Microsoft security alert.
February 9, 2016
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 58 vulnerabilities that were fixed in 13 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 13 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft Office Remote Code Execution Vulnerabilities (MS16-015)
- Severity
- Critical 4
- Qualys ID
- 110265
- Vendor Reference
- MS16-015
- CVE Reference
- CVE-2016-0022, CVE-2016-0039, CVE-2016-0052, CVE-2016-0053, CVE-2016-0054, CVE-2016-0055, CVE-2016-0056
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft Office is prone to the following vulnerabilities:
Multiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory.
An elevation of privilege vulnerability exists when SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.
Microsoft has released a security update that addresses the vulnerabilities by:
- Correcting how Office handles objects in memory
- Providing a validly signed binary
- Helping to ensure that SharePoint Server properly sanitizes web requests
This security update is rated as Critical.
- Consequence
- The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user.
- Solution
-
Refer to MS16-015 to obtain more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-015 Excel Services on Microsoft SharePoint Server 2007 Service Pack 3 (32-bit editions)
MS16-015 Excel Services on Microsoft SharePoint Server 2007 Service Pack 3 (64-bit editions)
MS16-015 Excel Services on Microsoft SharePoint Server 2010 Service Pack 2
MS16-015 Excel Services on Microsoft SharePoint Server 2013 Service Pack 1
MS16-015 Microsoft Excel 2007 Service Pack 3
MS16-015 Microsoft Excel 2010 Service Pack 2 (32-bit editions)
MS16-015 Microsoft Excel 2010 Service Pack 2 (64-bit editions)
MS16-015 Microsoft Excel 2013 Service Pack 1 (32-bit editions)
MS16-015 Microsoft Excel 2013 Service Pack 1 (64-bit editions)
MS16-015 Microsoft Excel 2016 (32-bit edition)
MS16-015 Microsoft Excel 2016 (64-bit edition)
MS16-015 Microsoft Excel Viewer
MS16-015 Microsoft Office 2007 Service Pack 3
MS16-015 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-015 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS16-015 Microsoft Office Compatibility Pack Service Pack 3
MS16-015 Microsoft Office Compatibility Pack Service Pack 3
MS16-015 Microsoft Office Web Apps 2010 Service Pack 2
MS16-015 Microsoft Office Web Apps Server 2013 Service Pack 1
MS16-015 Microsoft SharePoint Foundation 2013 Service Pack 1
MS16-015 Microsoft SharePoint Server 2013 Service Pack 1
MS16-015 Microsoft Word 2007 Service Pack 3
MS16-015 Microsoft Word 2010 Service Pack 2 (32-bit editions)
MS16-015 Microsoft Word 2010 Service Pack 2 (64-bit editions)
MS16-015 Microsoft Word 2013 Service Pack 1 (32-bit editions)
MS16-015 Microsoft Word 2013 Service Pack 1 (64-bit editions)
MS16-015 Microsoft Word 2016 (32-bit edition)
MS16-015 Microsoft Word 2016 (64-bit edition)
MS16-015 Microsoft Word Viewer
MS16-015 Word Automation Services on Microsoft SharePoint Server 2013 Service Pack 1
-
Microsoft Cumulative Security Update for Internet Explorer (MS16-009)
- Severity
- Critical 4
- Qualys ID
- 100276
- Vendor Reference
- MS16-009
- CVE Reference
- CVE-2016-0041, CVE-2016-0059, CVE-2016-0060, CVE-2016-0061, CVE-2016-0062, CVE-2016-0063, CVE-2016-0064, CVE-2016-0067, CVE-2016-0068, CVE-2016-0069, CVE-2016-0071, CVE-2016-0072, CVE-2016-0077
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft Internet Explorer is a graphical web browser developed by Microsoft and included as part of the Microsoft Windows operating systems.
This security update resolves multiple vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.
This security update is rated Critical for Internet Explorer 9 (IE 9), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
- Consequence
-
The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS16-009 for more details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-009 Windows 10 Version 1511 for 32-bit Systems
MS16-009 Windows 10 Version 1511 for x64-based Systems
MS16-009 Windows 10 for 32-bit Systems
MS16-009 Windows 10 for x64-based Systems
MS16-009 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS16-009 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS16-009 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS16-009 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS16-009 Windows Server 2008 R2 for Itanium-based Systems Service Pack 2(Internet Explorer 11)
MS16-009 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS16-009 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS16-009 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS16-009 Windows Server 2012(Internet Explorer 10)
MS16-009 Windows Server 2012 R2(Internet Explorer 11)
MS16-009 Windows Vista Service Pack 2(Internet Explorer 9)
MS16-009 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
-
Microsoft Edge Cumulative Security Update (MS16-011)
- Severity
- Critical 4
- Qualys ID
- 91168
- Vendor Reference
- MS16-011
- CVE Reference
- CVE-2016-0060, CVE-2016-0061, CVE-2016-0062, CVE-2016-0077, CVE-2016-0080, CVE-2016-0084
- CVSS Scores
- Base 9.3 / Temporal 7.3
- Description
-
Microsoft Edge is a web browser developed by Microsoft and included in the company's Windows 10 operating systems, replacing Internet Explorer as the default web browser on all device classes.
This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow code execution with elevated privileges if a user views a specially crafted webpage using Microsoft Edge.
This security update is rated critical for Microsoft Edge on Windows 10.
- Consequence
- An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user.
- Solution
-
Customers are advised to refer to Microsoft Security Bulletin MS16-011 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-011 Windows 10 Version 1511 for 32-bit Systems
MS16-011 Windows 10 Version 1511 for x64-based Systems
MS16-011 Windows 10 for 32-bit Systems
MS16-011 Windows 10 for x64-based Systems
-
Microsoft Windows PDF Library Remote Code Execution Vulnerabilities (MS16-012)
- Severity
- Critical 4
- Qualys ID
- 91162
- Vendor Reference
- MS16-012
- CVE Reference
- CVE-2016-0046, CVE-2016-0058
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if Microsoft Windows PDF Library improperly handles application programming interface (API) calls.
The update addresses the vulnerabilities by changing how memory is handled when API calls are made to the PDF Library, and by modifying how Windows Reader parses files.
This security update is rated Critical for all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, and Windows 10.
- Consequence
- The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user.
- Solution
-
Refer to MS16-012 to obtain more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-012 Windows 10 for 32-bit Systems
MS16-012 Windows 10 for x64-based Systems
MS16-012 Windows 8.1 for 32-bit Systems
MS16-012 Windows 8.1 for x64-based Systems
MS16-012 Windows Server 2012
MS16-012 Windows Server 2012 R2
-
Microsoft Windows Journal Remote Code Execution Vulnerability (MS16-013)
- Severity
- Critical 4
- Qualys ID
- 91163
- Vendor Reference
- MS16-013
- CVE Reference
- CVE-2016-0038
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file.
The update addresses the vulnerability by modifying how Windows Journal parses Journal files.
This security update is rated Critical for all supported editions of Windows Vista, Windows 7, Windows 8.1, and Windows 10, for all supported non-Itanium editions of Windows Server 2008 and Windows Server 2008 R2.
- Consequence
-
An attacker who successfully exploited these vulnerabilities can install programs, view, change, or delete data,or create new accounts with full user rights.
- Solution
-
Refer to MS16-013 to obtain more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-013 Windows 10 Version 1511 for 32-bit Systems
MS16-013 Windows 10 Version 1511 for x64-based Systems
MS16-013 Windows 10 for 32-bit Systems
MS16-013 Windows 10 for x64-based Systems
MS16-013 Windows 7 for 32-bit Systems Service Pack 1
MS16-013 Windows 7 for x64-based Systems Service Pack 1
MS16-013 Windows 8.1 for 32-bit Systems
MS16-013 Windows 8.1 for x64-based Systems
MS16-013 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-013 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-013 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-013 Windows Server 2012
MS16-013 Windows Server 2012 R2
MS16-013 Windows Vista Service Pack 2
MS16-013 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Remote Code Execution Vulnerability (MS16-014)
- Severity
- Critical 4
- Qualys ID
- 91165
- Vendor Reference
- MS16-014
- CVE Reference
- CVE-2016-0040, CVE-2016-0041, CVE-2016-0042, CVE-2016-0044, CVE-2016-0049
- CVSS Scores
- Base 7.2 / Temporal 6
- Description
-
This security update resolves vulnerabilities in Microsoft Windows.
- An elevation of privilege vulnerability exists when the Windows kernel improperly handles objects in memory.
- Multiple remote code execution vulnerabilities exist when Windows improperly validates input before loading dynamic link library (DLL) files.
- A denial of service vulnerability exists in Windows when Microsoft Sync Framework processes specially crafted input that uses the change batch structure.
- A security feature bypass exists in Windows when Kerberos fails to check the password change of a user signing into a workstation.
This security update is rated Important for all supported releases of Microsoft Windows.
- Consequence
- Successful exploitation allows an attacker to execute arbitrary code.
- Solution
-
Refer to Microsoft Security Bulletin MS16-014 for further details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-014 Windows 10 Version 1511 for 32-bit Systems
MS16-014 Windows 10 Version 1511 for x64-based Systems
MS16-014 Windows 10 for 32-bit Systems
MS16-014 Windows 10 for x64-based Systems
MS16-014 Windows 7 for 32-bit Systems Service Pack 1
MS16-014 Windows 7 for 32-bit Systems Service Pack 1
MS16-014 Windows 7 for x64-based Systems Service Pack 1
MS16-014 Windows 7 for x64-based Systems Service Pack 1
MS16-014 Windows 8.1 for 32-bit Systems
MS16-014 Windows 8.1 for 32-bit Systems
MS16-014 Windows 8.1 for 32-bit Systems
MS16-014 Windows 8.1 for x64-based Systems
MS16-014 Windows 8.1 for x64-based Systems
MS16-014 Windows 8.1 for x64-based Systems
MS16-014 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-014 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-014 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-014 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-014 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-014 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-014 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-014 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-014 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-014 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-014 Windows Server 2012
MS16-014 Windows Server 2012
MS16-014 Windows Server 2012 R2
MS16-014 Windows Server 2012 R2
MS16-014 Windows Server 2012 R2
MS16-014 Windows Vista Service Pack 2
MS16-014 Windows Vista Service Pack 2
MS16-014 Windows Vista x64 Edition Service Pack 2
MS16-014 Windows Vista x64 Edition Service Pack 2
-
Microsoft WebDAV Privilege Escalation Vulnerability (MS16-016)
- Severity
- Critical 4
- Qualys ID
- 91164
- Vendor Reference
- MS16-016
- CVE Reference
- CVE-2016-0051
- CVSS Scores
- Base 7.2 / Temporal 6.3
- Description
-
The vulnerability could allow elevation of privilege if an attacker uses the Microsoft Web Distributed Authoring and Versioning (WebDAV) client to send specifically crafted input to a server.
The security update addresses the vulnerability by correcting how WebDAV validates memory. For more information about the vulnerability, see the Vulnerability Information section.
This security update is rated Important for Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2, and Moderate for Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
- Consequence
-
An attacker who successfully exploited this vulnerability could execute arbitrary code with elevated permissions.
To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. - Solution
-
Refer to Microsoft Security Bulletin MS16-016 for details.
Workaround:
Disable WebDAV driverInteractive Method:
a. Open Registry Editor.
b. Locate and then click the following registry sub key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MRxDAV
c. Click the File menu and then select Export.
d. In the Export Registry File window type MRxDAV_configuration_backup.reg and then click Save.
e. In Registry Editor, double-click the DWORD value named Start, change the Value data field to 4, and then click OK.
f. Exit Registry Editor and then restart the system.
Using Managed Deployment Script:
a. Use the following managed deployment script command to make a backup copy of the WebDAV registry keys:
regedit /e MRxDAV_configuration_backup.reg HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MRxDAV
b. Save the following text to a file with a .REG extension
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MRxDAV]
Start=dword:00000004
c. Use the following command on the target system to run the registry script created in the previous step:
Regedit /s Disable_MRxDAV.reg
d. Restart the system.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-016 Windows 10 Version 1511 for 32-bit Systems
MS16-016 Windows 10 Version 1511 for x64-based Systems
MS16-016 Windows 10 for 32-bit Systems
MS16-016 Windows 10 for x64-based Systems
MS16-016 Windows 7 for 32-bit Systems Service Pack 1
MS16-016 Windows 7 for x64-based Systems Service Pack 1
MS16-016 Windows 8.1 for 32-bit Systems
MS16-016 Windows 8.1 for x64-based Systems
MS16-016 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-016 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-016 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-016 Windows Server 2012
MS16-016 Windows Server 2012 R2
MS16-016 Windows Vista Service Pack 2
MS16-016 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Remote Desktop Privilege Escalation Vulnerability (MS16-017)
- Severity
- Critical 4
- Qualys ID
- 91166
- Vendor Reference
- MS16-017
- CVE Reference
- CVE-2016-0036
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
Remote Desktop Protocol (RDP) lets users create a virtual session on their desktop computers. RDP allows remote users to access all of the data and applications on their computers.
The vulnerability could allow elevation of privilege if an authenticated attacker logs on to the target system using RDP and sends specially crafted data over the connection. The security update addresses the vulnerability by correcting how RDP handles objects in memory.
This security update is rated Important for all supported editions of Windows 7, Windows Server 2012, Window 8.1, Windows Server 2012 R2, and Windows 10. - Consequence
-
An attacker who successfully exploited this vulnerability could execute code with elevated privileges.
To exploit this vulnerability, an attacker would first have to log on to the target system by using the Remote Desktop Protocol. An attacker could then run a specially crafted application that is designed to create the crash condition that leads to elevated privileges. - Solution
-
Customers are advised to refer to Microsoft Advisory MS16-017 for more details pertaining to this vulnerability.
Workaround:
Disable RDP
To disable RDP using Group Policy
a. Open Group Policy
b. In Computer Configuration, Administrative Templates, Windows Components, Terminal Services, double-click the Allows users to connect remotely using Terminal Services setting.
c. Do one of the following:
1. To enable Remote Desktop, click Enabled.
2. To disable Remote Desktop, click Disabled.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-017 Windows 10 for 32-bit Systems
MS16-017 Windows 10 for x64-based Systems
MS16-017 Windows 7 for 32-bit Systems Service Pack 1
MS16-017 Windows 7 for x64-based Systems Service Pack 1
MS16-017 Windows 8.1 for 32-bit Systems
MS16-017 Windows 8.1 for x64-based Systems
MS16-017 Windows Server 2012
MS16-017 Windows Server 2012 R2
-
Microsoft Windows Kernel-Mode Driver Remote Code Execution Vulnerabilities (MS16-018)
- Severity
- Critical 4
- Qualys ID
- 91169
- Vendor Reference
- MS16-018
- CVE Reference
- CVE-2016-0048
- CVSS Scores
- Base 7.2 / Temporal 5.3
- Description
-
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.
This security update is rated important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows 10 Version 1511.
- Consequence
-
An attacker who successfully exploited these vulnerabilities can install programs, view, change, or delete data,or create new accounts with full user rights.
- Solution
-
Customers are advised to refer to MS16-018 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-018 Windows 10 Version 1511 for 32-bit Systems
MS16-018 Windows 10 Version 1511 for x64-based Systems
MS16-018 Windows 10 for 32-bit Systems
MS16-018 Windows 10 for x64-based Systems
MS16-018 Windows 7 for 32-bit Systems Service Pack 1
MS16-018 Windows 7 for x64-based Systems Service Pack 1
MS16-018 Windows 8.1 for 32-bit Systems
MS16-018 Windows 8.1 for x64-based Systems
MS16-018 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-018 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-018 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-018 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-018 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-018 Windows Server 2012
MS16-018 Windows Server 2012 R2
MS16-018 Windows Vista Service Pack 2
MS16-018 Windows Vista x64 Edition Service Pack 2
-
Microsoft .NET Framework Denial of Service And Information Disclosure Vulnerabilities (MS16-019)
- Severity
- Critical 4
- Qualys ID
- 91167
- Vendor Reference
- MS16-019
- CVE Reference
- CVE-2016-0033, CVE-2016-0047
- CVSS Scores
- Base 5 / Temporal 3.7
- Description
-
This security update resolves vulnerabilities in Microsoft .NET Framework.
- A denial of service vulnerability exists when .NET Framework fails to properly handle certain Extensible Stylesheet Language Transformations (XSLT.
- An information disclosure vulnerability exists in Microsoft .NET Framework that is caused when .NETs Windows Forms (WinForms) improperly handles icon data.
This security update is rated Important for Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6, and Microsoft .NET Framework 4.6.1 on affected releases of Microsoft Windows.
- Consequence
- Successful exploitation allows attacker to cause denial of service and get access to sensitive information.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS16-019 for more details pertaining to this vulnerability.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-019 Windows 10 Version 1511 for 32-bit Systems
MS16-019 Windows 10 Version 1511 for x64-based Systems
MS16-019 Windows 10 for 32-bit Systems
MS16-019 Windows 10 for x64-based Systems
MS16-019 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS16-019 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS16-019 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS16-019 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS16-019 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows RT 8.1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows RT 8.1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows RT 8.1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows RT 8.1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-019 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-019 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-019 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-019 Windows Server 2012(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2012(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012 R2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012 R2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012 R2(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2012 R2(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Vista Service Pack 2(Microsoft .NET Framework 4.6)
MS16-019 Windows Vista Service Pack 2(Microsoft .NET Framework 4.6)
MS16-019 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.6)
MS16-019 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.6)
-
Microsoft Active Directory Federation Services Denial of Service Vulnerability (MS16-020)
- Severity
- Serious 3
- Qualys ID
- 124689
- Vendor Reference
- MS16-020
- CVE Reference
- CVE-2016-0037
- CVSS Scores
- Base 5 / Temporal 3.7
- Description
-
This security update resolves a vulnerability in Active Directory Federation Services (ADFS).
The update addresses the vulnerability by adding additional verification checks in ADFS.
This security update is rated Important for ADFS 3.0 when installed on x64-based editions of Windows Server 2012 R2.
- Consequence
- An attacker who successfully exploit this vulnerability could cause the server to become nonresponsive.
- Solution
-
Refer to MS16-020 to obtain more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-020 Windows Server 2012 R2(Active Directory Federation Services 3.0)
MS16-020 Windows Server 2012 R2 (Server Core installation)(Active Directory Federation Services 3.0)
-
Microsoft Windows Network Policy Server RADIUS Implementation Denial of Service (MS16-021)
- Severity
- Serious 3
- Qualys ID
- 91161
- Vendor Reference
- MS16-021
- CVE Reference
- CVE-2016-0050
- CVSS Scores
- Base 5 / Temporal 3.7
- Description
-
Network Policy Server (NPS) is the Microsoft implementation of a Remote Authentication Dial-in User Service (RADIUS) server and proxy. Network Policy Server is exposed to a denial of service vulnerability.
The security update addresses the vulnerability by changing how Network Policy Servers parse username queries when implementing RADIUS.
Affected Versions:
This security update is rated Important for all supported editions of Windows Server 2008, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2. - Consequence
-
If this vulnerability is successfully exploited, attackers can cause a denial of service condition for RADIUS authentication on the IAS or NPS.
- Solution
-
Refer to MS16-021 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-021 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-021 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-021 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-021 Windows Server 2012
MS16-021 Windows Server 2012 R2
-
Microsoft Windows Update for Vulnerabilities in Adobe Flash Player in Internet Explorer (MS16-022 and KB3135782)
- Severity
- Urgent 5
- Qualys ID
- 100275
- Vendor Reference
- KB3135782, MS16-022
- CVE Reference
- CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0971, CVE-2016-0972, CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, CVE-2016-0981, CVE-2016-0982, CVE-2016-0983, CVE-2016-0984, CVE-2016-0985
- CVSS Scores
- Base 9.3 / Temporal 8.1
- Description
-
Microsoft released an update (KB3135782) for Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows 10 Version 1511. The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10, Internet Explorer 11, and Microsoft Edge as described in Adobe Security bulletin APSB16-04.
Affected Software:
Adobe Flash Player in Internet Explorer 10, Internet Explorer 11 and Microsoft Edge - Consequence
-
In a web-based attack scenario where the user is using Internet Explorer for the desktop, an attacker could host a specially crafted website that is designed to exploit any of these vulnerabilities through Internet Explorer and then convince a user to view the website.
An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine.
The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements.
- Solution
-
Customers are advised to view KB3135782 or MS16-022 for instructions pertaining to the remediation of these vulnerabilities.
Workaround:
1 Prevent Adobe Flash Player from running
2 Prevent Adobe Flash Player from running on Internet Explorer through Group Policy
3 Prevent Adobe Flash Player from running in Office 2010 on affected systems
4 Prevent ActiveX controls from running in Office 2007 and Office 2010
5 Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones
6 Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone
7 Add sites that you trust to the Internet Explorer Trusted sites zonePatches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-022
These new vulnerability checks are included in Qualys vulnerability signature 2.3.228-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 110265
- 100276
- 91168
- 91162
- 91163
- 91165
- 91164
- 91166
- 91169
- 91167
- 124689
- 91161
- 100275
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.