Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 64 vulnerabilities that were fixed in 11 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 11 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
The update addresses the vulnerability by correcting how Windows Secure Kernel Mode handles objects in memory to prevent information disclosure.
This security update is rated Important for all supported releases of Windows 10.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-089 Windows
The update addresses the vulnerabilities by:
Modifying how Internet Explorer handles objects in memory
Modifying how the JScript and VBScript scripting engines handle objects in memory
Correcting how the Microsoft Browser XSS Filter validates JavaScript
Changing how certain functions in Internet Explorer handle objects in memory
Correcting how Internet Explorer parses HTML
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-084 Windows 10 Version 1511 for 32-bit Systems
MS16-084 Windows 10 Version 1511 for x64-based Systems
MS16-084 Windows 10 for 32-bit Systems
MS16-084 Windows 10 for x64-based Systems
MS16-084 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS16-084 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS16-084 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS16-084 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS16-084 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS16-084 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS16-084 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS16-084 Windows Server 2012(Internet Explorer 10)
MS16-084 Windows Server 2012 R2(Internet Explorer 11)
MS16-084 Windows Vista Service Pack 2(Internet Explorer 9)
MS16-084 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
The update addresses the vulnerabilities by:
Ensuring that Microsoft Edge properly implements Address Space Layout Randomization (ASLR)
Modifying how Microsoft Edge handles objects in memory
Modifying how the Chakra JavaScript scripting engine handles objects in memory
Changing the way certain functions handle objects in memory
Fixing how the Microsoft Browser XSS Filter validates JavaScript
Correcting how the Microsoft browser parses HTTP responses
Correcting how Microsoft Edge parses HTML
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-085 Windows 10 Version 1511 for 32-bit Systems
MS16-085 Windows 10 Version 1511 for x64-based Systems
MS16-085 Windows 10 for 32-bit Systems
MS16-085 Windows 10 for x64-based Systems
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-086 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Server Core installation)(JScript 5.8 and VBScript 5.8)
MS16-086 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)(VBScript 5.7)
MS16-086 Windows Server 2008 for Itanium-based Systems Service Pack 2(VBScript 5.7)
MS16-086 Windows Server 2008 for x32-bit Systems Service Pack 2(VBScript 5.7)
MS16-086 Windows Server 2008 for x64-based Systems Service Pack 2(VBScript 5.7)
MS16-086 Windows Server 2008 for x64-based Systems Service Pack 2(Server Core installation)(VBScript 5.7)
MS16-086 Windows Vista Service Pack 2(VBScript 5.7)
MS16-086 Windows Vista x64 Edition Service Pack 2(VBScript 5.7)
The security update resolves the following issues.
- A remote code execution vulnerability exists when the Windows Print Spooler service does not properly validate print drivers while installing a printer from servers. (CVE-2016-3238)
- An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. (CVE-2016-3239)
Affected Software:
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
Windows 8.1 for 32-bit Systems
Windows 8.1 for 64-bit Systems
Windows Server 2012
Windows Server 2012 R2
Windows RT 8.1
Windows 10 for 32-bit Systems
Windows 10 for 64-bit Systems
Windows 10 Version 1511 for 32-bit Systems
Windows 10 Version 1511 for 64-bit Systems
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2 (Server Core installation)
This security update is rated Critical for all supported editions.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-087 Windows 10 Version 1511 for 32-bit Systems
MS16-087 Windows 10 Version 1511 for x64-based Systems
MS16-087 Windows 10 for 32-bit Systems
MS16-087 Windows 10 for x64-based Systems
MS16-087 Windows 7 for 32-bit Systems Service Pack 1
MS16-087 Windows 7 for x64-based Systems Service Pack 1
MS16-087 Windows 8.1 for 32-bit Systems
MS16-087 Windows 8.1 for x64-based Systems
MS16-087 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-087 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-087 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-087 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-087 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-087 Windows Server 2012
MS16-087 Windows Server 2012 R2
MS16-087 Windows Vista Service Pack 2
MS16-087 Windows Vista x64 Edition Service Pack 2
A vulnerability exists when Microsoft Office fails to properly handle XLA files.
Microsoft has released a security update that addresses the vulnerabilities by correcting how:
- Office handles objects in memory
- Certain functions handle objects in memory
- Windows validates input before loading libraries
Workaround:
1) Use Microsoft Office File Block policy to prevent Office from opening RTF documents from unknown or untrusted sources
Impact of workaround #1: Users who have configured the File Block policy and have not configured a special "exempt directory" will be unable to open documents saved in the RTF format.
2) Prevent Word from loading RTF files
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-088 Microsoft Excel 2007 Service Pack 3
MS16-088 Microsoft Excel 2010 Service Pack 2 (32-bit editions)
MS16-088 Microsoft Excel 2010 Service Pack 2 (64-bit editions)
MS16-088 Microsoft Excel 2013 Service Pack 1 (32-bit editions)
MS16-088 Microsoft Excel 2013 Service Pack 1 (64-bit editions)
MS16-088 Microsoft Excel 2016 (32-bit edition)
MS16-088 Microsoft Excel 2016 (64-bit edition)
MS16-088 Microsoft Excel 2016 for Mac
MS16-088 Microsoft Excel Viewer
MS16-088 Microsoft Excel for Mac 2011
MS16-088 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-088 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS16-088 Microsoft Office Compatibility Pack Service Pack 3
MS16-088 Microsoft Office Compatibility Pack Service Pack 3
MS16-088 Microsoft Office Web Apps 2010 Service Pack 2
MS16-088 Microsoft Office Web Apps Server 2013 Service Pack 1
MS16-088 Microsoft Outlook 2010 Service Pack 2 (32-bit editions)
MS16-088 Microsoft Outlook 2010 Service Pack 2 (64-bit editions)
MS16-088 Microsoft Outlook 2013 Service Pack 1 (32-bit editions)
MS16-088 Microsoft Outlook 2013 Service Pack 1 (64-bit editions)
MS16-088 Microsoft Outlook 2016 (32-bit edition)
MS16-088 Microsoft Outlook 2016 (64-bit edition)
MS16-088 Microsoft PowerPoint 2010 Service Pack 2 (32-bit editions)
MS16-088 Microsoft PowerPoint 2010 Service Pack 2 (64-bit editions)
MS16-088 Microsoft PowerPoint 2013 Service Pack 1 (32-bit editions)
MS16-088 Microsoft PowerPoint 2013 Service Pack 1 (64-bit editions)
MS16-088 Microsoft SharePoint Foundation 2010 Service Pack 1
MS16-088 Microsoft SharePoint Foundation 2013 Service Pack 1
MS16-088 Microsoft SharePoint Server 2016
MS16-088 Microsoft SharePoint Server 2016
MS16-088 Microsoft Word 2007 Service Pack 3
MS16-088 Microsoft Word 2010 Service Pack 2 (32-bit editions)
MS16-088 Microsoft Word 2010 Service Pack 2 (64-bit editions)
MS16-088 Microsoft Word 2013 Service Pack 1 (32-bit editions)
MS16-088 Microsoft Word 2013 Service Pack 1 (64-bit editions)
MS16-088 Microsoft Word 2016 (32-bit edition)
MS16-088 Microsoft Word 2016 (64-bit edition)
MS16-088 Microsoft Word 2016 for Mac
MS16-088 Microsoft Word Viewer
MS16-088 Microsoft Word Viewer
MS16-088 Microsoft Word for Mac 2011
MS16-088 Office Online Server
MS16-088 Word Automation Services on Microsoft SharePoint Server 2010 Service Pack 2
MS16-088 Word Automation Services on Microsoft SharePoint Server 2013 Service Pack 1
- Elevation of privilege vulnerabilities exist when the Windows kernel-mode driver fails to properly handle objects in memory. - A Win32k information disclosure vulnerability exists when the Windows GDI component improperly discloses kernel memory addresses.
The security update addresses the vulnerabilities by correcting how the Windows kernel-mode driver handles objects in memory and the Windows GDI component handles objects in memory.
This security update is rated Important for all supported releases of Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-090 Windows 10 Version 1511 for 32-bit Systems
MS16-090 Windows 10 Version 1511 for x64-based Systems
MS16-090 Windows 10 for 32-bit Systems
MS16-090 Windows 10 for x64-based Systems
MS16-090 Windows 7 for 32-bit Systems Service Pack 1
MS16-090 Windows 7 for x64-based Systems Service Pack 1
MS16-090 Windows 8.1 for 32-bit Systems
MS16-090 Windows 8.1 for x64-based Systems
MS16-090 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-090 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-090 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-090 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-090 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-090 Windows Server 2012
MS16-090 Windows Server 2012 R2
MS16-090 Windows Vista Service Pack 2
MS16-090 Windows Vista x64 Edition Service Pack 2
This security update is rated Important for Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6, and Microsoft .NET Framework 4.6.1 on affected releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-091 Windows 10 Version 1511 for 32-bit Systems
MS16-091 Windows 10 Version 1511 for x64-based Systems
MS16-091 Windows 10 for 32-bit Systems
MS16-091 Windows 10 for x64-based Systems
MS16-091 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-091 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-091 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-091 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-091 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS16-091 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.5.2)
MS16-091 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS16-091 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.5.2)
MS16-091 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-091 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-091 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS16-091 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-091 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-091 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-091 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-091 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-091 Windows Server 2012(Microsoft .NET Framework 3.5)
MS16-091 Windows Server 2012(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2012(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-091 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS16-091 Windows Server 2012 R2(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2012 R2(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-091 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-091 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-091 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Vista Service Pack 2(Microsoft .NET Framework 4.6)
MS16-091 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-091 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-091 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.6)
A security feature bypass vulnerability exists in the Windows kernel that could allow an attacker to exploit time of check time of use (TOCTOU) issues in file path-based checks from a low integrity application. An attacker who successfully exploited this vulnerability could potentially modify files outside of a low integrity level application.
This security update is rated Important for all supported releases of Microsoft Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-092 Windows 10 Version 1511 for 32-bit Systems
MS16-092 Windows 10 Version 1511 for x64-based Systems
MS16-092 Windows 10 for 32-bit Systems
MS16-092 Windows 10 for x64-based Systems
MS16-092 Windows 8.1 for 32-bit Systems
MS16-092 Windows 8.1 for 32-bit Systems
MS16-092 Windows 8.1 for x64-based Systems
MS16-092 Windows 8.1 for x64-based Systems
MS16-092 Windows Server 2012
MS16-092 Windows Server 2012
MS16-092 Windows Server 2012 R2
MS16-092 Windows Server 2012 R2
The update addresses the vulnerabilities described in Adobe Security bulletin APSB16-25.
This security update is rated Critical for Adobe Flash Player in Internet Explorer 10, Internet Explorer 11 and Microsoft Edge.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-093 Windows 8.1 for 32-bit Systems(Adobe Flash Player)
MS16-093 Windows 8.1 for x64-based Systems(Adobe Flash Player)
MS16-093 Windows Server 2012(Adobe Flash Player)
MS16-093 Windows Server 2012 R2(Adobe Flash Player)
The security update addresses the vulnerability by blacklisting affected policies.
This security update is rated Important for all supported editions of Windows 8.1, Windows RT 8.1, Windows Server 2012, Windows Server 2012 R2, and Windows 10.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-094 Windows 10 Version 1511 for 32-bit Systems
MS16-094 Windows 10 Version 1511 for x64-based Systems
MS16-094 Windows 10 for 32-bit Systems
MS16-094 Windows 10 for x64-based Systems
MS16-094 Windows 8.1 for 32-bit Systems
MS16-094 Windows 8.1 for x64-based Systems
MS16-094 Windows Server 2012
MS16-094 Windows Server 2012 R2
These new vulnerability checks are included in Qualys vulnerability signature 2.3.378-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.