Microsoft security alert.
July 12, 2016
Advisory overview
Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 64 vulnerabilities that were fixed in 11 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Vulnerability details
Microsoft has released 11 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
-
Microsoft Windows Security Update for Windows Secure Kernel Mode (MS16-089)
- Severity
- Serious 3
- Qualys ID
- 91251
- Vendor Reference
- MS16-089
- CVE Reference
- CVE-2016-3256
- CVSS Scores
- Base 2.1 / Temporal 1.6
- Description
-
An information disclosure vulnerability exists when Windows Secure Kernel Mode improperly handles objects in memory.
The update addresses the vulnerability by correcting how Windows Secure Kernel Mode handles objects in memory to prevent information disclosure.
This security update is rated Important for all supported releases of Windows 10.
- Consequence
- Successful exploitation allows an attacker to read sensitive information on the target system.
- Solution
-
Refer to MS16-089 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-089 Windows
-
Microsoft Cumulative Security Update for Internet Explorer (MS16-084)
- Severity
- Critical 4
- Qualys ID
- 100290
- Vendor Reference
- MS16-084
- CVE Reference
- CVE-2016-3204, CVE-2016-3240, CVE-2016-3241, CVE-2016-3242, CVE-2016-3243, CVE-2016-3245, CVE-2016-3248, CVE-2016-3259, CVE-2016-3260, CVE-2016-3261, CVE-2016-3264, CVE-2016-3273, CVE-2016-3274, CVE-2016-3276, CVE-2016-3277
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
This security update is rated Critical for Internet Explorer 9 (IE 9), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
The update addresses the vulnerabilities by:
Modifying how Internet Explorer handles objects in memory
Modifying how the JScript and VBScript scripting engines handle objects in memory
Correcting how the Microsoft Browser XSS Filter validates JavaScript
Changing how certain functions in Internet Explorer handle objects in memory
Correcting how Internet Explorer parses HTML - Consequence
- The most severe vulnerabilities could allow remote code execution if a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS16-084 for more details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-084 Windows 10 Version 1511 for 32-bit Systems
MS16-084 Windows 10 Version 1511 for x64-based Systems
MS16-084 Windows 10 for 32-bit Systems
MS16-084 Windows 10 for x64-based Systems
MS16-084 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS16-084 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS16-084 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS16-084 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS16-084 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS16-084 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS16-084 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS16-084 Windows Server 2012(Internet Explorer 10)
MS16-084 Windows Server 2012 R2(Internet Explorer 11)
MS16-084 Windows Vista Service Pack 2(Internet Explorer 9)
MS16-084 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
-
Microsoft Edge Cumulative Security Update (MS16-085)
- Severity
- Critical 4
- Qualys ID
- 91249
- Vendor Reference
- MS16-085
- CVE Reference
- CVE-2016-3244, CVE-2016-3246, CVE-2016-3248, CVE-2016-3259, CVE-2016-3260, CVE-2016-3264, CVE-2016-3265, CVE-2016-3269, CVE-2016-3271, CVE-2016-3273, CVE-2016-3274, CVE-2016-3276, CVE-2016-3277
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
This security update resolves vulnerabilities in Microsoft Edge. This security update is rated Critical for Microsoft Edge on Windows 10.
The update addresses the vulnerabilities by:
Ensuring that Microsoft Edge properly implements Address Space Layout Randomization (ASLR)
Modifying how Microsoft Edge handles objects in memory
Modifying how the Chakra JavaScript scripting engine handles objects in memory
Changing the way certain functions handle objects in memory
Fixing how the Microsoft Browser XSS Filter validates JavaScript
Correcting how the Microsoft browser parses HTTP responses
Correcting how Microsoft Edge parses HTML - Consequence
- An attacker who has successfully exploited the vulnerabilities could gain the same user rights as the current user.
- Solution
-
Customers are advised to refer to Microsoft Security Bulletin MS16-085 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-085 Windows 10 Version 1511 for 32-bit Systems
MS16-085 Windows 10 Version 1511 for x64-based Systems
MS16-085 Windows 10 for 32-bit Systems
MS16-085 Windows 10 for x64-based Systems
-
Microsoft JScript and VBScript Remote Code Execution Vulnerabilities (MS16-086)
- Severity
- Critical 4
- Qualys ID
- 91247
- Vendor Reference
- MS16-086
- CVE Reference
- CVE-2016-3204
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
This security update resolves a vulnerability in the JScript and VBScript scripting engines in Microsoft Windows. The update addresses the vulnerability by modifying how the JScript and VBScript scripting engines handle objects in memory. For more information about the vulnerability, see the Vulnerability Information section.
This security update is rated Critical for affected versions of the JScript and VBScript scripting engines on supported releases of Windows Vista, and Moderate on Windows Server 2008 and Windows Server 2008 R2. - Consequence
- The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerabilities could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
- Solution
-
Please refer to MS16-086 for details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-086 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Server Core installation)(JScript 5.8 and VBScript 5.8)
MS16-086 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)(VBScript 5.7)
MS16-086 Windows Server 2008 for Itanium-based Systems Service Pack 2(VBScript 5.7)
MS16-086 Windows Server 2008 for x32-bit Systems Service Pack 2(VBScript 5.7)
MS16-086 Windows Server 2008 for x64-based Systems Service Pack 2(VBScript 5.7)
MS16-086 Windows Server 2008 for x64-based Systems Service Pack 2(Server Core installation)(VBScript 5.7)
MS16-086 Windows Vista Service Pack 2(VBScript 5.7)
MS16-086 Windows Vista x64 Edition Service Pack 2(VBScript 5.7)
-
Microsoft Windows Print Spooler Components Security Update (MS16-087)
- Severity
- Urgent 5
- Qualys ID
- 91248
- Vendor Reference
- MS16-087
- CVE Reference
- CVE-2016-3238, CVE-2016-3239
- CVSS Scores
- Base 9.3 / Temporal 7.3
- Description
-
The Print Spooler service is an executable file that is installed as a service. The spooler is loaded when the operating system starts, and it continues to run until the operating system is shut down. The Print Spooler service manages the printing process, which includes such tasks as retrieving the location of the correct printer driver, loading that driver, spooling high-level function calls into a print job and scheduling print jobs.
The security update resolves the following issues.
- A remote code execution vulnerability exists when the Windows Print Spooler service does not properly validate print drivers while installing a printer from servers. (CVE-2016-3238)- An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. (CVE-2016-3239)
Affected Software:
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Windows 8.1 for 32-bit Systems
Windows 8.1 for 64-bit Systems
Windows Server 2012
Windows Server 2012 R2
Windows RT 8.1
Windows 10 for 32-bit Systems
Windows 10 for 64-bit Systems
Windows 10 Version 1511 for 32-bit Systems
Windows 10 Version 1511 for 64-bit Systems
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2 (Server Core installation)
This security update is rated Critical for all supported editions.
- Consequence
-
An attacker who successfully exploited this vulnerability could use it to execute arbitrary code and take control of an affected system.
- Solution
-
Refer to MS16-087 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-087 Windows 10 Version 1511 for 32-bit Systems
MS16-087 Windows 10 Version 1511 for x64-based Systems
MS16-087 Windows 10 for 32-bit Systems
MS16-087 Windows 10 for x64-based Systems
MS16-087 Windows 7 for 32-bit Systems Service Pack 1
MS16-087 Windows 7 for x64-based Systems Service Pack 1
MS16-087 Windows 8.1 for 32-bit Systems
MS16-087 Windows 8.1 for x64-based Systems
MS16-087 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-087 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-087 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-087 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-087 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-087 Windows Server 2012
MS16-087 Windows Server 2012 R2
MS16-087 Windows Vista Service Pack 2
MS16-087 Windows Vista x64 Edition Service Pack 2
-
Microsoft Office Remote Code Execution Vulnerabilities (MS16-088)
- Severity
- Urgent 5
- Qualys ID
- 110278
- Vendor Reference
- MS16-088
- CVE Reference
- CVE-2016-3278, CVE-2016-3279, CVE-2016-3280, CVE-2016-3281, CVE-2016-3282, CVE-2016-3283, CVE-2016-3284
- CVSS Scores
- Base 9.3 / Temporal 6.9
- Description
-
Multiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory.
A vulnerability exists when Microsoft Office fails to properly handle XLA files.
Microsoft has released a security update that addresses the vulnerabilities by correcting how:
- Office handles objects in memory
- Certain functions handle objects in memory
- Windows validates input before loading libraries - Consequence
- The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user.
- Solution
-
Refer to MS16-088 for more information.
Workaround:
1) Use Microsoft Office File Block policy to prevent Office from opening RTF documents from unknown or untrusted sourcesImpact of workaround #1: Users who have configured the File Block policy and have not configured a special "exempt directory" will be unable to open documents saved in the RTF format.
2) Prevent Word from loading RTF files
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-088 Microsoft Excel 2007 Service Pack 3
MS16-088 Microsoft Excel 2010 Service Pack 2 (32-bit editions)
MS16-088 Microsoft Excel 2010 Service Pack 2 (64-bit editions)
MS16-088 Microsoft Excel 2013 Service Pack 1 (32-bit editions)
MS16-088 Microsoft Excel 2013 Service Pack 1 (64-bit editions)
MS16-088 Microsoft Excel 2016 (32-bit edition)
MS16-088 Microsoft Excel 2016 (64-bit edition)
MS16-088 Microsoft Excel 2016 for Mac
MS16-088 Microsoft Excel Viewer
MS16-088 Microsoft Excel for Mac 2011
MS16-088 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-088 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS16-088 Microsoft Office Compatibility Pack Service Pack 3
MS16-088 Microsoft Office Compatibility Pack Service Pack 3
MS16-088 Microsoft Office Web Apps 2010 Service Pack 2
MS16-088 Microsoft Office Web Apps Server 2013 Service Pack 1
MS16-088 Microsoft Outlook 2010 Service Pack 2 (32-bit editions)
MS16-088 Microsoft Outlook 2010 Service Pack 2 (64-bit editions)
MS16-088 Microsoft Outlook 2013 Service Pack 1 (32-bit editions)
MS16-088 Microsoft Outlook 2013 Service Pack 1 (64-bit editions)
MS16-088 Microsoft Outlook 2016 (32-bit edition)
MS16-088 Microsoft Outlook 2016 (64-bit edition)
MS16-088 Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions)
MS16-088 Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions)
MS16-088 Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions)
MS16-088 Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions)
MS16-088 Microsoft SharePoint Foundation 2010 Service Pack 1
MS16-088 Microsoft SharePoint Foundation 2013 Service Pack 1
MS16-088 Microsoft SharePoint Server 2016
MS16-088 Microsoft SharePoint Server 2016
MS16-088 Microsoft Word 2007 Service Pack 3
MS16-088 Microsoft Word 2010 Service Pack 2 (32-bit editions)
MS16-088 Microsoft Word 2010 Service Pack 2 (64-bit editions)
MS16-088 Microsoft Word 2013 Service Pack 1 (32-bit editions)
MS16-088 Microsoft Word 2013 Service Pack 1 (64-bit editions)
MS16-088 Microsoft Word 2016 (32-bit edition)
MS16-088 Microsoft Word 2016 (64-bit edition)
MS16-088 Microsoft Word 2016 for Mac
MS16-088 Microsoft Word Viewer
MS16-088 Microsoft Word Viewer
MS16-088 Microsoft Word for Mac 2011
MS16-088 Office Online Server
MS16-088 Word Automation Services on Microsoft SharePoint Server 2010 Service Pack 2
MS16-088 Word Automation Services on Microsoft SharePoint Server 2013 Service Pack 1
-
Microsoft Windows Security Update for Windows Kernel-Mode Drivers (MS16-090)
- Severity
- Critical 4
- Qualys ID
- 91253
- Vendor Reference
- MS16-090
- CVE Reference
- CVE-2016-3249, CVE-2016-3250, CVE-2016-3251, CVE-2016-3252, CVE-2016-3254, CVE-2016-3286
- CVSS Scores
- Base 7.2 / Temporal 6
- Description
-
Microsoft Windows are exposed to following vulnerabilities:
- Elevation of privilege vulnerabilities exist when the Windows kernel-mode driver fails to properly handle objects in memory. - A Win32k information disclosure vulnerability exists when the Windows GDI component improperly discloses kernel memory addresses.
The security update addresses the vulnerabilities by correcting how the Windows kernel-mode driver handles objects in memory and the Windows GDI component handles objects in memory.
This security update is rated Important for all supported releases of Windows.
- Consequence
- This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow attackers to run arbitrary code in kernel mode.
- Solution
-
Refer to MS16-090 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-090 Windows 10 Version 1511 for 32-bit Systems
MS16-090 Windows 10 Version 1511 for x64-based Systems
MS16-090 Windows 10 for 32-bit Systems
MS16-090 Windows 10 for x64-based Systems
MS16-090 Windows 7 for 32-bit Systems Service Pack 1
MS16-090 Windows 7 for x64-based Systems Service Pack 1
MS16-090 Windows 8.1 for 32-bit Systems
MS16-090 Windows 8.1 for x64-based Systems
MS16-090 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-090 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-090 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-090 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-090 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-090 Windows Server 2012
MS16-090 Windows Server 2012 R2
MS16-090 Windows Vista Service Pack 2
MS16-090 Windows Vista x64 Edition Service Pack 2
-
Microsoft Windows .NET Framework Information Disclosure Vulnerability (MS16-091)
- Severity
- Critical 4
- Qualys ID
- 91254
- Vendor Reference
- MS16-091
- CVE Reference
- CVE-2016-3255
- CVSS Scores
- Base 5 / Temporal 3.7
- Description
-
An information disclosure vulnerability exists when .NET Framework improperly parses XML input containing a reference to an external entity.
This security update is rated Important for Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6, and Microsoft .NET Framework 4.6.1 on affected releases of Microsoft Windows.
- Consequence
- An attacker who successfully exploited this vulnerability can read arbitrary files via an XML external entity declaration.
- Solution
-
Customers are advised to view MS16-091 for instructions pertaining to the remediation of these vulnerabilities.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-091 Windows 10 Version 1511 for 32-bit Systems
MS16-091 Windows 10 Version 1511 for x64-based Systems
MS16-091 Windows 10 for 32-bit Systems
MS16-091 Windows 10 for x64-based Systems
MS16-091 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-091 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-091 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-091 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-091 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS16-091 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.5.2)
MS16-091 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS16-091 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.5.2)
MS16-091 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-091 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-091 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS16-091 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-091 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-091 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-091 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-091 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-091 Windows Server 2012(Microsoft .NET Framework 3.5)
MS16-091 Windows Server 2012(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2012(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-091 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS16-091 Windows Server 2012 R2(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2012 R2(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-091 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-091 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Vista Service Pack 2(Microsoft .NET Framework 4.6)
MS16-091 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-091 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.6)
-
Microsoft Windows Kernel Security Update (MS16-092)
- Severity
- Urgent 5
- Qualys ID
- 91252
- Vendor Reference
- MS16-092
- CVE Reference
- CVE-2016-3258, CVE-2016-3272
- CVSS Scores
- Base 2.1 / Temporal 1.6
- Description
-
An information disclosure vulnerability exists in Microsoft Windows when the Windows kernel fails to properly handle certain page fault system calls. An authenticated attacker who successfully exploited this vulnerability could disclose information from one process to another.
A security feature bypass vulnerability exists in the Windows kernel that could allow an attacker to exploit time of check time of use (TOCTOU) issues in file path-based checks from a low integrity application. An attacker who successfully exploited this vulnerability could potentially modify files outside of a low integrity level application.
This security update is rated Important for all supported releases of Microsoft Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10
- Consequence
- An attacker who successfully exploited this vulnerability could execute code with elevated privileges.
- Solution
-
Customers are advised to refer to Microsoft Advisory MS16-092 for more details pertaining to this vulnerability.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-092 Windows 10 Version 1511 for 32-bit Systems
MS16-092 Windows 10 Version 1511 for x64-based Systems
MS16-092 Windows 10 for 32-bit Systems
MS16-092 Windows 10 for x64-based Systems
MS16-092 Windows 8.1 for 32-bit Systems
MS16-092 Windows 8.1 for 32-bit Systems
MS16-092 Windows 8.1 for x64-based Systems
MS16-092 Windows 8.1 for x64-based Systems
MS16-092 Windows Server 2012
MS16-092 Windows Server 2012
MS16-092 Windows Server 2012 R2
MS16-092 Windows Server 2012 R2
-
Microsoft Windows Update for Vulnerabilities in Adobe Flash Player in Internet Explorer (MS16-093)
- Severity
- Urgent 5
- Qualys ID
- 100291
- Vendor Reference
- MS16-093
- CVE Reference
- CVE-2016-4173, CVE-2016-4174, CVE-2016-4175, CVE-2016-4176, CVE-2016-4177, CVE-2016-4178, CVE-2016-4179, CVE-2016-4182, CVE-2016-4185, CVE-2016-4188, CVE-2016-4222, CVE-2016-4223, CVE-2016-4224, CVE-2016-4225, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, CVE-2016-4232, CVE-2016-4247, CVE-2016-4248, CVE-2016-4249
- CVSS Scores
- Base 9.3 / Temporal 7.7
- Description
-
Microsoft released an update for Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
The update addresses the vulnerabilities described in Adobe Security bulletin APSB16-25.
This security update is rated Critical for Adobe Flash Player in Internet Explorer 10, Internet Explorer 11 and Microsoft Edge.
- Consequence
- Successful exploitation of this vulnerability will allow an attacker to execute arbitrary code.
- Solution
-
Customers are advised to view MS16-093 for instructions pertaining to the remediation of these vulnerabilities.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-093 Windows 8.1 for 32-bit Systems(Adobe Flash Player)
MS16-093 Windows 8.1 for x64-based Systems(Adobe Flash Player)
MS16-093 Windows Server 2012(Adobe Flash Player)
MS16-093 Windows Server 2012 R2(Adobe Flash Player)
-
Microsoft Windows Secure Boot Features Bypass Vulnerability (MS16-094)
- Severity
- Serious 3
- Qualys ID
- 91250
- Vendor Reference
- MS16-094
- CVE Reference
- CVE-2016-3287
- CVSS Scores
- Base 2.1 / Temporal 1.6
- Description
-
A security feature bypass vulnerability exists when Windows Secure Boot improperly applies an affected policy.
The security update addresses the vulnerability by blacklisting affected policies.
This security update is rated Important for all supported editions of Windows 8.1, Windows RT 8.1, Windows Server 2012, Windows Server 2012 R2, and Windows 10.
- Consequence
- Successful exploitation allows an attacker to disable code integrity checks, allowing test-signed executables and drivers to be loaded on a target device.
- Solution
-
Refer to MS16-094 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-094 Windows 10 Version 1511 for 32-bit Systems
MS16-094 Windows 10 Version 1511 for x64-based Systems
MS16-094 Windows 10 for 32-bit Systems
MS16-094 Windows 10 for x64-based Systems
MS16-094 Windows 8.1 for 32-bit Systems
MS16-094 Windows 8.1 for x64-based Systems
MS16-094 Windows Server 2012
MS16-094 Windows Server 2012 R2
These new vulnerability checks are included in Qualys vulnerability signature 2.3.378-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
Selective Scan Instructions Using Qualys
To perform a selective vulnerability scan, configure a scan profile to use the following options:
- Ensure access to TCP ports 135 and 139 are available.
- Enable Windows Authentication (specify Authentication Records).
-
Enable the following Qualys IDs:
- 91251
- 100290
- 91249
- 91247
- 91248
- 110278
- 91253
- 91254
- 91252
- 100291
- 91250
- If you would like the scan to return the Windows Hostname, also include QID 82044 and ensure access to UDP port 137 is available.
- If you would like to be notified if Qualys is unable to log on to a host (if Authentication fails), also include QID 105015.
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Access for Qualys Customers
Platforms and Platform Identification
Technical Support
For more information, customers may contact Qualys Technical Support.
About Qualys
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.