windows RT 8.1
    – Windows 10 for 32-bit Systems
    – Windows 10 for x64-based Systems
    – Windows 10 Version 1511 for 32-bit Systems
    – Windows 10 Version 1511 for x64-based Systems
    – Windows 10 Version 1607 for 32-bit Systems
    – Windows 10 Version 1607 for x64-based Systems
  – Impact: Elevation of Privilege
  – Version Number: 1.0

MS16-113: Security Update for Windows Secure Kernel Mode (3185876)

This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure when Windows Secure Kernel Mode improperly handles objects in memory.

This security update is rated Important for all supported editions of Windows 10 and Windows 10 Version 1511.

Affected software:
    – Windows 10 for 32-bit Systems
    – Windows 10 for x64-based Systems
    – Windows 10 Version 1511 for 32-bit Systems
    – Windows 10 Version 1511 for x64-based Systems
  – Impact: Information Disclosure
  – Version Number: 1.0

MS16-114: Security Update for Windows SMBv1 Server (3185879)

This security update resolves a vulnerability in Microsoft Windows. On Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 operating systems, the vulnerability could allow remote code execution if an authenticated attacker sends specially crafted packets to an affected Microsoft Server Message Block 1.0 (SMBv1) Server. The vulnerability does not impact other SMB Server versions. Although later operating systems are affected, the potential impact is denial of service. This security update is rated Important for all supported releases of Microsoft Windows.

Affected software:
    – Windows Vista Service Pack 2
    – Windows Vista x64 Edition Service Pack 2
    – Windows Server 2008 for 32-bit Systems Service Pack 2
     (Windows Server 2008 Server Core installation affected)
    – Windows Server 2008 for x64-based Systems Service Pack 2
     (Windows Server 2008 Server Core installation affected)
    – Windows Server 2008 for Itanium-based Systems Service Pack 2
     (Windows Server 2008 Server Core installation affected)
    – Windows 7 for 32-bit Systems Service Pack 1
    – Windows 7 for x64-based Systems Service Pack 1
    – Windows Server 2008 R2 for x64-based Systems Service Pack 1
      (Windows Server 2008 R2 Server Core installation affected)
    – Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
    – Windows 8.1 for 32-bit Systems
    – Windows 8.1 for x64-based Systems
    – Windows Server 2012
     (Windows Server 2012 Server Core installation affected)
    – Windows Server 2012 R2
     (Windows Server 2012 R2 Server Core installation affected)
    – Windows RT 8.1
    – Windows 10 for 32-bit Systems
    – Windows 10 for x64-based Systems
    – Windows 10 Version 1511 for 32-bit Systems
    – Windows 10 Version 1511 for x64-based Systems
    – Windows 10 Version 1607 for 32-bit Systems
    – Windows 10 Version 1607 for x64-based Systems
  – Impact: Remote Code Execution
  – Version Number: 1.0

MS16-115: Security Update for Microsoft Windows PDF Library (3188733)

This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow information disclosure if a user views specially crafted PDF content online or opens a specially crafted PDF document. This security update is rated Important for all supported editions of Windows 8.1, Windows Server 2012, Windows RT 8.1, Windows Server 2012 R2, and Windows 10.

Affected software:

    – Windows 8.1 for 32-bit Systems
    – Windows 8.1 for x64-based Systems
    – Windows Server 2012
     (Windows Server 2012 Server Core installation not affected)
    – Windows Server 2012 R2
     (Windows Server 2012 R2 Server Core installation not affected)
    – Windows RT 8.1
    – Windows 10 for 32-bit Systems
    – Windows 10 for x64-based Systems
    – Windows 10 Version 1511 for 32-bit Systems
    – Windows 10 Version 1511 for x64-based Systems
    – Windows 10 Version 1607 for 32-bit Systems
    – Windows 10 Version 1607 for x64-based Systems
  – Impact: Information Disclosure
  – Version Number: 1.0

Similar articles:
Windows 10: Updates KB3185611 and KB3185614
Update KB3189866 shifts Windows 10 to Build 14393.187


Viewing all articles
Browse latest Browse all 1208

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>