Microsoft Patch Tuesday, September 2016
September's Patch Tuesday is upon us and it's the biggest one so far this year. While past months have been relatively light, September has nearly twice as many vulnerabilities patched compared to August. All told September contains 14 bulletins patching a total of 59 unique vulnerabilities. The bulletins are evenly divided with 7 rated Critical and 7 rated as Important.
Internet Explorer and Microsoft Edge maintain their monthly positions among those Critical bulletins. Microsoft Exchange Server makes a relatively rare appearance on the Critical list with three vulnerabilities that could result in remote code execution. Although there is no "in the wild" exploit for these vulnerabilities right now, Exchange admins will definitely want to prioritize this patch.
It's also a bad month for Microsoft clients. In addition to the Internet Explorer and Edge, Microsoft Office makes another appearance with thirteen unique vulnerabilities that could result in arbitrary code execution. Clients could also be at risk due to vulnerabilities in the Microsoft Graphics Component. The most severe of these could result in arbitrary code execution by opening a malicious document or visiting a malicious website. Microsoft OLE Automation for the VBScript scripting engine also patches a Critical vulnerability that expands on a patch released earlier this year for Internet Explorer (MS16-104). Finally vulnerabilities in the active content plugin, Silverlight could also result in arbitrary code execution. Overall, it's become a little more risky than usual to open strange documents or visit strange websites. Admins, get to patching!
MS16-104
CVE-2016-3247, CVE-2016-3291, CVE-2016-3292, CVE-2016-3295, CVE-2016-3297, CVE-2016-3324, CVE-2016-3325, CVE-2016-3351, CVE-2016-3353, CVE-2016-3375
Critical
Cumulative Security Update for Internet Explorer
This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
This security update is rated Critical for Internet Explorer 9 (IE 9), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
MS16-105
CVE-2016-3247, CVE-2016-3291, CVE-2016-3294, CVE-2016-3295, CVE-2016-3297, CVE-2016-3325, CVE-2016-3330, CVE-2016-3350, CVE-2016-3351, CVE-2016-3370, CVE-2016-3374, CVE-2016-3377
Critical
Cumulative Security Update for Microsoft Edge
This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.
This security update is rated Critical for Microsoft Edge on Windows 10.
MS16-106
CVE-2016-3348, CVE-2016-3349, CVE-2016-3354, CVE-2016-3355, CVE-2016-3356
Critical
Security Update for Microsoft Graphics Component
This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
This security update is rated Critical for supported editions of Windows 10 Version 1607 and rated Important for all other supported releases of Windows:
The security update addresses the vulnerabilities by correcting how certain Windows kernel-mode drivers and the Windows Graphics Device Interface (GDI) handle objects in memory and by preventing instances of unintended user-mode privilege elevation.
MS16-107
CVE-2016-0137, CVE-2016-0141, CVE-2016-3357, CVE-2016-3358, CVE-2016-3359, CVE-2016-3360, CVE-2016-3361, CVE-2016-3362, CVE-2016-3363, CVE-2016-3364, CVE-2016-3365, CVE-2016-3366, CVE-2016-3381
Critical
Security Update for Office
This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
See full Microsoft bulletin for affected versions of Microsoft Office.
MS16-108
CVE-2016-0138, CVE-2016-3378, CVE-2016-3379
Critical
Security Update for Microsoft Exchange Server
This security update resolves vulnerabilities in Microsoft Exchange Server. The most severe of the vulnerabilities could allow remote code execution in some Oracle Outside In libraries that are built into Exchange Server if an attacker sends an email with a specially crafted attachment to a vulnerable Exchange server.
This security update is rated Critical for all supported editions of Microsoft Exchange Server 2007, Microsoft Exchange Server 2010, Microsoft Exchange Server 2013, and Microsoft Exchange Server 2016.
MS16-109
CVE-2016-3367
Important
Security Update for Silverlight
This security update resolves a vulnerability in Microsoft Silverlight. The vulnerability could allow remote code execution if a user visits a compromised website that contains a specially crafted Silverlight application. An attacker would have no way to force a user to visit a compromised website. Instead, an attacker would have to convince the user to visit the website, typically by enticing the user to click a link in either an email or instant message that takes the user to the attacker's website.
This security update is rated Important for Microsoft Silverlight 5 and Microsoft Silverlight 5 Developer Runtime when installed on Mac or all supported releases of Microsoft Windows.
MS16-110
CVE-2016-3346, CVE-2016-3352, CVE-2016-3368, CVE-2016-3369
Important
Security Update for Windows
This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker creates a specially crafted request and executes arbitrary code with elevated permissions on a target system.
This security update is rated Important for all supported releases of Microsoft Windows excluding Itanium servers, which are not affected.
MS16-111
CVE-2016-3305, CVE-2016-3306, CVE-2016-3371, CVE-2016-3372, CVE-2016-3373
Important
Security Update for Windows Kernel
This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application on a target system.
Multiple Windows session object elevation of privilege vulnerabilities exist in the way that Windows handles session objects. A locally authenticated attacker who successfully exploited the vulnerabilities could hijack the session of another user.
This security update is rated Important for all supported releases of Microsoft Windows.
MS16-112
CVE-2016-3302
Important
Security Update for Windows Lock Screen
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if Windows improperly allows web content to load from the Windows lock screen.
An elevation of privilege vulnerability exists when Windows improperly allows web content to load from the Windows lock screen. To exploit the vulnerability, an attacker with physical access to a user's computer could either connect to a maliciously configured WiFi hotspot or insert a mobile broadband adaptor in the user's computer. An attacker who successfully exploited the vulnerability could potentially execute code on a user's locked computer.
This security update is rated Important for all supported editions of Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, and Windows 10.
MS16-113
CVE-2016-3344
Important
Security Update for Windows Secure Kernel Mode
This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application on a target system.
Multiple Windows session object elevation of privilege vulnerabilities exist in the way that Windows handles session objects. A locally authenticated attacker who successfully exploited the vulnerabilities could hijack the session of another user.
This security update is rated Important for all supported releases of Microsoft Windows
MS16-114
CVE-2016-3345
Important
Security Update for Windows SMBv1 Server
This security update resolves a vulnerability in Microsoft Windows. On Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 operating systems, the vulnerability could allow remote code execution if an authenticated attacker sends specially crafted packets to an affected Microsoft Server Message Block 1.0 (SMBv1) Server. The vulnerability does not impact other SMB Server versions. Although later operating systems are affected, the potential impact is denial of service.
This security update is rated Important for all supported releases of Microsoft Windows.
MS16-115
CVE-2016-3370, CVE-2016-3374
Important
Security Update for Microsoft Windows PDF Library
This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow information disclosure if a user views specially crafted PDF content online or opens a specially crafted PDF document.
This security update is rated Important for all supported editions of Windows 8.1, Windows Server 2012, Windows RT 8.1, Windows Server 2012 R2, and Windows 10.
MS16-116
CVE-2016-3375
Critical
Security Update in OLE Automation for VBScript Scripting Engine
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker successfully convinces a user of an affected system to visit a malicious or compromised website. Note that you must install two updates to be protected from the vulnerability discussed in this bulletin: The update in this bulletin, MS16-116, and the update in MS16-104.
This security update, in conjunction with the Internet Explorer update in MS16-104, addresses the vulnerability by correcting how the Microsoft OLE Automation mechanism and the VBScript Scripting Engine in Internet Explorer handle objects in memory.
The security update affects all supported releases of Microsoft Windows and is rated Critical on client operating systems and Moderate on servers. For more information.
MS16-117
CVE-2016-4271, CVE-2016-4272, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923, CVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932
Critical
Security Update for Adobe Flash Player
This security update addresses critical vulnerabilities, which are described in Adobe Security Bulletin APSB16-29
This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
This security update is rated Critical. The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10, Internet Explorer 11, and Microsoft Edge.
ABOUT TRUSTWAVE
Trustwave is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.