MS16-130 - Critical: Security Update for Microsoft Windows (3199172) - Version: 1.1

Severity Rating: CriticalRevision Note: V1.1 (November 23, 2016): Updated the vulnerability description for CVE-2016-7222. This is an informational change only.Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if a locally authenticated attacker runs a specially crafted application.

Posted on: 23 November 2016 | 12:00 pm

MS16-140 - Important: Security Update for Boot Manager (3193479) - Version: 1.1

Severity Rating: ImportantRevision Note: V1.1 (November 23, 2016): Revised bulletin to announce a detection change for certain servers running Windows Servers 2012, Windows Server 2012 R2, and Windows Server 2016. Affected servers will not automatically receive the security update. For more information about the servers affected by this detection change, see Knowledge Base Article 3193479Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker installs an affected boot policy and bypasses Windows security features.

Posted on: 23 November 2016 | 12:00 pm

MS16-131 - Critical: Security Update for Microsoft Video Control (3199151) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (November 8, 2016): Bulletin published.Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution when Microsoft Video Control fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. However, an attacker must first convince a user to open either a specially crafted file or a program from either a webpage or an email message.

Posted on: 8 November 2016 | 12:00 pm

MS16-035 - Important: Security Update for .NET Framework to Address Security Feature Bypass (3141780) - Version: 2.6

Severity Rating: ImportantRevision Note: V2.6 (November 8, 2016): Revised bulletin to announce that a detection change was made to account for .NET Framework 4.6.1 hotfix rollup customers who were not being properly offered security updates applicable to the .NET Framework 4.6.1.Summary: This security update resolves a vulnerability in Microsoft .NET Framework. The security feature bypass exists in a .NET Framework component that does not properly validate certain elements of a signed XML document.

Posted on: 8 November 2016 | 12:00 pm

MS16-138 - Important: Security Update for Microsoft Virtual Hard Disk Driver (3199647) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (November 8, 2016): Bulletin published.Summary: The Windows Virtual Hard Disk Driver improperly handles user access to certain files. An attacker can manipulate files in locations not intended to be available to the user by exploiting this vulnerability.

Posted on: 8 November 2016 | 12:00 pm

MS16-135 - Important: Security Update for Windows Kernel-Mode Drivers (3199135) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (November 8, 2016): Click here to enter text.Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.

Posted on: 8 November 2016 | 12:00 pm

MS16-139 - Important: Security Update for Windows Kernel (3199720) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (November 8, 2016): Bulletin published.Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application to access sensitive information. A locally authenticated attacker could attempt to exploit this vulnerability by running a specially crafted application. An attacker can gain access to information not intended to be available to the user by using this method.

Posted on: 8 November 2016 | 12:00 pm

MS16-137 - Important: Security Update for Windows Authentication Methods (3199173) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (November 8, 2016): Bulletin publishedSummary: This security update resolves multiple vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege. To exploit this vulnerability, the attacker would first need to authenticate to the target, domain-joined system using valid user credentials. An attacker who successfully exploited this vulnerability could elevate their permissions from unprivileged user account to administrator.

Posted on: 8 November 2016 | 12:00 pm

MS16-136 - Important: Security Update for SQL Server (3199641) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (November 8, 2016): Bulletin Published.Summary: This security update resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow an attacker could to gain elevated privileges that could be used to view, change, or delete data; or create new accounts. The security update addresses these most severe vulnerabilities by correcting how SQL Server handles pointer casting.

Posted on: 8 November 2016 | 12:00 pm

MS16-134 - Important: Security Update for Common Log File System Driver (3193706) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (November 8, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerability could allow elevation of privilege when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. In a local attack scenario, an attacker could exploit these vulnerabilities by running a specially crafted application to take complete control over the affected system. An attacker who successfully exploits this vulnerability could run processes in an elevated context.

Posted on: 8 November 2016 | 12:00 pm

MS16-133 - Important: Security Update for Microsoft Office (3199168) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (November 8, 2016): Bulletin revised to announce the availability of the 14.7.0 update for Microsoft Office for Mac 2011 (3186805) and the 15.28 update for Microsoft Office 2016 for Mac (3186807). Customers running affected Mac software should install the appropriate update for their product to be protected from the vulnerabilities discussed in this bulletin. Customers running other Microsoft Office software do not need to take any action. see Microsoft Knowledge Base Article 3198807. and Microsoft Knowledge Base Article 3198798. for more information and download links.Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted on: 8 November 2016 | 12:00 pm

MS16-142 - Critical: Cumulative Security Update for Internet Explorer (3198467) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (November 8, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Posted on: 8 November 2016 | 12:00 pm

MS16-132 - Critical: Security Update for Microsoft Graphics Component (3199120) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (November 8, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe being of the vulnerabilities could allow a remote code execution vulnerability exists when the Windows Animation Manager improperly handles objects in memory if a user visits a malicious webpage. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. This security update is rated Critical for all supported releases of Microsoft Windows. For more information, see the Affected Software and Vulnerability Severity Ratings section.

Posted on: 8 November 2016 | 12:00 pm

MS16-141 - Critical: Security Update for Adobe Flash Player (3202790) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (November 8, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.

Posted on: 8 November 2016 | 12:00 pm

MS16-120 - Critical: Security Update for Microsoft Graphics Component (3192884) - Version: 1.1

Severity Rating: CriticalRevision Note: V1.1 (November 8, 2016): Revise bulletin to announce a detection change to address an issue in supersedence, specifically in WSUS environments where various updates applicable to Windows 7 SP1 and Windows Server 2008 R2 SP1 were incorrectly marked as being superseded. This is a detection change only. There were no changes to the update files. Customers who have already successfully installed the update do not need to take any actionSummary: This security update resolves vulnerabilities in Microsoft Windows, Microsoft Office, Skype for Business, Silverlight and Microsoft Lync. The most serious of these vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Posted on: 8 November 2016 | 12:00 pm

MS16-091 - Important: Security Update for .NET Framework (3170048) - Version: 1.1

Severity Rating: ImportantRevision Note: V1.1 (November 8, 2016): Summary: This security update resolves a vulnerability in Microsoft .NET Framework. The vulnerability could cause information disclosure if an attacker uploads a specially crafted XML file to web-based application.

Posted on: 8 November 2016 | 12:00 pm

MS16-129 - Critical: Cumulative Security Update for Microsoft Edge (3199057) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (November 8, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.

Posted on: 8 November 2016 | 12:00 pm

MS16-128 - Critical: Security Update for Adobe Flash Player (3201860) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (October 27, 2016): Bulletin published.Summary: This security update resolves a vulnerability in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.

Posted on: 27 October 2016 | 12:00 pm

MS16-110 - Important: Security Update for Microsoft Windows (3178467) - Version: 1.1

Severity Rating: ImportantRevision Note: V1.1 (October 21, 2016): Bulletin update to remove duplicated sections. This is an informational change only.Summary: This security update resolves multiple vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker creates a specially crafted request and executes arbitrary code with elevated permissions on a target system.

Posted on: 21 October 2016 | 12:00 pm

MS16-121 - Critical: Security Update for Microsoft Office (3194063) - Version: 1.1

Severity Rating: CriticalRevision Note: V1.1 (October 12, 2016): This bulletin has been revised to change the severity to Critical. This is an informational change only.Summary: This security update resolves a vulnerability in Microsoft Office. An Office RTF remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle RTF files. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user.

Posted on: 12 October 2016 | 12:00 pm

MS16-101 - Important: Security Update for Windows Authentication Methods (3178465) - Version: 2.0

Severity Rating: ImportantRevision Note: V2.0 (October 11, 2016): To address issues with Security Update 3167679, Microsoft re-released MS16-101 to comprehensively address known issues with CVE-2016-3237. See Microsoft Knowledge Base Article 3167679 for more information.Summary: This security update resolves multiple vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application on a domain-joined system.

Posted on: 11 October 2016 | 12:00 pm

MS16-126 - Moderate: Security Update for Microsoft Internet Messaging API (3196067) - Version: 1.0

Severity Rating: ModerateRevision Note: V1.0 (October 11, 2016): Bulletin published.Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker successfully convinces a user of an affected system to visit a malicious or compromised website. Note that you must install two updates to be protected from the vulnerability discussed in this bulletin: The update in this bulletin, MS16-126, and the update in MS16-118.

Posted on: 11 October 2016 | 12:00 pm

MS16-124 - Important: Security Update for Windows Registry (3193227) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (October 11, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker can access sensitive registry information.

Posted on: 11 October 2016 | 12:00 pm

MS16-123 - Important: Security Update for Windows Kernel-Mode Drivers (3192892) - Version: 1.1

Severity Rating: ImportantRevision Note: V1.1 (October 11, 2016): Bulletin revised to correct a CVE ID. CVE-2016-7191 has been changed to CVE-2016-7211. This is an informational change only. Customers who have successfully installed the updates do not need to take any further action.Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.

Posted on: 11 October 2016 | 12:00 pm

MS16-122 - Critical: Security Update for Microsoft Video Control (3195360) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (October 11, 2016): Bulletin published.Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker successfully convinces a user of an affected system to visit a malicious or compromised website. Note that you must install two updates to be protected from the vulnerability discussed in this bulletin: The update in this bulletin, MS16-116, and the update in MS16-104.

Posted on: 11 October 2016 | 12:00 pm