Microsoft security alert.
March 8, 2016
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 39 vulnerabilities that were fixed in 13 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 13 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft Windows USB Mass Storage Class Driver Elevation of Privilege (MS16-033)
- Severity
- Critical 4
- Qualys ID
- 91178
- Vendor Reference
- MS16-033
- CVE Reference
- CVE-2016-0133
- CVSS Scores
- Base 7.2 / Temporal 5.3
- Description
-
This security update resolves an elevation of privilege vulnerability in Microsoft Windows when the Windows USB Mass Storage Class driver fails to properly validate objects in memory.
The security update addresses the vulnerability by correcting how Windows handles objects in memory.
This security update is rated Important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
- Consequence
- An attacker who successfully exploits this vulnerability could take control of an affected system.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS16-033 for more details pertaining to this vulnerability.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-033 Windows 10 Version 1511 for 32-bit Systems
MS16-033 Windows 10 Version 1511 for x64-based Systems
MS16-033 Windows 10 for 32-bit Systems
MS16-033 Windows 10 for x64-based Systems
MS16-033 Windows 7 for 32-bit Systems Service Pack 1
MS16-033 Windows 7 for x64-based Systems Service Pack 1
MS16-033 Windows 8.1 for 32-bit Systems
MS16-033 Windows 8.1 for x64-based Systems
MS16-033 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-033 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-033 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-033 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-033 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-033 Windows Server 2012
MS16-033 Windows Server 2012 R2
MS16-033 Windows Vista Service Pack 2
MS16-033 Windows Vista x64 Edition Service Pack 2
-
Microsoft .NET Framework Security Feature Bypass Vulnerability (MS16-035)
- Severity
- Critical 4
- Qualys ID
- 91180
- Vendor Reference
- MS16-035
- CVE Reference
- CVE-2016-0132
- CVSS Scores
- Base 10 / Temporal 7.4
- Description
-
This security update resolves vulnerabilities in Microsoft .NET Framework.
- A security feature bypass vulnerability exists in a .NET Framework component that does not properly validate certain elements of a signed XML document.
This security update is rated Important for Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.0 Service Pack 2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6, and Microsoft .NET Framework 4.6.1 on affected releases of Microsoft Windows.
- Consequence
- Successful exploitation allows an attacker to modify the contents of an XML file without invalidating the signature associated with the file.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS16-035 for more details pertaining to this vulnerability.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-035 Windows 10 Version 1511 for 32-bit Systems
MS16-035 Windows 10 Version 1511 for x64-based Systems
MS16-035 Windows 10 for 32-bit Systems
MS16-035 Windows 10 for x64-based Systems
MS16-035 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-035 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-035 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-035 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-035 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-035 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-035 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-035 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-035 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS16-035 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS16-035 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.5.2)
MS16-035 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-035 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS16-035 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS16-035 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.5.2)
MS16-035 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-035 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-035 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-035 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-035 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-035 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-035 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS16-035 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS16-035 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-035 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-035 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 3.0 Service Pack 2)
MS16-035 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-035 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-035 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-035 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-035 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 3.0 Service Pack 2)
MS16-035 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-035 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-035 Windows Server 2012(Microsoft .NET Framework 3.5)
MS16-035 Windows Server 2012(Microsoft .NET Framework 3.5)
MS16-035 Windows Server 2012(Microsoft .NET Framework 4.5.2)
MS16-035 Windows Server 2012(Microsoft .NET Framework 4.6/4.6.1)
MS16-035 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-035 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-035 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-035 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-035 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS16-035 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS16-035 Windows Server 2012 R2(Microsoft .NET Framework 4.5.2)
MS16-035 Windows Server 2012 R2(Microsoft .NET Framework 4.6/4.6.1)
MS16-035 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-035 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-035 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-035 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-035 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-035 Windows Vista Service Pack 2(Microsoft .NET Framework 3.0 Service Pack 2)
MS16-035 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-035 Windows Vista Service Pack 2(Microsoft .NET Framework 4.6)
MS16-035 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-035 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 3.0 Service Pack 2)
MS16-035 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-035 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.6)
-
Microsoft Cumulative Security Update for Internet Explorer (MS16-023)
- Severity
- Critical 4
- Qualys ID
- 100277
- Vendor Reference
- MS16-023
- CVE Reference
- CVE-2016-0102, CVE-2016-0103, CVE-2016-0104, CVE-2016-0105, CVE-2016-0106, CVE-2016-0107, CVE-2016-0108, CVE-2016-0109, CVE-2016-0110, CVE-2016-0111, CVE-2016-0112, CVE-2016-0113, CVE-2016-0114
- CVSS Scores
- Base 7.6 / Temporal 6.3
- Description
-
Microsoft Internet Explorer is a graphical web browser developed by Microsoft and included as part of the Microsoft Windows operating systems.
This security update resolves multiple vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.
This security update is rated Critical for Internet Explorer 9 (IE 9), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
- Consequence
- The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS16-023 for more details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-023 Windows 10 Version 1511 for 32-bit Systems
MS16-023 Windows 10 Version 1511 for x64-based Systems
MS16-023 Windows 10 for 32-bit Systems
MS16-023 Windows 10 for x64-based Systems
MS16-023 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS16-023 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS16-023 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS16-023 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS16-023 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS16-023 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS16-023 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS16-023 Windows Server 2012(Internet Explorer 10)
MS16-023 Windows Server 2012 R2(Internet Explorer 11)
MS16-023 Windows Vista Service Pack 2(Internet Explorer 9)
MS16-023 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
-
Microsoft Edge Cumulative Security Update (MS16-024)
- Severity
- Critical 4
- Qualys ID
- 91183
- Vendor Reference
- MS16-024
- CVE Reference
- CVE-2016-0102, CVE-2016-0105, CVE-2016-0109, CVE-2016-0110, CVE-2016-0111, CVE-2016-0116, CVE-2016-0123, CVE-2016-0124, CVE-2016-0125, CVE-2016-0129, CVE-2016-0130
- CVSS Scores
- Base 7.6 / Temporal 6.3
- Description
-
Microsoft Edge is a web browser developed by Microsoft and included in the company's Windows 10 operating systems, replacing Internet Explorer as the default web browser on all device classes.
This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow code execution with elevated privileges if a user views a specially crafted webpage using Microsoft Edge.
This security update is rated critical for Microsoft Edge on Windows 10.
- Consequence
- An attacker who has successfully exploited the vulnerabilities could gain the same user rights as the current user.
- Solution
-
Customers are advised to refer to Microsoft Security Bulletin MS16-024 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-024 Windows 10 Version 1511 for 32-bit Systems
MS16-024 Windows 10 Version 1511 for x64-based Systems
MS16-024 Windows 10 for 32-bit Systems
MS16-024 Windows 10 for x64-based Systems
-
Microsoft Windows Kernel-Mode Drivers Elevation of Privilege Vulnerability (MS16-034)
- Severity
- Critical 4
- Qualys ID
- 91185
- Vendor Reference
- MS16-034
- CVE Reference
- CVE-2016-0093, CVE-2016-0094, CVE-2016-0095, CVE-2016-0096
- CVSS Scores
- Base 7.2 / Temporal 6
- Description
-
Multiple Win32k elevation of privilege vulnerabilities exist when the Windows kernel-mode driver fails to properly handle objects in memory.
Microsoft has released a security update that addresses the vulnerabilities by correcting how Windows handles objects in memory.
This security update is rated Important for all supported editions of Microsoft Windows.
- Consequence
- The vulnerabilities could allow elevation of privilege if an attacker logs on to the system and runs a specially crafted application.
- Solution
-
Refer to MS16-034 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-034 Windows 10 Version 1511 for 32-bit Systems
MS16-034 Windows 10 Version 1511 for x64-based Systems
MS16-034 Windows 10 for 32-bit Systems
MS16-034 Windows 10 for x64-based Systems
MS16-034 Windows 7 for 32-bit Systems Service Pack 1
MS16-034 Windows 7 for x64-based Systems Service Pack 1
MS16-034 Windows 8.1 for 32-bit Systems
MS16-034 Windows 8.1 for x64-based Systems
MS16-034 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-034 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-034 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-034 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-034 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-034 Windows Server 2012
MS16-034 Windows Server 2012 R2
MS16-034 Windows Vista Service Pack 2
MS16-034 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Library Loading Input Validation Remote Code Execution (MS16-025)
- Severity
- Critical 4
- Qualys ID
- 91177
- Vendor Reference
- MS16-025
- CVE Reference
- CVE-2016-0100
- CVSS Scores
- Base 7.2 / Temporal 5.6
- Description
-
A remote code execution vulnerability exists when Microsoft Windows fails to properly validate input before loading certain libraries.
This security update is rated Important for all supported editions of Windows Vista and Windows Server 2008. - Consequence
- An attacker who successfully exploits this vulnerability could execute code.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS16-025 for more details pertaining to this vulnerability.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-025 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-025 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-025 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-025 Windows Vista Service Pack 2
MS16-025 Windows Vista x64 Edition Service Pack 2
-
Microsoft Graphic Fonts Remote Code Execution Vulnerabilities (MS16-026)
- Severity
- Urgent 5
- Qualys ID
- 91182
- Vendor Reference
- MS16-026
- CVE Reference
- CVE-2016-0120, CVE-2016-0121
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft Windows is prone to the following vulnerabilities affecting OpenType fonts:
A denial of service vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted OpenType fonts.
A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted fonts.
Microsoft has released a security update that addresses the vulnerabilities by correcting how the Windows Adobe Type Manager Library handles OpenType fonts. This security update is rated Critical for all supported editions of Windows.
- Consequence
- The vulnerabilities could allow remote code execution if an attacker either convinces a user to open a specially crafted document, or to visit a webpage that contains specially crafted embedded OpenType fonts.
- Solution
-
Refer to MS16-026 to obtain more information.
Workaround:
Rename ATMFD.DLLPatches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-026 Windows 10 Version 1511 for 32-bit Systems
MS16-026 Windows 10 Version 1511 for x64-based Systems
MS16-026 Windows 10 for 32-bit Systems
MS16-026 Windows 10 for x64-based Systems
MS16-026 Windows 7 for 32-bit Systems Service Pack 1
MS16-026 Windows 7 for x64-based Systems Service Pack 1
MS16-026 Windows 8.1 for 32-bit Systems
MS16-026 Windows 8.1 for x64-based Systems
MS16-026 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-026 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-026 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-026 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-026 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-026 Windows Server 2012
MS16-026 Windows Server 2012 R2
MS16-026 Windows Vista Service Pack 2
MS16-026 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Media Player Remote Code Execution Vulnerabilities (MS16-027)
- Severity
- Urgent 5
- Qualys ID
- 124762
- Vendor Reference
- MS16-027
- CVE Reference
- CVE-2016-0098, CVE-2016-0101
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Windows Media Player is a video and audio file player for Windows-based systems. It supports multiple file formats and allows playing files from either the local file system or the network.
Multiple remote code execution vulnerabilities exist in Microsoft Windows.
The security update addresses the vulnerabilities by correcting how Windows handles resources in the media library.
This security update is rated Critical for all supported editions of Windows 7, Windows Server 2008 R2, Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
- Consequence
- The vulnerability can be exploited to execute arbitrary code with the privileges of the current user.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS16-027 for more details pertaining to this vulnerability.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-027 Windows 10 Version 1511 for 32-bit Systems
MS16-027 Windows 10 Version 1511 for x64-based Systems
MS16-027 Windows 10 for 32-bit Systems
MS16-027 Windows 10 for x64-based Systems
MS16-027 Windows 7 for 32-bit Systems Service Pack 1
MS16-027 Windows 7 for 32-bit Systems Service Pack 1
MS16-027 Windows 7 for x64-based Systems Service Pack 1
MS16-027 Windows 7 for x64-based Systems Service Pack 1
MS16-027 Windows 8.1 for 32-bit Systems
MS16-027 Windows 8.1 for 32-bit Systems
MS16-027 Windows 8.1 for x64-based Systems
MS16-027 Windows 8.1 for x64-based Systems
MS16-027 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-027 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-027 Windows Server 2012
MS16-027 Windows Server 2012
MS16-027 Windows Server 2012 R2
MS16-027 Windows Server 2012 R2
-
Microsoft Windows PDF Library Remote Code Execution Vulnerabilities (MS16-028)
- Severity
- Critical 4
- Qualys ID
- 91184
- Vendor Reference
- MS16-028
- CVE Reference
- CVE-2016-0117, CVE-2016-0118
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if Microsoft Windows PDF Library improperly handles application programming interface (API) calls.
The update addresses the vulnerabilities by changing how memory is handled when API calls are made to the PDF Library, and by modifying how Windows Reader parses files.
This security update is rated Critical for all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, and Windows 10.
- Consequence
- The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who has successfully exploited the vulnerabilities could run arbitrary code in the context of the current user.
- Solution
-
Customers are advised to refer to MS16-028 to obtain more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-028 Windows 10 Version 1511 for 32-bit Systems
MS16-028 Windows 10 Version 1511 for x64-based Systems
MS16-028 Windows 10 for 32-bit Systems
MS16-028 Windows 10 for x64-based Systems
MS16-028 Windows 8.1 for 32-bit Systems
MS16-028 Windows 8.1 for x64-based Systems
MS16-028 Windows Server 2012
MS16-028 Windows Server 2012 R2
-
Microsoft Office Remote Code Execution Vulnerabilities (MS16-029)
- Severity
- Critical 4
- Qualys ID
- 110266
- Vendor Reference
- MS16-029
- CVE Reference
- CVE-2016-0021, CVE-2016-0057, CVE-2016-0134
- CVSS Scores
- Base 9.3 / Temporal 8.1
- Description
-
Microsoft Office is prone to the following vulnerabilities:
Multiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory.
A security feature bypass vulnerability exists in Microsoft Office software due to an invalidly signed binary.
Microsoft has released a security update that addresses the vulnerabilities by:
- Correcting how Office handles objects in memory
- Providing a validly signed binary
This security update is rated as Important. - Consequence
- The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user.
- Solution
-
Refer to MS16-029 to obtain more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-029 Microsoft InfoPath 2007 Service Pack 3
MS16-029 Microsoft InfoPath 2010 Service Pack 2 (32-bit editions)
MS16-029 Microsoft InfoPath 2010 Service Pack 2 (64-bit editions)
MS16-029 Microsoft InfoPath 2013 Service Pack 1 (32-bit editions)
MS16-029 Microsoft InfoPath 2013 Service Pack 1 (64-bit editions)
MS16-029 Microsoft Office 2007 Service Pack 3
MS16-029 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-029 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-029 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS16-029 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS16-029 Microsoft Office 2016 (32-bit edition)
MS16-029 Microsoft Office Compatibility Pack Service Pack 3
MS16-029 Microsoft Office Web Apps 2010 Service Pack 2
MS16-029 Microsoft Outlook 2007 Service Pack 3
MS16-029 Microsoft Outlook 2010 Service Pack 2 (32-bit editions)
MS16-029 Microsoft Outlook 2010 Service Pack 2 (64-bit editions)
MS16-029 Microsoft Outlook 2013 Service Pack 1 (32-bit editions)
MS16-029 Microsoft Outlook 2013 Service Pack 1 (64-bit editions)
MS16-029 Microsoft Outlook 2016 (32-bit edition)
MS16-029 Microsoft Outlook 2016 (64-bit edition)
MS16-029 Microsoft Web Apps Server 2013 Service Pack 1
MS16-029 Microsoft Word 2007 Service Pack 3
MS16-029 Microsoft Word 2010 Service Pack 2 (32-bit editions)
MS16-029 Microsoft Word 2010 Service Pack 2 (64-bit editions)
MS16-029 Microsoft Word 2013 Service Pack 1 (32-bit editions)
MS16-029 Microsoft Word 2013 Service Pack 1 (64-bit editions)
MS16-029 Microsoft Word 2016 (32-bit edition)
MS16-029 Microsoft Word 2016 (64-bit edition)
MS16-029 Microsoft Word 2016 for Mac
MS16-029 Microsoft Word Viewer
MS16-029 Microsoft Word for Mac 2011
MS16-029 Word Automation Services on Microsoft SharePoint Server 2010 Service Pack 2
MS16-029 Word Automation Services on Microsoft SharePoint Server 2013 Service Pack 1
-
Microsoft Windows OLE Remote Code Execution Vulnerability (MS16-030)
- Severity
- Urgent 5
- Qualys ID
- 91181
- Vendor Reference
- MS16-030
- CVE Reference
- CVE-2016-0091, CVE-2016-0092
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
OLE (Object Linking and Embedding) is a technology that allows applications to share data and functionality, such as the ability to create and edit compound data. Compound data is data that contains information in multiple formats.
Multiple remote code execution vulnerabilities exist when Microsoft Windows OLE fails to properly validate user input.This security update is rated Important for all supported releases of Microsoft Windows.
- Consequence
- Successful exploitation allows attackers to execute arbitrary code.
- Solution
-
Refer to MS16-030 for further information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-030 Windows 10 Version 1511 for 32-bit Systems
MS16-030 Windows 10 Version 1511 for x64-based Systems
MS16-030 Windows 10 for 32-bit Systems
MS16-030 Windows 10 for x64-based Systems
MS16-030 Windows 7 for 32-bit Systems Service Pack 1
MS16-030 Windows 7 for x64-based Systems Service Pack 1
MS16-030 Windows 8.1 for 32-bit Systems
MS16-030 Windows 8.1 for x64-based Systems
MS16-030 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-030 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-030 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-030 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-030 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-030 Windows Server 2012
MS16-030 Windows Server 2012 R2
MS16-030 Windows Vista Service Pack 2
MS16-030 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Privilege Escalation Vulnerability (MS16-031)
- Severity
- Serious 3
- Qualys ID
- 91176
- Vendor Reference
- MS16-031
- CVE Reference
- CVE-2016-0087
- CVSS Scores
- Base 7.2 / Temporal 5.3
- Description
-
An elevation of privilege vulnerability exists when Microsoft Windows fails to properly validate and enforce impersonation levels.
This security update is rated Important for all supported editions of Windows Vista, Windows 7, Windows Server 2008. - Consequence
- An attacker who successfully exploited this vulnerability could execute code with elevated privileges.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS16-031 for more details pertaining to this vulnerability.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-031 Windows 7 for 32-bit Systems Service Pack 1
MS16-031 Windows 7 for x64-based Systems Service Pack 1
MS16-031 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-031 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-031 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-031 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-031 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-031 Windows Vista Service Pack 2
MS16-031 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows Secondary Logon Elevation of Privilege Vulnerability (MS16-032)
- Severity
- Serious 3
- Qualys ID
- 91179
- Vendor Reference
- MS16-032
- CVE Reference
- CVE-2016-0099
- CVSS Scores
- Base 7.2 / Temporal 6
- Description
-
An elevation of privilege vulnerability exists in Microsoft Windows if the Windows Secondary Logon Service fails to properly manage request handles in memory.
To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows manages request handles in memory.
This security update is rated Important for all supported editions of Windows. - Consequence
- An attacker who successfully exploits this vulnerability could run arbitrary code as an administrator. An attacker could then install programs, view, change, or delete data; or create new accounts with full user rights.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS16-032 for more details pertaining to this vulnerability.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-032 Windows 10 Version 1511 for 32-bit Systems
MS16-032 Windows 10 Version 1511 for x64-based Systems
MS16-032 Windows 10 for 32-bit Systems
MS16-032 Windows 10 for x64-based Systems
MS16-032 Windows 7 for 32-bit Systems Service Pack 1
MS16-032 Windows 7 for x64-based Systems Service Pack 1
MS16-032 Windows 8.1 for 32-bit Systems
MS16-032 Windows 8.1 for x64-based Systems
MS16-032 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-032 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-032 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-032 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-032 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-032 Windows Server 2012
MS16-032 Windows Server 2012 R2
MS16-032 Windows Vista Service Pack 2
MS16-032 Windows Vista x64 Edition Service Pack 2
These new vulnerability checks are included in Qualys vulnerability signature 2.3.251-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 91178
- 91180
- 100277
- 91183
- 91185
- 91177
- 91182
- 124762
- 91184
- 110266
- 91181
- 91176
- 91179
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.