Category Archives: Microsft

Microsoft

MS16-JUN – Microsoft Security Bulletin Summary for June 2016 – Version: 1.1

Revision Note: V1.1 (June 15, 2016): For MS16-072, added a Known Issue to the Executive Summaries table. The updates in MS16-072 change the security context with which user group policies are retrieved. For more information about this by-design behavior change, see Microsoft Knowledge Base Article 3163622. For MS16-074, revised the Executive Summary to correct the attack vector description. This is an informational change only.
Summary: This bulletin summary lists security bulletins released for June 2016.

MS16-063 – Critical: Cumulative Security Update for Internet Explorer (3163649) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (June 14, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

MS16-080 – Important: Security Update for Microsoft Windows PDF (3164302) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (June 14, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted .pdf file. An attacker who successfully exploited the vulnerabilities could cause arbitrary code to execute in the context of the current user. However, an attacker would have no way to force a user to open a specially crafted .pdf file.

MS16-076 – Important: Security Update for Netlogon (3167691) – Version: 1.0

Severity Rating: Important
Revision Note: V1.0 (June 14, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker with access to a domain controller (DC) on a target network runs a specially crafted application to establish a secure channel to the DC as a replica domain controller.

MS16-069 – Critical: Cumulative Security Update for JScript and VBScript (3163640) – Version: 1.0

Severity Rating: Critical
Revision Note: V1.0 (June 14, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in the JScript and VBScript scripting engines in Microsoft Windows. The vulnerabilities could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited these vulnerabilities could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.