Severity Rating: Critical
Revision Note: V1.0 (October 11, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
Category Archives: Microsft
Microsoft
MS16-OCT – Microsoft Security Bulletin Summary for October 2016 – Version: 1.0
Revision Note: V1.0 (October 11, 2016): Click here to enter text.
Summary: This bulletin summary lists security bulletins released for October 2016.
MS16-119 – Critical: Cumulative Security Update for Microsoft Edge (3192890) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (October 11, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.
MS16-122 – Critical: Security Update for Microsoft Video Control (3195360) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (October 11, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker successfully convinces a user of an affected system to visit a malicious or compromised website. Note that you must install two updates to be protected from the vulnerability discussed in this bulletin: The update in this bulletin, MS16-116, and the update in MS16-104.
MS16-124 – Important: Security Update for Windows Registry (3193227) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (October 11, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker can access sensitive registry information.
MS16-125 – Important: Security Update for Diagnostics Hub (3193229) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (October 11, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application.
MS16-123 – Important: Security Update for Windows Kernel-Mode Drivers (3192892) – Version: 1.1
Severity Rating: Important
Revision Note: V1.1 (October 11, 2016): Bulletin revised to correct a CVE ID. CVE-2016-7191 has been changed to CVE-2016-7211. This is an informational change only. Customers who have successfully installed the updates do not need to take any further action.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.
MS16-121 – Important: Security Update for Microsoft Office (3194063) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (October 11, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Office. An Office RTF remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle RTF files. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user.
MS16-118 – Critical: Cumulative Security Update for Internet Explorer (3192887) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (October 11, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
MS16-109 – Important: Security Update for Silverlight (3182373) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (September 13, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Silverlight. The vulnerability could allow remote code execution if a user visits a compromised website that contains a specially crafted Silverlight application. An attacker would have no way to force a user to visit a compromised website. Instead, an attacker would have to convince the user to visit the website, typically by enticing the user to click a link in either an email or instant message that takes the user to the attacker’s website.