Severity Rating: Critical
Revision Note: V1.0 (December 13, 2016): Bulletin published
Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Category Archives: Microsft
Microsoft
MS16-152 – Important: Security Update for Windows Kernel (3199709) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (December 13, 2016): Bulletin published.
Summary: The security update addresses the vulnerability by helping to ensure the kernel API correctly enforces access controls applied to this information. This security update resolves a vulnerability in Microsoft Windows. An information disclosure vulnerability exists when the Windows Kernel improperly handles objects in memory.
MS16-135 – Important: Security Update for Windows Kernel-Mode Drivers (3199135) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (November 8, 2016): Click here to enter text.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.
MS16-134 – Important: Security Update for Common Log File System Driver (3193706) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (November 8, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerability could allow elevation of privilege when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. In a local attack scenario, an attacker could exploit these vulnerabilities by running a specially crafted application to take complete control over the affected system. An attacker who successfully exploits this vulnerability could run processes in an elevated context.
MS16-129 – Critical: Cumulative Security Update for Microsoft Edge (3199057) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (November 8, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.
MS16-140 – Important: Security Update for Boot Manager (3193479) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (November 8, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker installs an affected boot policy and bypasses Windows security features.
MS16-142 – Critical: Cumulative Security Update for Internet Explorer (3198467) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (November 8, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
MS16-136 – Important: Security Update for SQL Server (3199641) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (November 8, 2016): Bulletin Published.
Summary: This security update resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow an attacker could to gain elevated privileges that could be used to view, change, or delete data; or create new accounts. The security update addresses these most severe vulnerabilities by correcting how SQL Server handles pointer casting.
MS16-132 – Critical: Security Update for Microsoft Graphics Component (3199120) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (November 8, 2016): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe being of the vulnerabilities could allow a remote code execution vulnerability exists when the Windows Animation Manager improperly handles objects in memory if a user visits a malicious webpage. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. This security update is rated Critical for all supported releases of Microsoft Windows. For more information, see the Affected Software and Vulnerability Severity Ratings section.
MS16-139 – Important: Security Update for Windows Kernel (3199720) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (November 8, 2016): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application to access sensitive information. A locally authenticated attacker could attempt to exploit this vulnerability by running a specially crafted application. An attacker can gain access to information not intended to be available to the user by using this method.