MS15-118 – Important: Security Update for .NET Framework to Address Elevation of Privilege (3104507) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (November 10, 2015): Click here to enter text.
Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow elevation of privilege if an attacker convinces a user to navigate to a compromised website or open a link in a specially crafted email that is designed to inject client-side code into the user’s browser.

MS15-123 – Important: Security Update for Skype for Business and Microsoft Lync to Address Information Disclosure (3105872) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (November 10, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Skype for Business and Microsoft Lync. The vulnerability could allow information disclosure if an attacker invites a target user to an instant message session and then sends that user a message containing specially crafted JavaScript content.

MS15-116 – Important: Security Update for Microsoft Office to Address Remote Code Execution (3104540) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (November 10, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

MS15-122 – Important: Security Update for Kerberos to Address Security Feature Bypass (3105256) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (November 10, 2015): Bulletin published.
Summary: This security update resolves a security feature bypass in Microsoft Windows. An attacker could bypass Kerberos authentication on a target machine and decrypt drives protected by BitLocker. The bypass can be exploited only if the target system has BitLocker enabled without a PIN or USB key.

A simple solution to IT security sprawl?

According to recent research conducted by Forrester Consulting, the vast majority of enterprise security professionals believe that security should be delivered as an integrated platform via the cloud.

Indeed, 98 percent of those questioned said that integrated security platforms would be effective to both improve their security posture and to reduce overall cost in comparison to traditional on-premise security appliances and point solutions.

As our channel partners have experienced firsthand from their small and medium business clients, the ultimate problem addressed in the research is one that has been gaining increased airtime over the past year – security sprawl. With more data sharing, more device connections, and more security solutions to manage everything than ever before, companies are struggling to keep themselves secure.

Though targeted at an enterprise level, I believe you’ll agree that these research findings are just as applicable to smaller businesses – with the fragmented security landscape posing a management headache no matter your company size.

Our AVG Business product line includes a managed services and security platform that offers a range of features. We have designed the products with absolute simplicity in mind to help relieve security sprawl headaches. AVG CloudCare is one example, enabling direct, real-time management of a full suite of cloud-delivered security services – antivirus, online backup, content filtering, email security, premium remote control, secure sign-on and more, all from one dashboard. Instead of having to deal with the complexity of multiple, different security solutions, we provide a ‘single pane of glass’ view for easier IT management.

AVG CloudCare supports our partners, so that MSPs can give their customers the reassurance that their applications and data are protected on any device, anytime, anywhere.

As John Quatto, Channel Partner Manager at Zobrio Inc. recently put it, “the only problem you might face now is that your clients will never witness and appreciate the work you’re doing – As an MSP you have to be able to prove your worth – ironically, that’s difficult if you’re fixing issues before the customer even knows they exist!”

If AVG CloudCare sounds like it could be an asset for your business, visit our AVG Business website today to find out more.

CVE-2015-5655

The Adways Party Track SDK before 1.6.6 for iOS does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2015-6362

The web GUI in Cisco Connected Grid Network Management System (CG-NMS) 3.0(0.35) and 3.0(0.54) allows remote authenticated users to bypass intended access restrictions and modify the configuration by leveraging the Monitor-Only role, aka Bug ID CSCuw42640.

CVE-2015-8100

The net-snmp package in OpenBSD through 5.8 uses 0644 permissions for snmpd.conf, which allows local users to obtain sensitive community information by reading this file.