Qualys Vulnerability R&D Lab has released new vulnerability checks in the Enterprise TruRisk Platform to protect organizations against 58 vulnerabilities that were fixed in 13 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 13 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
Multiple remote code execution vulnerabilities exist in Microsoft Office software when the Office software fails to properly handle objects in memory.
An elevation of privilege vulnerability exists when SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.
Microsoft has released a security update that addresses the vulnerabilities by:
- Correcting how Office handles objects in memory
- Providing a validly signed binary
- Helping to ensure that SharePoint Server properly sanitizes web requests
This security update is rated as Critical.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-015 Excel Services on Microsoft SharePoint Server 2007 Service Pack 3 (32-bit editions)
MS16-015 Excel Services on Microsoft SharePoint Server 2007 Service Pack 3 (64-bit editions)
MS16-015 Excel Services on Microsoft SharePoint Server 2010 Service Pack 2
MS16-015 Excel Services on Microsoft SharePoint Server 2013 Service Pack 1
MS16-015 Microsoft Excel 2007 Service Pack 3
MS16-015 Microsoft Excel 2010 Service Pack 2 (32-bit editions)
MS16-015 Microsoft Excel 2010 Service Pack 2 (64-bit editions)
MS16-015 Microsoft Excel 2013 Service Pack 1 (32-bit editions)
MS16-015 Microsoft Excel 2013 Service Pack 1 (64-bit editions)
MS16-015 Microsoft Excel 2016 (32-bit edition)
MS16-015 Microsoft Excel 2016 (64-bit edition)
MS16-015 Microsoft Excel Viewer
MS16-015 Microsoft Office 2007 Service Pack 3
MS16-015 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-015 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS16-015 Microsoft Office Compatibility Pack Service Pack 3
MS16-015 Microsoft Office Compatibility Pack Service Pack 3
MS16-015 Microsoft Office Web Apps 2010 Service Pack 2
MS16-015 Microsoft Office Web Apps Server 2013 Service Pack 1
MS16-015 Microsoft SharePoint Foundation 2013 Service Pack 1
MS16-015 Microsoft SharePoint Server 2013 Service Pack 1
MS16-015 Microsoft Word 2007 Service Pack 3
MS16-015 Microsoft Word 2010 Service Pack 2 (32-bit editions)
MS16-015 Microsoft Word 2010 Service Pack 2 (64-bit editions)
MS16-015 Microsoft Word 2013 Service Pack 1 (32-bit editions)
MS16-015 Microsoft Word 2013 Service Pack 1 (64-bit editions)
MS16-015 Microsoft Word 2016 (32-bit edition)
MS16-015 Microsoft Word 2016 (64-bit edition)
MS16-015 Microsoft Word Viewer
MS16-015 Word Automation Services on Microsoft SharePoint Server 2013 Service Pack 1
This security update resolves multiple vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.
This security update is rated Critical for Internet Explorer 9 (IE 9), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-009 Windows 10 Version 1511 for 32-bit Systems
MS16-009 Windows 10 Version 1511 for x64-based Systems
MS16-009 Windows 10 for 32-bit Systems
MS16-009 Windows 10 for x64-based Systems
MS16-009 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS16-009 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS16-009 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS16-009 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS16-009 Windows Server 2008 R2 for Itanium-based Systems Service Pack 2(Internet Explorer 11)
MS16-009 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS16-009 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS16-009 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS16-009 Windows Server 2012(Internet Explorer 10)
MS16-009 Windows Server 2012 R2(Internet Explorer 11)
MS16-009 Windows Vista Service Pack 2(Internet Explorer 9)
MS16-009 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow code execution with elevated privileges if a user views a specially crafted webpage using Microsoft Edge.
This security update is rated critical for Microsoft Edge on Windows 10.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-011 Windows 10 Version 1511 for 32-bit Systems
MS16-011 Windows 10 Version 1511 for x64-based Systems
MS16-011 Windows 10 for 32-bit Systems
MS16-011 Windows 10 for x64-based Systems
The update addresses the vulnerabilities by changing how memory is handled when API calls are made to the PDF Library, and by modifying how Windows Reader parses files.
This security update is rated Critical for all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, and Windows 10.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-012 Windows 10 for 32-bit Systems
MS16-012 Windows 10 for x64-based Systems
MS16-012 Windows 8.1 for 32-bit Systems
MS16-012 Windows 8.1 for x64-based Systems
MS16-012 Windows Server 2012
MS16-012 Windows Server 2012 R2
The update addresses the vulnerability by modifying how Windows Journal parses Journal files.
This security update is rated Critical for all supported editions of Windows Vista, Windows 7, Windows 8.1, and Windows 10, for all supported non-Itanium editions of Windows Server 2008 and Windows Server 2008 R2.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-013 Windows 10 Version 1511 for 32-bit Systems
MS16-013 Windows 10 Version 1511 for x64-based Systems
MS16-013 Windows 10 for 32-bit Systems
MS16-013 Windows 10 for x64-based Systems
MS16-013 Windows 7 for 32-bit Systems Service Pack 1
MS16-013 Windows 7 for x64-based Systems Service Pack 1
MS16-013 Windows 8.1 for 32-bit Systems
MS16-013 Windows 8.1 for x64-based Systems
MS16-013 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-013 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-013 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-013 Windows Server 2012
MS16-013 Windows Server 2012 R2
MS16-013 Windows Vista Service Pack 2
MS16-013 Windows Vista x64 Edition Service Pack 2
- Multiple remote code execution vulnerabilities exist when Windows improperly validates input before loading dynamic link library (DLL) files.
- A denial of service vulnerability exists in Windows when Microsoft Sync Framework processes specially crafted input that uses the change batch structure.
- A security feature bypass exists in Windows when Kerberos fails to check the password change of a user signing into a workstation.
This security update is rated Important for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-014 Windows 10 Version 1511 for 32-bit Systems
MS16-014 Windows 10 Version 1511 for x64-based Systems
MS16-014 Windows 10 for 32-bit Systems
MS16-014 Windows 10 for x64-based Systems
MS16-014 Windows 7 for 32-bit Systems Service Pack 1
MS16-014 Windows 7 for 32-bit Systems Service Pack 1
MS16-014 Windows 7 for x64-based Systems Service Pack 1
MS16-014 Windows 7 for x64-based Systems Service Pack 1
MS16-014 Windows 8.1 for 32-bit Systems
MS16-014 Windows 8.1 for 32-bit Systems
MS16-014 Windows 8.1 for 32-bit Systems
MS16-014 Windows 8.1 for x64-based Systems
MS16-014 Windows 8.1 for x64-based Systems
MS16-014 Windows 8.1 for x64-based Systems
MS16-014 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-014 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-014 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-014 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-014 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-014 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-014 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-014 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-014 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-014 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-014 Windows Server 2012
MS16-014 Windows Server 2012
MS16-014 Windows Server 2012 R2
MS16-014 Windows Server 2012 R2
MS16-014 Windows Server 2012 R2
MS16-014 Windows Vista Service Pack 2
MS16-014 Windows Vista Service Pack 2
MS16-014 Windows Vista x64 Edition Service Pack 2
MS16-014 Windows Vista x64 Edition Service Pack 2
Workaround:
Disable WebDAV driver
Interactive Method:
a. Open Registry Editor.
b. Locate and then click the following registry sub key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\MRxDAV
c. Click the File menu and then select Export.
d. In the Export Registry File window type MRxDAV_configuration_backup.reg and then click Save.
e. In Registry Editor, double-click the DWORD value named Start, change the Value data field to 4, and then click OK.
f. Exit Registry Editor and then restart the system.
Using Managed Deployment Script:
a. Use the following managed deployment script command to make a backup copy of the WebDAV registry keys:
regedit /e MRxDAV_configuration_backup.reg HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MRxDAV
b. Save the following text to a file with a .REG extension
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MRxDAV]
Start=dword:00000004
c. Use the following command on the target system to run the registry script created in the previous step:
Regedit /s Disable_MRxDAV.reg
d. Restart the system.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-016 Windows 10 Version 1511 for 32-bit Systems
MS16-016 Windows 10 Version 1511 for x64-based Systems
MS16-016 Windows 10 for 32-bit Systems
MS16-016 Windows 10 for x64-based Systems
MS16-016 Windows 7 for 32-bit Systems Service Pack 1
MS16-016 Windows 7 for x64-based Systems Service Pack 1
MS16-016 Windows 8.1 for 32-bit Systems
MS16-016 Windows 8.1 for x64-based Systems
MS16-016 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-016 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-016 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-016 Windows Server 2012
MS16-016 Windows Server 2012 R2
MS16-016 Windows Vista Service Pack 2
MS16-016 Windows Vista x64 Edition Service Pack 2
The vulnerability could allow elevation of privilege if an authenticated attacker logs on to the target system using RDP and sends specially crafted data over the connection. The security update addresses the vulnerability by correcting how RDP handles objects in memory.
This security update is rated Important for all supported editions of Windows 7, Windows Server 2012, Window 8.1, Windows Server 2012 R2, and Windows 10.
Workaround:
Disable RDP
To disable RDP using Group Policy
a. Open Group Policy
b. In Computer Configuration, Administrative Templates, Windows Components, Terminal Services, double-click the Allows users to connect remotely using Terminal Services setting.
c. Do one of the following:
1. To enable Remote Desktop, click Enabled.
2. To disable Remote Desktop, click Disabled.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-017 Windows 10 for 32-bit Systems
MS16-017 Windows 10 for x64-based Systems
MS16-017 Windows 7 for 32-bit Systems Service Pack 1
MS16-017 Windows 7 for x64-based Systems Service Pack 1
MS16-017 Windows 8.1 for 32-bit Systems
MS16-017 Windows 8.1 for x64-based Systems
MS16-017 Windows Server 2012
MS16-017 Windows Server 2012 R2
This security update is rated important for all supported editions of Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows 10 Version 1511.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-018 Windows 10 Version 1511 for 32-bit Systems
MS16-018 Windows 10 Version 1511 for x64-based Systems
MS16-018 Windows 10 for 32-bit Systems
MS16-018 Windows 10 for x64-based Systems
MS16-018 Windows 7 for 32-bit Systems Service Pack 1
MS16-018 Windows 7 for x64-based Systems Service Pack 1
MS16-018 Windows 8.1 for 32-bit Systems
MS16-018 Windows 8.1 for x64-based Systems
MS16-018 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-018 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-018 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-018 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-018 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-018 Windows Server 2012
MS16-018 Windows Server 2012 R2
MS16-018 Windows Vista Service Pack 2
MS16-018 Windows Vista x64 Edition Service Pack 2
- A denial of service vulnerability exists when .NET Framework fails to properly handle certain Extensible Stylesheet Language Transformations (XSLT.
- An information disclosure vulnerability exists in Microsoft .NET Framework that is caused when .NETs Windows Forms (WinForms) improperly handles icon data.
This security update is rated Important for Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6, and Microsoft .NET Framework 4.6.1 on affected releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-019 Windows 10 Version 1511 for 32-bit Systems
MS16-019 Windows 10 Version 1511 for x64-based Systems
MS16-019 Windows 10 for 32-bit Systems
MS16-019 Windows 10 for x64-based Systems
MS16-019 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS16-019 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS16-019 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS16-019 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS16-019 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.5.2)
MS16-019 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows RT 8.1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows RT 8.1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows RT 8.1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows RT 8.1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-019 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-019 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-019 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-019 Windows Server 2012(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2012(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012 R2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012 R2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012 R2(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2012 R2(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-019 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-019 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Vista Service Pack 2(Microsoft .NET Framework 4.6)
MS16-019 Windows Vista Service Pack 2(Microsoft .NET Framework 4.6)
MS16-019 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-019 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-019 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.6)
MS16-019 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.6)
The update addresses the vulnerability by adding additional verification checks in ADFS.
This security update is rated Important for ADFS 3.0 when installed on x64-based editions of Windows Server 2012 R2.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-020 Windows Server 2012 R2(Active Directory Federation Services 3.0)
MS16-020 Windows Server 2012 R2 (Server Core installation)(Active Directory Federation Services 3.0)
The security update addresses the vulnerability by changing how Network Policy Servers parse username queries when implementing RADIUS.
Affected Versions:
This security update is rated Important for all supported editions of Windows Server 2008, Windows Server 2008 R2, Windows Server 2012 and Windows Server 2012 R2.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-021 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-021 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-021 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-021 Windows Server 2012
MS16-021 Windows Server 2012 R2
Affected Software:
Adobe Flash Player in Internet Explorer 10, Internet Explorer 11 and Microsoft Edge
Workaround:
1 Prevent Adobe Flash Player from running
2 Prevent Adobe Flash Player from running on Internet Explorer through Group Policy
3 Prevent Adobe Flash Player from running in Office 2010 on affected systems
4 Prevent ActiveX controls from running in Office 2007 and Office 2010
5 Set Internet and Local intranet security zone settings to "High" to block ActiveX Controls and Active Scripting in these zones
6 Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone
7 Add sites that you trust to the Internet Explorer Trusted sites zone
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-022
These new vulnerability checks are included in Qualys vulnerability signature 2.3.228-3. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Enterprise TruRisk Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.