Microsoft Security Bulletin: February 2016 Release!
It’s been a while folks since I did a security update so I decided to get back into the rhythm of sending these out each month. Anyway it’s quite a big month in the area of updates so make sure you have a look at the list below and apply these updates where needed.
Bulletin ID |
Bulletin Title and Executive Summary |
Maximum Severity Ratingand Vulnerability Impact |
Restart Requirement |
KnownIssues |
Affected Software |
Cumulative Security Update for Internet Explorer (3134220) This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. |
Critical Remote Code Execution |
Requires restart |
Microsoft Windows,Internet Explorer |
||
Cumulative Security Update for Microsoft Edge (3134225) This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. |
Critical Remote Code Execution |
Requires restart |
--------- |
Microsoft Windows,Microsoft Edge |
|
Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3138938) This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if Microsoft Windows PDF Library improperly handles application programming interface (API) calls, which could allow an attacker to run arbitrary code on the user’s system. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. However, an attacker would have no way to force users to download or open a malicious PDF document. |
Critical Remote Code Execution |
May require restart |
--------- |
Microsoft Windows |
|
Security Update for Windows Journal to Address Remote Code Execution (3134811) This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. |
Critical Remote Code Execution |
May require restart |
--------- |
Microsoft Windows |
|
Security Update for Microsoft Windows to Address Remote Code Execution (3134228) This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker is able to log on to a target system and run a specially crafted application. |
Important Remote Code Execution |
Requires restart |
Microsoft Windows |
||
Security Update for Microsoft Office to Address Remote Code Execution (3134226) This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. |
Critical Remote Code Execution |
May require restart |
--------- |
Microsoft Office, Microsoft Office Services and Web Apps, Microsoft Server Software |
|
Security Update for WebDAV to Address Elevation of Privilege (3136041) This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker uses the Microsoft Web Distributed Authoring and Versioning (WebDAV) client to send specifically crafted input to a server. |
Important Elevation of Privilege |
May require restart |
--------- |
Microsoft Windows |
|
Security Update for Remote Desktop Display Driver to Address Elevation of Privilege (3134700) This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an authenticated attacker logs on to the target system using RDP and sends specially crafted data over the connection. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk. |
Important Elevation of Privilege |
Requires restart |
Microsoft Windows |
||
Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege (3136082) This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. |
Important Elevation of Privilege |
Requires restart |
--------- |
Microsoft Windows |
|
Security Update for .NET Framework to Address Denial of Service (3137893) This security update resolves vulnerabilities in Microsoft .NET Framework. The more severe of the vulnerabilities could cause denial of service if an attacker inserts specially crafted XSLT into a client-side XML web part, causing the server to recursively compile XSLT transforms. |
Important Denial of Service |
May require restart |
--------- |
Microsoft Windows,Microsoft .NET Framework |
|
Security Update for Active Directory Federation Services to Address Denial of Service (3134222) This security update resolves a vulnerability in Active Directory Federation Services (ADFS). The vulnerability could allow denial of service if an attacker sends certain input data during forms-based authentication to an ADFS server, causing the server to become nonresponsive. |
Important Denial of Service |
May require restart |
--------- |
Microsoft Windows |
|
Security Update for NPS RADIUS Server to Address Denial of Service (3133043) This security update resolves a vulnerability in Microsoft Windows. The vulnerability could cause denial of service on a Network Policy Server (NPS) if an attacker sends specially crafted username strings to the NPS, which could prevent RADIUS authentication on the NPS. |
Important Denial of Service |
May require restart |
--------- |
Microsoft Windows |
|
Security Update for Adobe Flash Player (3135782) This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10. |
Critical Remote Code Execution |
Requires restart |
--------- |
Microsoft WindowsAdobe Flash Player |
More detailed information plus additional resources can be found here.
Happy updating!
Jeffa