Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 40 vulnerabilities that were fixed in 16 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 16 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
The security update addresses the vulnerabilities by correcting how:
- The Windows Graphics Component (GDI32.dll) handles objects in memory
- The Windows kernel-mode driver (Win32k.sys) handles objects in memory and helps to prevent unintended elevation of privilege from user-mode
- The Adobe Type Manager Font Driver (ATMFD.dll) handles objects in memory
This security update is rated Important for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-074 Windows 10 Version 1511 for 32-bit Systems
MS16-074 Windows 10 Version 1511 for x64-based Systems
MS16-074 Windows 10 for 32-bit Systems
MS16-074 Windows 10 for x64-based Systems
MS16-074 Windows 7 for 32-bit Systems Service Pack 1
MS16-074 Windows 7 for 32-bit Systems Service Pack 1
MS16-074 Windows 7 for x64-based Systems Service Pack 1
MS16-074 Windows 7 for x64-based Systems Service Pack 1
MS16-074 Windows 8.1 for 32-bit Systems
MS16-074 Windows 8.1 for 32-bit Systems
MS16-074 Windows 8.1 for x64-based Systems
MS16-074 Windows 8.1 for x64-based Systems
MS16-074 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-074 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-074 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-074 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-074 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-074 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-074 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-074 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-074 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-074 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-074 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-074 Windows Server 2012
MS16-074 Windows Server 2012
MS16-074 Windows Server 2012 R2
MS16-074 Windows Server 2012 R2
MS16-074 Windows Vista Service Pack 2
MS16-074 Windows Vista Service Pack 2
MS16-074 Windows Vista x64 Edition Service Pack 2
MS16-074 Windows Vista x64 Edition Service Pack 2
This security update resolves multiple vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.
This security update is rated Critical for Internet Explorer 9 (IE 9), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-063 Windows 10 Version 1511 for 32-bit Systems
MS16-063 Windows 10 Version 1511 for x64-based Systems
MS16-063 Windows 10 for 32-bit Systems
MS16-063 Windows 10 for x64-based Systems
MS16-063 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS16-063 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS16-063 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS16-063 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS16-063 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS16-063 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS16-063 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS16-063 Windows Server 2012(Internet Explorer 10)
MS16-063 Windows Server 2012 R2(Internet Explorer 11)
MS16-063 Windows Vista Service Pack 2(Internet Explorer 9)
MS16-063 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow code execution with elevated privileges if a user views a specially crafted webpage using Microsoft Edge.
This security update is rated critical for Microsoft Edge on Windows 10.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-068 Windows 10 Version 1511 for 32-bit Systems
MS16-068 Windows 10 Version 1511 for x64-based Systems
MS16-068 Windows 10 for 32-bit Systems
MS16-068 Windows 10 for x64-based Systems
This security update is rated Critical for affected versions of the VBScript scripting engine on supported editions of Windows Vista, Windows Server 2008, and Server Core installations of Windows Server 2008 R2.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-069 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Server Core installation)(JScript 5.8 and VBScript 5.8)
MS16-069 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)(VBScript 5.7)
MS16-069 Windows Server 2008 for Itanium-based Systems Service Pack 2(VBScript 5.7)
MS16-069 Windows Server 2008 for x32-bit Systems Service Pack 2(VBScript 5.7)
MS16-069 Windows Server 2008 for x64-based Systems Service Pack 2(VBScript 5.7)
MS16-069 Windows Server 2008 for x64-based Systems Service Pack 2(Server Core installation)(VBScript 5.7)
MS16-069 Windows Vista Service Pack 2(VBScript 5.7)
MS16-069 Windows Vista x64 Edition Service Pack 2(VBScript 5.7)
Microsoft has released a security update that addresses the vulnerabilities by correcting how:
Office handles objects in memory
Certain functions handle objects in memory
Windows validates input before loading libraries
Workaround:
1) Use Microsoft Office File Block policy to prevent Office from opening RTF documents from unknown or untrusted sources
Impact of workaround #1: Users who have configured the File Block policy and have not configured a special "exempt directory" as discussed in Microsoft Knowledge Base Article 922849 will be unable to open documents saved in the RTF format.
2) Prevent Word from loading RTF files
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-070 Microsoft Excel 2007 Service Pack 3
MS16-070 Microsoft Excel 2010 Service Pack 2 (32-bit editions)
MS16-070 Microsoft Excel 2010 Service Pack 2 (64-bit editions)
MS16-070 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-070 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS16-070 Microsoft Office 2016 (32-bit edition)
MS16-070 Microsoft Office 2016 (64-bit edition)
MS16-070 Microsoft Office Compatibility Pack Service Pack 3
MS16-070 Microsoft Office Compatibility Pack Service Pack 3
MS16-070 Microsoft Office OneNote 2016 (32-bit edition)
MS16-070 Microsoft Office OneNote 2016 (64-bit edition)
MS16-070 Microsoft Office Web Apps 2010 Service Pack 2
MS16-070 Microsoft Office Web Apps Server 2013 Service Pack 1
MS16-070 Microsoft Visio 2007 Service Pack 3
MS16-070 Microsoft Visio 2010 Service Pack 2 (32-bit editions)
MS16-070 Microsoft Visio 2010 Service Pack 2 (64-bit editions)
MS16-070 Microsoft Visio 2013 Service Pack 1 (32-bit editions)
MS16-070 Microsoft Visio 2013 Service Pack 1 (64-bit editions)
MS16-070 Microsoft Visio 2016 (32-bit edition)
MS16-070 Microsoft Visio 2016 (64-bit edition)
MS16-070 Microsoft Visio Viewer 2007 Service Pack 3
MS16-070 Microsoft Visio Viewer 2010 (32-bit Edition)
MS16-070 Microsoft Visio Viewer 2010 (64-bit Edition)
MS16-070 Microsoft Word 2007 Service Pack 3
MS16-070 Microsoft Word 2010 Service Pack 2 (32-bit editions)
MS16-070 Microsoft Word 2010 Service Pack 2 (64-bit editions)
MS16-070 Microsoft Word 2013 Service Pack 1 (32-bit editions)
MS16-070 Microsoft Word 2013 Service Pack 1 (64-bit editions)
MS16-070 Microsoft Word 2016 (32-bit edition)
MS16-070 Microsoft Word 2016 (64-bit edition)
MS16-070 Microsoft Word 2016 for Mac
MS16-070 Microsoft Word Viewer
MS16-070 Microsoft Word for Mac 2011
MS16-070 Office Online Server
MS16-070 Word Automation Services on Microsoft SharePoint Server 2010 Service Pack 2
MS16-070 Word Automation Services on Microsoft SharePoint Server 2013 Service Pack 1
This security update is rated Critical for all supported editions of Windows Server 2012.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-071 Windows Server 2012(DNS)
MS16-071 Windows Server 2012 (Server Core installation)(DNS)
MS16-071 Windows Server 2012 R2(DNS)
MS16-071 Windows Server 2012 R2 (Server Core installation)(DNS)
The security update addresses the vulnerability by enforcing Kerberos authentication for certain calls over LDAP.
This security update is rated Important for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-072 Windows 10 Version 1511 for 32-bit Systems
MS16-072 Windows 10 Version 1511 for x64-based Systems
MS16-072 Windows 10 for 32-bit Systems
MS16-072 Windows 10 for x64-based Systems
MS16-072 Windows 7 for 32-bit Systems Service Pack 1
MS16-072 Windows 7 for x64-based Systems Service Pack 1
MS16-072 Windows 8.1 for 32-bit Systems
MS16-072 Windows 8.1 for x64-based Systems
MS16-072 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-072 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-072 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-072 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-072 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-072 Windows Server 2012
MS16-072 Windows Server 2012 R2
MS16-072 Windows Vista Service Pack 2
MS16-072 Windows Vista x64 Edition Service Pack 2
Microsoft has released a security update that addresses the vulnerabilities by correcting how the Windows kernel-mode driver handles objects in memory, and by correcting VPCI memory handling.
This security update is rated Important for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-073 Windows 10 Version 1511 for 32-bit Systems
MS16-073 Windows 10 Version 1511 for x64-based Systems
MS16-073 Windows 10 for 32-bit Systems
MS16-073 Windows 10 for x64-based Systems
MS16-073 Windows 7 for 32-bit Systems Service Pack 1
MS16-073 Windows 7 for x64-based Systems Service Pack 1
MS16-073 Windows 8.1 for 32-bit Systems
MS16-073 Windows 8.1 for x64-based Systems
MS16-073 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-073 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-073 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-073 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-073 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-073 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-073 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-073 Windows Server 2012
MS16-073 Windows Server 2012
MS16-073 Windows Server 2012
MS16-073 Windows Server 2012 R2
MS16-073 Windows Server 2012 R2
MS16-073 Windows Server 2012 R2
MS16-073 Windows Vista Service Pack 2
MS16-073 Windows Vista x64 Edition Service Pack 2
An elevation of privilege vulnerability exists in the Microsoft Server Message Block (SMB) when an attacker forwards an authentication request intended for another service running on the same machine.
This security update is rated Important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1 and Windows 10.
Workaround:
Enable Extended Protection for Authentication (EPA) for SMB server.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-075 Windows 10 Version 1511 for 32-bit Systems
MS16-075 Windows 10 Version 1511 for x64-based Systems
MS16-075 Windows 10 for 32-bit Systems
MS16-075 Windows 10 for x64-based Systems
MS16-075 Windows 7 for 32-bit Systems Service Pack 1
MS16-075 Windows 7 for x64-based Systems Service Pack 1
MS16-075 Windows 8.1 for 32-bit Systems
MS16-075 Windows 8.1 for x64-based Systems
MS16-075 Windows RT 8.1
MS16-075 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-075 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-075 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-075 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-075 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-075 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-075 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-075 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-075 Windows Server 2012
MS16-075 Windows Server 2012
MS16-075 Windows Server 2012 R2
MS16-075 Windows Server 2012 R2
MS16-075 Windows Vista Service Pack 2
MS16-075 Windows Vista x64 Edition Service Pack 2
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-076 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-076 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-076 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-076 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-076 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-076 Windows Server 2012
MS16-076 Windows Server 2012
MS16-076 Windows Server 2012 R2
MS16-076 Windows Server 2012 R2
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-077 Windows 10 Version 1511 for 32-bit Systems
MS16-077 Windows 10 Version 1511 for x64-based Systems
MS16-077 Windows 10 for 32-bit Systems
MS16-077 Windows 10 for x64-based Systems
MS16-077 Windows 7 for 32-bit Systems Service Pack 1
MS16-077 Windows 7 for x64-based Systems Service Pack 1
MS16-077 Windows 8.1 for 32-bit Systems
MS16-077 Windows 8.1 for x64-based Systems
MS16-077 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-077 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-077 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-077 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-077 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-077 Windows Server 2012
MS16-077 Windows Server 2012 R2
MS16-077 Windows Vista Service Pack 2
MS16-077 Windows Vista x64 Edition Service Pack 2
The security update addresses the vulnerability by correcting how the Windows Diagnostics Hub Standard Collector Service sanitizes input.
This security update is rated Important for all supported editions of Microsoft Windows 10
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-078 Windows 10 Version 1511 for 32-bit Systems
MS16-078 Windows 10 Version 1511 for x64-based Systems
MS16-078 Windows 10 for 32-bit Systems
MS16-078 Windows 10 for x64-based Systems
The security update addresses the vulnerabilities by correcting the way that Microsoft Exchange parses HTML messages.
This security update is rated Important for all supported editions of Microsoft Exchange Server 2007, Microsoft Exchange Server 2010, Microsoft Exchange Server 2013, and Microsoft Exchange Server 2016.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-079 Microsoft Exchange Server 2007 Service Pack 3
MS16-079 Microsoft Exchange Server 2010 Service Pack 3
MS16-079 Microsoft Exchange Server 2013 Cumulative Update 11
MS16-079 Microsoft Exchange Server 2013 Cumulative Update 12
MS16-079 Microsoft Exchange Server 2013 Service Pack 1
MS16-079 Microsoft Exchange Server 2016
MS16-079 Microsoft Exchange Server 2016 Cumulative Update 1
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-080 Windows 10 Version 1511 for 32-bit Systems
MS16-080 Windows 10 Version 1511 for x64-based Systems
MS16-080 Windows 10 for 32-bit Systems
MS16-080 Windows 10 for x64-based Systems
MS16-080 Windows 8.1 for 32-bit Systems
MS16-080 Windows 8.1 for x64-based Systems
MS16-080 Windows Server 2012
MS16-080 Windows Server 2012 R2
A denial of service vulnerability exists in Active Directory when an authenticated attacker creates multiple machine accounts.
This security update is rated Important.
Affected Versions:
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2012
Windows Server 2012 R2
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-081 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-081 Windows Server 2012
MS16-081 Windows Server 2012 R2
This vulnerability occurs when the Windows Search component fails to properly handle certain objects in memory.
This security update is rated Important.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-082 Windows 10 Version 1511 for 32-bit Systems
MS16-082 Windows 10 Version 1511 for x64-based Systems
MS16-082 Windows 10 for 32-bit Systems
MS16-082 Windows 10 for x64-based Systems
MS16-082 Windows 7 for 32-bit Systems Service Pack 1
MS16-082 Windows 7 for x64-based Systems Service Pack 1
MS16-082 Windows 8.1 for 32-bit Systems
MS16-082 Windows 8.1 for x64-based Systems
MS16-082 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-082 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-082 Windows Server 2012
MS16-082 Windows Server 2012 R2
These new vulnerability checks are included in Qualys vulnerability signature 2.3.346-7. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.