Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 76 vulnerabilities that were fixed in 14 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 14 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-136 Microsoft SQL Server 2012 for 32-bit Systems Service Pack 2
MS16-136 Microsoft SQL Server 2012 for 32-bit Systems Service Pack 3
MS16-136 Microsoft SQL Server 2012 for x64-based Systems Service Pack 2
MS16-136 Microsoft SQL Server 2012 for x64-based Systems Service Pack 3
MS16-136 Microsoft SQL Server 2014 Service Pack 1 for 32-bit Systems
MS16-136 Microsoft SQL Server 2014 Service Pack 1 for x64-based Systems
MS16-136 Microsoft SQL Server 2014 Service Pack 2 for 32-bit Systems
MS16-136 Microsoft SQL Server 2014 Service Pack 2 for x64-based Systems
MS16-136 Microsoft SQL Server 2016 for x64-based Systems
The update patches the vulnerabilities by:
modifying how Microsoft browsers handles objects in memory.
modifying how the Chakra JavaScript scripting engine handles objects in memory.
changing how the XSS filter in Microsoft browsers handle RegEx.
correcting how the Microsoft Edge parses HTTP responses.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-129 Windows 10 Version 1511 for 32-bit Systems
MS16-129 Windows 10 Version 1511 for x64-based Systems
MS16-129 Windows 10 Version 1607 for 32-bit Systems
MS16-129 Windows 10 Version 1607 for x64-based Systems
MS16-129 Windows 10 for 32-bit Systems
MS16-129 Windows 10 for x64-based Systems
MS16-129 Windows Server 2016 for x64-based Systems
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-130
This security update is rated Critical for Microsoft Windows Vista, Windows 7, Windows 8.1, Windows RT 8.1, Windows 10, and Windows Server 2016.
A remote code execution vulnerability exists when the Windows Animation Manager improperly handles objects in memory.
A memory corruption vulnerability exists when the Windows Media Foundation improperly handles objects in memory.
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts.
This security update is rated Critical for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-132
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-133 Excel Services on Microsoft SharePoint Server 2010 Service Pack 2
MS16-133 Microsoft Excel 2007 Service Pack 3
MS16-133 Microsoft Excel 2010 Service Pack 2 (32-bit editions)
MS16-133 Microsoft Excel 2010 Service Pack 2 (64-bit editions)
MS16-133 Microsoft Excel 2013 Service Pack 1 (32-bit editions)
MS16-133 Microsoft Excel 2013 Service Pack 1 (64-bit editions)
MS16-133 Microsoft Excel 2016 (32-bit edition)
MS16-133 Microsoft Excel 2016 (64-bit edition)
MS16-133 Microsoft Excel 2016 for Mac
MS16-133 Microsoft Excel 2016 for Mac
MS16-133 Microsoft Excel Viewer
MS16-133 Microsoft Excel for Mac 2011
MS16-133 Microsoft Office 2007 Service Pack 3
MS16-133 Microsoft Office 2007 Service Pack 3
MS16-133 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-133 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-133 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS16-133 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS16-133 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS16-133 Microsoft Office 2013 Service Pack 1 (64-bit editions)
MS16-133 Microsoft Office 2016 (32-bit edition)
MS16-133 Microsoft Office 2016 (64-bit edition)
MS16-133 Microsoft Office Compatibility Pack Service Pack 3
MS16-133 Microsoft Office Compatibility Pack Service Pack 3
MS16-133 Microsoft Office Web Apps 2010 Service Pack 2
MS16-133 Microsoft Office Web Apps Server 2013 Service Pack 1
MS16-133 Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions)
MS16-133 Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions)
MS16-133 Microsoft PowerPoint Viewer
MS16-133 Microsoft Word 2007
MS16-133 Microsoft Word 2010 Service Pack 2 (32-bit editions)
MS16-133 Microsoft Word 2010 Service Pack 2 (64-bit editions)
MS16-133 Microsoft Word 2013 Service Pack 1 (32-bit editions)
MS16-133 Microsoft Word 2013 Service Pack 1 (64-bit editions)
MS16-133 Microsoft Word 2016 for Mac
MS16-133 Microsoft Word Viewer
MS16-133 Microsoft Word for Mac 2011
MS16-133 Word Automation Services on Microsoft SharePoint Server 2010 Service Pack 2
MS16-133 Word Automation Services on Microsoft SharePoint Server 2013 Service Pack 1
Refer to Microsoft Security Bulletin MS16-134 for further details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-134
- An Information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. (CVE-2016-7214)
- Multiple elevation of privilege vulnerabilities exists when the Windows kernel-mode driver fails to properly handle objects in memory. (CVE-2016-7215, CVE-2016-7246, CVE-2016-7255)
- An information disclosure vulnerability exists in Windows when the Windows bowser.sys kernel-mode driver fails to properly handle objects in memory. (CVE-2016-7218)
This security update is rated Important for Microsoft Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 (and Server Core), Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, Windows 10 and Windows Server 2016.
Google Security and Microsoft Threat Intelligence reports that this critical vulnerability is actively being exploited in the wild.
Further details can be found under Disclosing vulnerabilities to protect users .
Microsoft statement can be found under Nov 1, 2016: Our commitment to our customer's security.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-135 Windows 10
MS16-135 Windows 10 Version 1511
MS16-135 Windows 10 Version 1511 x64
MS16-135 Windows 10 Version 1607
MS16-135 Windows 10 Version 1607 x64
MS16-135 Windows 10 x64
MS16-135 Windows 2008 R2 x64
MS16-135 Windows 7
MS16-135 Windows 7 x64
MS16-135 Windows 8.1
MS16-135 Windows 8.1 x64
MS16-135 Windows Server 2008
MS16-135 Windows Server 2008 x64
MS16-135 Windows Server 2012
MS16-135 Windows Server 2012 R2
MS16-135 Windows Server 2016 x64
MS16-135 Windows Vista
MS16-135 Windows Vista x64
This security update is rated Important for all supported releases of Microsoft Windows.
Refer to Microsoft Security Bulletin MS16-137 for further details.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-137
The security update addresses the vulnerabilities by correcting how the kernel API restricts access to these files.
This security update is rated Important for of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows Server 2016.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-138 Windows(Microsoft Virtual Hard Disk Driver)
Patches:
The following are links for downloading patches to fix these vulnerabilities:
/MS16-139
Affected Versions:-
This security update is rated Important for all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows Server 2016.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-140
The update addresses the vulnerabilities described in Adobe Security bulletin APSB16-37.
This security update is rated Critical for Adobe Flash Player in Internet Explorer 10, Internet Explorer 11 and Microsoft Edge.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-141(Adobe Flash Player in Internet Explorer)
Microsoft has released Cumulative Security Updates for Internet Explorer which addresses various vulnerabilities found in Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10) and Internet Explorer 11 (IE 11). The security updated is rated Critical for affected Windows Client for Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10) and Internet Explorer 11 (IE 11) and Moderate on affected Windows Servers.
The security update addresses the vulnerabilities by fixing:
1. How Internet Explorer modifies objects in memory.
2. XSS filter to handle to Regex in Internet Explorer.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-142 Windows 10 Version 1511 for 32-bit Systems
MS16-142 Windows 10 Version 1511 for x64-based Systems
MS16-142 Windows 10 Version 1607 for 32 bit Systems
MS16-142 Windows 10 Version 1607 for x64-based Systems
MS16-142 Windows 10 for 32-bit Systems
MS16-142 Windows 10 for x64-based Systems
MS16-142 Windows 7 for 32-bit Systems Service Pack 1Monthly Roll Up(Internet Explorer 11)
MS16-142 Windows 7 for 32-bit Systems Service Pack 1Security Only(Internet Explorer 11)
MS16-142 Windows 7 for x64-based Systems Service Pack 1Monthly Roll-Up(Internet Explorer 11)
MS16-142 Windows 7 for x64-based Systems Service Pack 1Security Only(Internet Explorer 11)
MS16-142 Windows 8.1 for 32-bit Systems Security Only(Internet Explorer 11)
MS16-142 Windows 8.1 for 32-bit SystemsMonthly Roll-Up(Internet Explorer 11)
MS16-142 Windows 8.1 for x64-based SystemsMonthly Roll-Up(Internet Explorer 11)
MS16-142 Windows 8.1 for x64-based SystemsSecurity Only(Internet Explorer 11)
MS16-142 Windows Server 2008 R2 for x64-based Systems Service Pack 1Monthly Roll-Up(Internet Explorer 11)
MS16-142 Windows Server 2008 R2 for x64-based Systems Service Pack 1Security Only(Internet Explorer 11)
MS16-142 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS16-142 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS16-142 Windows Server 2012 Monthly Roll-Up(Internet Explorer 10)
MS16-142 Windows Server 2012 Security Only(Internet Explorer 10)
MS16-142 Windows Server 2012 R2Monthly Roll-Up(Internet Explorer 11)
MS16-142 Windows Server 2012 R2Security Only(Internet Explorer 11)
MS16-142 Windows Vista Service Pack 2(Internet Explorer 9)
MS16-142 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
These new vulnerability checks are included in Qualys vulnerability signature 2.3.470-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.