Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 141 vulnerabilities that were fixed in 18 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 18 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
Microsoft has rated this update as Critical for IE9, IE11 and Moderate for IE9, IE10 and IE11 on Windows servers.
The update addresses how affected components like browsers,JavaScript and Visual Basic Script engines handle objects in memory and also make improvements for parsing HTTP responses.
In a web-based attack scenario an attacker could host a malicious webpage or use a compromised websites and websites that accept or host user-provided content to exploit the vulnerabilities to expose information to further compromise a target system.Due to improper parsing of HTTP responses attacker can redirecting them to a specially crafted website.This requires user action. JavaScript and Visual Basic engines could corrupt memory while handling objects, this could allow arbitrary code execution. The JScript engine can be exploited to detect specific files on the user's computer. Due to improper cross-domain policiy enforcement attacker could access information from one domain and inject it into another domain.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-006
Microsoft Edge suffers multiple security vulnerabilities. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge.
Previously this QID was a Zero Day.
Affected Version:
Microsoft Edge on Windows 10 and Windows Server 2016.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-007 Windows 10 Version 1511 for 32-bit Systems(Microsoft Edge)
MS17-007 Windows 10 Version 1511 for x64-based Systems(Microsoft Edge)
MS17-007 Windows 10 Version 1607 for 32-bit Systems(Microsoft Edge)
MS17-007 Windows 10 Version 1607 for x64-based Systems(Microsoft Edge)
MS17-007 Windows 10 for 32-bit Systems(Microsoft Edge)
MS17-007 Windows 10 for x64-based Systems(Microsoft Edge)
MS17-007 Windows Server 2016 for x64-based Systems(Microsoft Edge)
- Multiple denial of service vulnerabilities exist when the Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system.
- Multiple remote code execution vulnerabilities exist when Windows Hyper-V on a host server fails to properly validate vSMB packet data.
- Multiple remote code execution vulnerabilities exist when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system.
- An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system.
This security update is rated Critical for all supported editions of Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-008 Windows 10 Version 1511 for x64-based Systems
MS17-008 Windows 10 Version 1607 for x64-based Systems
MS17-008 Windows 10 for x64-based Systems
MS17-008 Windows 7 for x64-based Systems Service Pack 1
MS17-008 Windows 8.1 for x64-based Systems
MS17-008 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS17-008 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Monthly Rollup
MS17-008 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Security Only
MS17-008 Windows Server 2008 for x64-based Systems Service Pack 2
MS17-008 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
MS17-008 Windows Server 2012 (Server Core installation) (4012214) Security Only
MS17-008 Windows Server 2012 (Server Core installation) (4012217) Monthly Rollup
MS17-008 Windows Server 2012 R2
MS17-008 Windows Server 2012 R2 (Server Core installation) (4012213) Security Only
MS17-008 Windows Server 2012 R2 (Server Core installation) (4012216) Monthly Rollup
MS17-008 Windows Server 2016 for x64-based Systems
MS17-008 Windows Server 2016 for x64-based Systems [2](Server Core installation)
This security update is rated Critical for all supported editions of Windows 8.1, Windows Server 2012, Windows RT 8.1, Windows Server 2012 R2, Windows 10, and Windows Server 2016.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-009 Windows 10 Version 1511 for 32-bit Systems
MS17-009 Windows 10 Version 1511 for x64-based Systems
MS17-009 Windows 10 Version 1607 for 32-bit Systems
MS17-009 Windows 10 Version 1607 for x64-based Systems
MS17-009 Windows 10 for 32-bit Systems
MS17-009 Windows 10 for x64-based Systems
MS17-009 Windows 8.1 for 32-bit Systems
MS17-009 Windows 8.1 for 32-bit Systems
MS17-009 Windows 8.1 for x64-based Systems
MS17-009 Windows 8.1 for x64-based Systems
MS17-009 Windows Server 2012
MS17-009 Windows Server 2012
MS17-009 Windows Server 2012 R2
MS17-009 Windows Server 2012 R2
MS17-009 Windows Server 2016 for x64-based Systems
The Microsoft SMB Server is vulnerable to multiple remote code execution vulnerabilities due to the way that the Microsoft Server Message Block 1.0 (SMBv1) server handles certain requests.
This security update is rated Critical for all supported editions of Windows XP, Windows 2003, Windows 8, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2 Service Pack 1, Windows Server 2012 and 2012 R2, Windows 8.1 and RT 8.1, Windows 10 and Windows Server 2016.
UPDATE: 14 May 2017. Signature for this QID has been updated to detect the patch released by Microsoft for end-of-life operating systems Windows XP, Windows 2003 and Windows 8.
QID Detection Logic (Unauthenticated):
This QID connects the remote server's "IPC$" then sends a "PeekNamedPipe" SMB request with "FID = 0" to the remote target. Vulnerable system should return "STATUS_INSUFF_SERVER_RESOURCES" in the SMB status code.
QID Detection Logic (Authenticated):
Operating Systems: Windows XP, Windows Server 2003 Windows Server 2008, Windows Server 2008 R2, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows RT 8.1, Windows 10, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016
This QID checks for the file version of %windir%\System32\drivers\srv.sys (On Windows XP, Windows Server 2003 Windows Server 2008, Windows Server 2008 R2, Windows Vista, Windows 7, Windows 8, Windows 8.1, Windows RT 8.1, Windows 10, Windows Server 2012, Windows Server 2012 R2 and Windows Server 2016)
The following KBs are checked for srv.sys:
The patch version is 5.1.2600.7208 (KB4012598)
The patch version is 5.2.3790.6021 (KB4012598)
The patch version is 6.0.6002.19743 (KB4012598)
The patch version is 6.0.6002.24067 (KB4012598)
The patch version is 6.1.7601.23689 (KB4012212 and KB4012215)
The patch version is 6.2.9200.22099 (KB4012598, KB4012214 and KB4012217)
The patch version is 6.3.9600.18604 (KB4012213 and KB4012216)
The patch version is 10.0.10240.17319 (KB4012606)
The patch version is 10.0.10586.839 (KB4013198)
The patch version is 10.0.14393.953 (KB4013429)
The latest version of the Petya ransomware is spreading over Windows SMB and is reportedly using the ETERNALBLUE exploit.
Workaround:
Disable SMBv1
Refer to KB2696547 for more information.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-010 Windows 10 Version 1511 for 32-bit Systems
MS17-010 Windows 10 Version 1511 for x64-based Systems
MS17-010 Windows 10 Version 1607 for 32-bit Systems
MS17-010 Windows 10 Version 1607 for x64-based Systems
MS17-010 Windows 10 for 32-bit Systems
MS17-010 Windows 10 for x64-based Systems
MS17-010 Windows 7 for 32-bit Systems Service Pack 1
MS17-010 Windows 7 for 32-bit Systems Service Pack 1
MS17-010 Windows 7 for x64-based Systems Service Pack 1
MS17-010 Windows 7 for x64-based Systems Service Pack 1
MS17-010 Windows 8
MS17-010 Windows 8.1 for 32-bit Systems
MS17-010 Windows 8.1 for 32-bit Systems
MS17-010 Windows 8.1 for x64-based Systems
MS17-010 Windows 8.1 for x64-based Systems
MS17-010 Windows RT 8.1
MS17-010 Windows Server 2003 Systems
MS17-010 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS17-010 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS17-010 Windows Server 2008 for 32-bit Systems Service Pack 2
MS17-010 Windows Server 2008 for x64-based Systems Service Pack 2
MS17-010 Windows Server 2012
MS17-010 Windows Server 2012
MS17-010 Windows Server 2012 R2
MS17-010 Windows Server 2012 R2
MS17-010 Windows Server 2016 for x64-based Systems
MS17-010 Windows Vista Service Pack 2
MS17-010 Windows Vista x64 Edition Service Pack 2
MS17-010 Windows XP Service Pack 3
The security update addresses these vulnerabilities by correcting how Windows Uniscribe handles objects in memory.
This security update is rated Critical for all supported editions of Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8.1, Windows Server 2012, Windows RT 8.1, Windows Server 2012 R2, Windows 10, Windows 10 Version 1511, Windows 10 Version 1607, and Windows Server 2016.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-011 Windows 10 Version 1511 for 32-bit Systems
MS17-011 Windows 10 Version 1511 for x64-based Systems
MS17-011 Windows 10 Version 1607 for 32-bit Systems
MS17-011 Windows 10 Version 1607 for x64-based Systems
MS17-011 Windows 10 for 32-bit Systems
MS17-011 Windows 10 for x64-based Systems
MS17-011 Windows 7 for 32-bit Systems Service Pack 1
MS17-011 Windows 7 for 32-bit Systems Service Pack 1
MS17-011 Windows 7 for x64-based Systems Service Pack 1
MS17-011 Windows 7 for x64-based Systems Service Pack 1
MS17-011 Windows 8.1 for 32-bit Systems
MS17-011 Windows 8.1 for 32-bit Systems
MS17-011 Windows 8.1 for x64-based Systems
MS17-011 Windows 8.1 for x64-based Systems
MS17-011 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS17-011 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS17-011 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS17-011 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS17-011 Windows Server 2008 for 32-bit Systems Service Pack 2
MS17-011 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS17-011 Windows Server 2008 for x64-based Systems Service Pack 2
MS17-011 Windows Server 2012
MS17-011 Windows Server 2012
MS17-011 Windows Server 2012 R2
MS17-011 Windows Server 2012 R2
MS17-011 Windows Server 2016 for x64-based Systems
MS17-011 Windows Vista Service Pack 2
MS17-011 Windows Vista x64 Edition Service Pack 2
Microsoft has addressed the vulnerabilities by fixing:
1) Certain elements Device of how Guard validates of signed PowerShell scripts.
2) Microsoft SMBv2/SMBv3 Client handles specially crafted requests.
3) Windows validates input before loading DLL files.
4) Windows dnsclient handles requests.
5) Helppane.exe authenticates the client.
6) iSNS Server service parses requests.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-012 Monthly Quality Rollup for Windows 7
MS17-012 Monthly Quality Rollup for Windows 7 for x64-based Systems
MS17-012 Monthly Quality Rollup for Windows 8.1
MS17-012 Monthly Quality Rollup for Windows 8.1 for x64-based Systems
MS17-012 Monthly Quality Rollup for Windows Embedded Standard 7
MS17-012 Monthly Quality Rollup for Windows Embedded Standard 7 for x64-based Systems
MS17-012 Monthly Quality Rollup for Windows Server 2008 R2 for Itanium-based Systems
MS17-012 Monthly Quality Rollup for Windows Server 2008 R2 for x64-based Systems
MS17-012 Monthly Quality Rollup for Windows Server 2012
MS17-012 Monthly Quality Rollup for Windows Server 2012 R2
MS17-012 Windows
MS17-012 Windows 10
MS17-012 Windows 10 (for x64-based Systems)
MS17-012 Windows 10 Version 1511
MS17-012 Windows 10 Version 1511 for x64-based Systems
MS17-012 Windows 10 Version 1607
MS17-012 Windows 10 Version 1607 for x64-based Systems
MS17-012 Windows 10 for x64-based Systems
MS17-012 Windows 7
MS17-012 Windows 7 for x64-based Systems
MS17-012 Windows 8.1
MS17-012 Windows 8.1 RT
MS17-012 Windows 8.1 for x64-based Systems
MS17-012 Windows Embedded Standard 7
MS17-012 Windows Embedded Standard 7 for x64-based Systems
MS17-012 Windows Server 2008
MS17-012 Windows Server 2008
MS17-012 Windows Server 2008 R2 for Itanium-based Systems
MS17-012 Windows Server 2008 R2 for x64-based Systems
MS17-012 Windows Server 2008 for Itanium-based Systems
MS17-012 Windows Server 2008 x64
MS17-012 Windows Server 2008 x64
MS17-012 Windows Server 2012
MS17-012 Windows Server 2012 R2
MS17-012 Windows Server 2016 for x64-based Systems
MS17-012 Windows Vista
MS17-012 Windows Vista for x64-based Systems
The security update addresses the vulnerabilities by correcting how the software handles objects in memory.
This security update is rated Critical for: All supported releases of Microsoft Windows Affected editions of Microsoft Office 2007 and Microsoft Office 2010 Affected editions of Skype for Business 2016, Microsoft Lync 2013, and Microsoft Lync 2010 Affected editions of Silverlight
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-013 Microsoft Live Meeting 2007 Add-in
MS17-013 Microsoft Live Meeting 2007 Console
MS17-013 Microsoft Lync 2010
MS17-013 Microsoft Lync 2010
MS17-013 Microsoft Lync 2010 Attendee
MS17-013 Microsoft Lync 2010 Attendee
MS17-013 Microsoft Lync 2013 Service Pack 1
MS17-013 Microsoft Lync 2013 Service Pack 1
MS17-013 Microsoft Lync Basic 2013 Service Pack 1
MS17-013 Microsoft Lync Basic 2013 Service Pack 1
MS17-013 Microsoft Office 2007 Service Pack 3
MS17-013 Microsoft Office 2007 Service Pack 3
MS17-013 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS17-013 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS17-013 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS17-013 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS17-013 Microsoft Silverlight 5
MS17-013 Microsoft Silverlight 5 Developer Runtime
MS17-013 Microsoft Word Viewer
MS17-013 Microsoft Word Viewer
MS17-013 Skype for Business 2016
MS17-013 Skype for Business 2016
MS17-013 Skype for Business Basic 2016
MS17-013 Skype for Business Basic 2016
The security update addresses the vulnerabilities by:
- Correcting how Office handles objects in memory
- Changing the way certain functions handle objects in memory
- Properly initializing the affected variable
- Helping to ensure that SharePoint Server properly sanitizes web requests
- Correcting how the Lync for Mac 2011 client validates certificates
Affected versions of Office and Office components handle objects in memory.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-014 Excel Services on Microsoft SharePoint Server 2007 Service Pack 3 (32-bit edition)
MS17-014 Excel Services on Microsoft SharePoint Server 2007 Service Pack 3 (64-bit edition)
MS17-014 Excel Services on Microsoft SharePoint Server 2010 Service Pack 2
MS17-014 Excel Services on Microsoft SharePoint Server 2013 Service Pack 1
MS17-014 Microsoft Excel 2007 Service Pack 3
MS17-014 Microsoft Excel 2010 Service Pack 2 (32-bit editions)
MS17-014 Microsoft Excel 2010 Service Pack 2 (64-bit editions)
MS17-014 Microsoft Excel 2013 Service Pack 1 (32-bit editions)
MS17-014 Microsoft Excel 2013 Service Pack 1 (64-bit editions)
MS17-014 Microsoft Excel 2016 (32-bit edition)
MS17-014 Microsoft Excel 2016 (64-bit edition)
MS17-014 Microsoft Excel 2016 for Mac
MS17-014 Microsoft Excel Viewer
MS17-014 Microsoft Excel for Mac 2011
MS17-014 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS17-014 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS17-014 Microsoft Office 2016 for Mac
MS17-014 Microsoft Office Compatibility Pack Service Pack 3
MS17-014 Microsoft Office Compatibility Pack Service Pack 3
MS17-014 Microsoft Office Compatibility Pack Service Pack 3
MS17-014 Microsoft Office Web Apps 2010 Service Pack 2
MS17-014 Microsoft Office Web Apps Server 2013 Service Pack 1
MS17-014 Microsoft SharePoint Foundation 2013 Service Pack 1
MS17-014 Microsoft Word 2007 Service Pack 3
MS17-014 Microsoft Word 2007 Service Pack 3
MS17-014 Microsoft Word 2010 Service Pack 2 (32-bit editions)
MS17-014 Microsoft Word 2010 Service Pack 2 (64-bit editions)
MS17-014 Microsoft Word 2013 Service Pack 1 (32-bit editions)
MS17-014 Microsoft Word 2013 Service Pack 1 (64-bit editions)
MS17-014 Microsoft Word 2016 (32-bit edition)
MS17-014 Microsoft Word 2016 (64-bit edition)
MS17-014 Microsoft Word Viewer
MS17-014 Microsoft Word for Mac 2011
MS17-014 Word Automation Services on Microsoft SharePoint Server 2010 Service Pack 2
The security update addresses the vulnerability by correcting how Microsoft Exchange validates web requests.
This security update is rated Important for all supported editions of Microsoft Exchange Server 2013 and Microsoft Exchange Server 2016
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-015 Microsoft Exchange Server 2013 Cumulative Update 14
MS17-015 Microsoft Exchange Server 2013 Service Pack 1
MS17-015 Microsoft Exchange Server 2016 Cumulative Update 3
An attacker who successfully exploited this vulnerability could then perform cross-site scripting attacks on affected systems and run script in the security context of the current user.
These attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions on behalf of the victim, and inject malicious content in the victims browser.
The security update addresses the vulnerability by correcting how Microsoft IIS Server sanitizes web requests.
This security update is rated Important for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-016 Windows 10 Version 1511 for 32-bit Systems
MS17-016 Windows 10 Version 1511 for x64-based Systems
MS17-016 Windows 10 Version 1607 for 32-bit Systems
MS17-016 Windows 10 Version 1607 for x64-based Systems
MS17-016 Windows 10 for 32-bit Systems
MS17-016 Windows 10 for x64-based Systems
MS17-016 Windows 7 for 32-bit Systems Service Pack 1
MS17-016 Windows 7 for 32-bit Systems Service Pack 1
MS17-016 Windows 7 for x64-based Systems Service Pack 1
MS17-016 Windows 7 for x64-based Systems Service Pack 1
MS17-016 Windows 8.1 for 32-bit Systems
MS17-016 Windows 8.1 for 32-bit Systems
MS17-016 Windows 8.1 for x64-based Systems
MS17-016 Windows 8.1 for x64-based Systems
MS17-016 Windows Server 2008 R2 for 32-bit Systems Service Pack 2
MS17-016 Windows Server 2008 R2 for Itanium-based Systems Service Pack 2
MS17-016 Windows Server 2008 R2 for Itanium-based Systems Service Pack 2
MS17-016 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS17-016 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS17-016 Windows Server 2008 R2 for x64-based Systems Service Pack 2
MS17-016 Windows Server 2008 for 32-bit Systems Service Pack 2
MS17-016 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS17-016 Windows Server 2008 for x64-based Systems Service Pack 2
MS17-016 Windows Server 2012
MS17-016 Windows Server 2012
MS17-016 Windows Server 2012 R2
MS17-016 Windows Server 2012 R2
MS17-016 Windows Server 2016 for x64-based Systems
MS17-016 Windows Vista Service Pack 2
MS17-016 Windows Vista x64 Edition Service Pack 2
The update addresses the vulnerabilities by correcting how Windows handles objects in memory, validates buffer lengths and inputs.
Microsoft has rated this vulnerability as Important for all supported releases of Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-017 Windows 10
MS17-017 Windows 10 Version 1511
MS17-017 Windows 10 Version 1607
MS17-017 Windows 7 - Monthly rollup
MS17-017 Windows 7 - Security only
MS17-017 Windows 8.1 - Monthly rollup
MS17-017 Windows 8.1 - Security only
MS17-017 Windows RT 8.1
MS17-017 Windows Server 2008
MS17-017 Windows Server 2008 R2 - Monthly rollup
MS17-017 Windows Server 2008 R2 - Security only
MS17-017 Windows Server 2012 - Monthly rollup
MS17-017 Windows Server 2012 - Security only
MS17-017 Windows Server 2012 R2 - Monthly rollup
MS17-017 Windows Server 2012 R2 - Security only
MS17-017 Windows Server 2016
MS17-017 Windows Vista - 32 bit
MS17-017 Windows Vista - 64 bit
The update addresses the vulnerabilities by correcting how the Windows kernel-mode driver handles objects in memory.
This security update is rated Important for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-018 Windows 10 Version 1511 for 32-bit Systems
MS17-018 Windows 10 Version 1511 for x64-based Systems
MS17-018 Windows 10 Version 1607 for 32-bit Systems
MS17-018 Windows 10 Version 1607 for x64-based Systems
MS17-018 Windows 10 for 32-bit Systems
MS17-018 Windows 10 for x64-based Systems
MS17-018 Windows 7 for 32-bit Systems Service Pack 1
MS17-018 Windows 7 for 32-bit Systems Service Pack 1
MS17-018 Windows 7 for x64-based Systems Service Pack 1
MS17-018 Windows 7 for x64-based Systems Service Pack 1
MS17-018 Windows 8.1 for 32-bit Systems
MS17-018 Windows 8.1 for 32-bit Systems
MS17-018 Windows 8.1 for x64-based Systems
MS17-018 Windows 8.1 for x64-based Systems
MS17-018 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS17-018 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS17-018 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS17-018 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS17-018 Windows Server 2008 for 32-bit Systems Service Pack 2
MS17-018 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS17-018 Windows Server 2008 for x64-based Systems Service Pack 2
MS17-018 Windows Server 2012
MS17-018 Windows Server 2012
MS17-018 Windows Server 2012 R2
MS17-018 Windows Server 2012 R2
MS17-018 Windows Server 2016 for x64-based Systems
MS17-018 Windows Vista Service Pack 2
MS17-018 Windows Vista x64 Edition Service Pack 2
This security update is rated Important for all supported releases of Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, and Windows Server 2016.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS17-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS17-019 Windows Server 2008 for 32-bit Systems Service Pack 2
MS17-019 Windows Server 2008 for x64-based Systems Service Pack 2
MS17-019 Windows Server 2012
MS17-019 Windows Server 2012
MS17-019 Windows Server 2012 R2
MS17-019 Windows Server 2012 R2
MS17-019 Windows Server 2016 for x64-based Systems
An attacker can either log on locally to an affected system, or convince a locally authenticated user to execute a specially crafted application which may leak information about the target system.
Affected OS:
1) Windows 7 Service Pack 1
2) Windows Vista Service Pack 2
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-020 Windows
MS17-020 Windows 7
MS17-020 Windows 7 - Monthly rollup
MS17-020 Windows 7 for x64-based Systems
MS17-020 Windows 7 for x64-based Systems Monthly Roll-Up
MS17-020 Windows Embedded Standard 7
MS17-020 Windows Embedded Standard 7 Monthly Roll-Up
MS17-020 Windows Embedded Standard 7 Monthly Roll-Up
MS17-020 Windows Embedded Standard 7 for x64-based Systems
MS17-020 Windows Vista
MS17-020 Windows Vista for x64-based Systems
This security update is rated Important for all affected versions of Windows.
Microsoft does have a patch available for Windows Server 2012.
Microsoft does have a patch available for Windows Server 2012.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-021 Windows 10 Version 1511 for 32-bit Systems
MS17-021 Windows 10 Version 1511 for x64-based Systems
MS17-021 Windows 10 Version 1607 for 32-bit Systems
MS17-021 Windows 10 Version 1607 for x64-based Systems
MS17-021 Windows 10 for 32-bit Systems
MS17-021 Windows 10 for x64-based Systems
MS17-021 Windows 7 for 32-bit Systems Service Pack 1
MS17-021 Windows 7 for x64-based Systems Service Pack 1
MS17-021 Windows 8.1 for 32-bit Systems
MS17-021 Windows 8.1 for x64-based Systems
MS17-021 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS17-021 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS17-021 Windows Server 2008 for 32-bit Systems Service Pack 2
MS17-021 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS17-021 Windows Server 2008 for x64-based Systems Service Pack 2
MS17-021 Windows Server 2012
MS17-021 Windows Server 2012
MS17-021 Windows Server 2012 R2
MS17-021 Windows Server 2016 for x64-based Systems
MS17-021 Windows Vista Service Pack 2
MS17-021 Windows Vista x64 Edition Service Pack 2
This security update is rated Important for Microsoft XML Core Services 3.0 on all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-022 Windows 10 Version 1511 for 32-bit Systems
MS17-022 Windows 10 Version 1511 for 32-bit Systems
MS17-022 Windows 10 Version 1607 for 32-bit Systems
MS17-022 Windows 10 Version 1607 for x64-based Systems
MS17-022 Windows 10 for 32-bit Systems
MS17-022 Windows 10 for x64-based Systems
MS17-022 Windows 7 for 32-bit Systems Service Pack 1 Security Only
MS17-022 Windows 7 for 32-bit Systems Service Pack 1 Monthly Rollup
MS17-022 Windows 7 for x64-based Systems Service Pack 1 Security Only
MS17-022 Windows 7 for x64-based Systems Service Pack 1 Monthly Rollup
MS17-022 Windows 8.1 for 32-bit Systems Monthly Rollup
MS17-022 Windows 8.1 for 32-bit Systems Security Only
MS17-022 Windows 8.1 for x64-based Systems Monthly Rollup
MS17-022 Windows 8.1 for x64-based Systems Security Only
MS17-022 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 Monthly Rollup
MS17-022 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 Security Only
MS17-022 Windows Server 2008 R2 for x64-based Systems Service Pack 1 Monthly Rollup
MS17-022 Windows Server 2008 R2 for x64-based Systems Service Pack 1 Security Only
MS17-022 Windows Server 2008 for 32-bit Systems Service Pack 2
MS17-022 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS17-022 Windows Server 2008 for x64-based Systems Service Pack 2
MS17-022 Windows Server 2012 R2 Monthly Rollup
MS17-022 Windows Server 2012 R2 Security Only
MS17-022 Windows Server 2016 for x64-based Systems
MS17-022 Windows Vista Service Pack 2
MS17-022 Windows Vista x64 Edition Service Pack 2
This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows Server 2016.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS17-023 Windows
MS17-023 Windows 10
MS17-023 Windows 10 (for x64-based Systems)
MS17-023 Windows 10 Version 1511
MS17-023 Windows 10 Version 1511 (for x64-based Systems)
MS17-023 Windows 10 Version 1607 (for x64-based Systems)
MS17-023 Windows 8 Embedded
MS17-023 Windows 8.1
MS17-023 Windows 8.1 x64
MS17-023 Windows Embedded 8 Standard for X64-based Systems
MS17-023 Windows Server 2012
MS17-023 Windows Server 2012 R2
MS17-023 Windows Server 2016 (for x64-based Systems)
These new vulnerability checks are included in Qualys vulnerability signature 2.3.562-5. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.