Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 59 vulnerabilities that were fixed in 12 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 12 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
The security update resolves an elevation of privilege vulnerability when the Windows Secure Kernel Mode fails to properly handle objects in memory.
This security update is rated Important for Microsoft Windows 10 and Windows Server 2016.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-150 Windows 10
MS16-150 Windows 10 version 1511
MS16-150 Windows 10 version 1607
MS16-150 Windows Server 2016
Microsoft has addressed the vulnerabilities by fixing:
1) How a Windows Crypto Driver handles objects in memory.
2) The input sanitization error which allowed privilege escalation.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-149 WES09 and POSReady 2009
MS16-149 Windows
MS16-149 Windows 10
MS16-149 Windows 10 Version 1511
MS16-149 Windows 10 Version 1511 for x64-based Systems
MS16-149 Windows 10 Version 1607
MS16-149 Windows 10 Version 1607 for x64-based Systems
MS16-149 Windows 10 for x64-based Systems
MS16-149 Windows 7
MS16-149 Windows 7 Monthly Roll-Up
MS16-149 Windows 7 for x64-based Systems
MS16-149 Windows 7 for x64-based Systems Monthly Roll-Up
MS16-149 Windows 8.1
MS16-149 Windows 8.1 Monthly Roll-Up
MS16-149 Windows 8.1 for x64-based Systems
MS16-149 Windows 8.1 for x64-based Systems Monthly Roll-Up
MS16-149 Windows Embedded 8 Standard
MS16-149 Windows Embedded 8 Standard Monthly Roll-Up
MS16-149 Windows Embedded 8 Standard for x64-based Systems
MS16-149 Windows Embedded 8 Standard for x64-based Systems Monthly Roll-Up
MS16-149 Windows Embedded Standard 7
MS16-149 Windows Embedded Standard 7 Monthly Roll-Up
MS16-149 Windows Embedded Standard 7 for x64-based Systems
MS16-149 Windows Embedded Standard 7 for x64-based Systems Monthly Roll-Up
MS16-149 Windows Server 2008
MS16-149 Windows Server 2008
MS16-149 Windows Server 2008 R2 for Itanium-based Systems
MS16-149 Windows Server 2008 R2 for Itanium-based Systems Monthly Roll-Up
MS16-149 Windows Server 2008 R2 for x64-based Systems
MS16-149 Windows Server 2008 R2 for x64-based Systems Monthly Roll-Up
MS16-149 Windows Server 2008 for Itanium-based Systems
MS16-149 Windows Server 2008 for Itanium-based Systems
MS16-149 Windows Server 2008 for x64-based Systems
MS16-149 Windows Server 2008 x64 Edition
MS16-149 Windows Server 2012
MS16-149 Windows Server 2012 Monthly Roll-Up
MS16-149 Windows Server 2012 R2
MS16-149 Windows Server 2012 R2 Monthly Roll-Up
MS16-149 Windows Server 2016 for x64-based Systems
MS16-149 Windows Vista
MS16-149 Windows Vista
MS16-149 Windows Vista for x64-based Systems
MS16-149 Windows Vista for x64-based Systems
Microsoft has released Cumulative Security Updates for Internet Explorer which addresses various vulnerabilities found in Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10) and Internet Explorer 11 (IE 11). The security updated is rated Critical for affected Windows Client for Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10) and Internet Explorer 11 (IE 11) and Moderate on affected Windows Servers.
The security update addresses the vulnerabilities by fixing:
1) How Internet Explorer modifies objects in memory.
2) By checking Same Origin Policy for scripts running in the Web Workers
3) How the scripting engines handles objects in memory
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-144 Windows 10 Version 1511 for 32-bit Systems
MS16-144 Windows 10 Version 1511 for x64-based Systems
MS16-144 Windows 10 Version 1607 for 32-bit Systems
MS16-144 Windows 10 Version 1607 for x64-based Systems
MS16-144 Windows 10 for 32-bit Systems
MS16-144 Windows 10 for x64-based Systems
MS16-144 Windows 7 for 32-bit Systems Service Pack 1Monthly Rollup(Internet Explorer 11)
MS16-144 Windows 7 for 32-bit Systems Service Pack 1Security Only(Internet Explorer 11)
MS16-144 Windows 7 for x64-based Systems Service Pack 1Monthly Rollup(Internet Explorer 11)
MS16-144 Windows 7 for x64-based Systems Service Pack 1Security Only(Internet Explorer 11)
MS16-144 Windows 8.1 for 32-bit Systems Security Only(Internet Explorer 11)
MS16-144 Windows 8.1 for 32-bit SystemsMonthly Rollup(Internet Explorer 11)
MS16-144 Windows 8.1 for x64-based SystemsMonthly Rollup(Internet Explorer 11)
MS16-144 Windows 8.1 for x64-based SystemsSecurity Only(Internet Explorer 11)
MS16-144 Windows Server 2008 R2 for x64-based Systems Service Pack 1Monthly Rollup(Internet Explorer 11)
MS16-144 Windows Server 2008 R2 for x64-based Systems Service Pack 1Security Only(Internet Explorer 11)
MS16-144 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS16-144 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft Windows Hyperlink Object Library)
MS16-144 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS16-144 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft Windows Hyperlink Object Library)
MS16-144 Windows Server 2012 R2Monthly Rollup(Internet Explorer 11)
MS16-144 Windows Server 2012 R2Security Only(Internet Explorer 11)
MS16-144 Windows Server 2012Monthly Rollup(Internet Explorer 10)
MS16-144 Windows Server 2012Security Only(Internet Explorer 10)
MS16-144 Windows Server 2016 for x64-based Systems
MS16-144 Windows Vista Service Pack 2(Internet Explorer 9)
MS16-144 Windows Vista Service Pack 2(Microsoft Windows Hyperlink Object Library)
MS16-144 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
MS16-144 Windows Vista x64 Edition Service Pack 2(Microsoft Windows Hyperlink Object Library)
The update patches the vulnerabilities by:
Adressing how browsers handle objects in memory, and how it applies Same Origin Policy for scripts running inside Web Workers
Checks on Scripting engine when handling objects in memory.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-145 Windows 10 Version 1511 for 32-bit Systems
MS16-145 Windows 10 Version 1511 for x64-based Systems
MS16-145 Windows 10 Version 1607 for 32-bit Systems
MS16-145 Windows 10 Version 1607 for x64-based Systems
MS16-145 Windows 10 for 32-bit Systems
MS16-145 Windows 10 for x64-based Systems
MS16-145 Windows Server 2016 for x64-based Systems
The security update addresses the vulnerabilities by correcting how:
- The Windows Graphics component handles objects in the memory.
- The Windows GDI component handles objects in memory.
This security update is rated Critical for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-146 Windows
This security update addresses the vulnerability by correcting how Windows Uniscribe handles objects in memory.
This security update is rated Critical for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-147 Windows
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-148 Excel Services on Microsoft SharePoint Server 2007 Service Pack 3 (32-bit edition)
MS16-148 Excel Services on Microsoft SharePoint Server 2007 Service Pack 3 (64-bit edition)
MS16-148 Excel Services on Microsoft SharePoint Server 2010 Service Pack 2
MS16-148 Microsoft Excel 2007 Service Pack 3
MS16-148 Microsoft Excel 2010 Service Pack 2 (32-bit editions)
MS16-148 Microsoft Excel 2010 Service Pack 2 (64-bit editions)
MS16-148 Microsoft Excel 2013 Service Pack 1 (32-bit editions)
MS16-148 Microsoft Excel 2013 Service Pack 1 (64-bit editions)
MS16-148 Microsoft Excel 2016 (32-bit edition)
MS16-148 Microsoft Excel 2016 (64-bit edition)
MS16-148 Microsoft Excel Viewer
MS16-148 Microsoft Office 2007 Service Pack 3
MS16-148 Microsoft Office 2007 Service Pack 3
MS16-148 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-148 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-148 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-148 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS16-148 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS16-148 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS16-148 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS16-148 Microsoft Office 2013 Service Pack 1 (64-bit editions)
MS16-148 Microsoft Office 2016 (32-bit edition)
MS16-148 Microsoft Office 2016 (64-bit edition)
MS16-148 Microsoft Office Compatibility Pack Service Pack 3
MS16-148 Microsoft Office Compatibility Pack Service Pack 3
MS16-148 Microsoft Office Web Apps 2010 Service Pack 2
MS16-148 Microsoft Publisher 2010 Service Pack 2 (32-bit editions)
MS16-148 Microsoft Publisher 2010 Service Pack 2 (64-bit editions)
MS16-148 Microsoft Word 2007 Service Pack 3
MS16-148 Microsoft Word 2010 Service Pack 2 (32-bit editions)
MS16-148 Microsoft Word 2010 Service Pack 2 (64-bit editions)
MS16-148 Microsoft Word Viewer
MS16-148 Microsoft Word Viewer
MS16-148 Microsoft Word Viewer
MS16-148 Word Automation Services on Microsoft SharePoint Server 2010 Service Pack 2
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. (CVE-2016-7259)
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. (CVE-2016-7260)
The update addresses the vulnerabilities by correcting how the Windows kernel-mode driver handles objects in memory.
This security update is rated Critical for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-151 windows
Microsoft rates this vulnerability as important for all versions of Windows 10 and Windows Server 2016.
An Information Disclosure vulnerability exists in the Windows kernel (CVE-2016-7258).
The update addresses the vulnerability by changing how Kernel handles objects in memory.
The kernel fails to handle certain page faults for system calls. This allows the attacker to disclose information from one process to another.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-152 Windows 10 Version 1511 for 32-bit Systems
MS16-152 Windows 10 Version 1511 for x64-based Systems
MS16-152 Windows 10 Version 1607 for 32-bit Systems
MS16-152 Windows 10 Version 1607 for x64-based Systems
MS16-152 Windows 10 for 32-bit Systems
MS16-152 Windows 10 for x64-based Systems
MS16-152 Windows Server 2016 for x64-based Systems
This security update is rated Important for all supported releases of Microsoft Windows.
Refer to Microsoft Security Bulletin MS16-153 for further details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-153
This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows Server 2016.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-154
This security update is rated Important for Microsoft .NET Framework 4.6.2.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
ms16-155
These new vulnerability checks are included in Qualys vulnerability signature 2.3.495-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.