MS16-014 - Important: Security Update for Microsoft Windows to Address Remote Code Execution (3134228) - Version: 2.0

Severity Rating: ImportantRevision Note: V2.0 (February 10, 2016): Bulletin revised to announce the availability of update 3126041 for Microsoft Windows Vista, Windows Server 2008, Windows Server 2008 for Itanium-based Systems, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2. Customers should apply the applicable updates to be protected from the vulnerabilities discussed in this bulletin. The majority of customers have automatic updating enabled and will not need to take any action because the updates will be downloaded and installed automatically.Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker is able to log on to a target system and run a specially crafted application.

Posted by on 10 February 2016 | 1:00 am

MS16-009 - Critical: Cumulative Security Update for Internet Explorer (3134220) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Posted by on 9 February 2016 | 1:00 am

MS15-012 - Critical: Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3081682) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if Microsoft Windows PDF Library improperly handles application programming interface (API) calls, which could allow an attacker to run arbitrary code on the user’s system. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. However, an attacker would have no way to force users to download or open a malicious PDF document.

Posted by on 9 February 2016 | 1:00 am

MS15-016 - Important: Security Update for WebDAV to Address Elevation of Privilege (3136041) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker uses the Microsoft Web Distributed Authoring and Versioning (WebDAV) client to improperly validate input.

Posted by on 9 February 2016 | 1:00 am

MS16-017 - Important: Security Update for Remote Desktop Display Driver to Address Elevation of Privilege (3134700) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an authenticated attacker logs on to the target system using RDP and sends specially crafted data over the connection. By default, RDP is not enabled on any Windows operating system. Systems that do not have RDP enabled are not at risk.

Posted by on 9 February 2016 | 1:00 am

MS15-101 - Important: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (3089662) - Version: 1.2

Severity Rating: ImportantRevision Note: V1.2 (February 9, 2016): Revised bulletin to announce a detection change for the 3074554 update for .NET Framework 4.6. This is an informational change only. Customers who have already successfully updated their systems do not need to take any action.Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow elevation of privilege if a user runs a specially crafted .NET application. However, in all cases, an attacker would have no way to force users to run the application; an attacker would have to convince users to do so.

Posted by on 9 February 2016 | 1:00 am

MS16-019 - Important: Security Update for .NET Framework to Address Denial of Service (3137893) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The more severe of the vulnerabilities could cause denial of service if an attacker insert specially crafted XSLT into a client-side XML web part, causing the server to recursively compile XSLT transforms.

Posted by on 9 February 2016 | 1:00 am

MS15-118 - Important: Security Update for .NET Framework to Address Elevation of Privilege (3104507) - Version: 2.0

Severity Rating: ImportantRevision Note: V2.0 (February 9, 2016): Revised bulletin to announce the re-release of update 3098785 to address known issues, discussed in Microsoft Knowledge Base Article 3318750, that customers who are running Windows 8.1, Windows RT, or Windows Server 2012 R2 may have experienced after installing .NET Framework 4.6 on a machine that already has a fully-updated version of .NET Framework 4.5.x. Microsoft recommends that customers scan for new updates to download, and install the re-released update 3098785. For more information see Microsoft Knowledge Base Article 3318750.Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow elevation of privilege if an attacker convinces a user to navigate to a compromised website or open a link in a specially crafted email that is designed to inject client-side code into the user’s browser.

Posted by on 9 February 2016 | 1:00 am

MS16-011 - Critical: Cumulative Security Update for Microsoft Edge (3134225) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Microsoft Edge. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted by on 9 February 2016 | 1:00 am

MS16-015 - Critical: Security Update for Microsoft Office to Address Remote Code Execution (3134226) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted by on 9 February 2016 | 1:00 am

MS15-128 - Critical: Security Update for Microsoft Graphics Component to Address Remote Code Execution (3104503) - Version: 1.1

Severity Rating: CriticalRevision Note: V1.1 (February 9, 2016): Revised bulletin to correct the updates replaced for .NET Framework 3.5.1 installed on supported editions of Windows 7 and Windows Server 2008 R2. This is an informational change only. There were no changes to the update files. Customers who have already successfully updated their systems do not need to take any action.Summary: This security update resolves vulnerabilities in Microsoft Windows, .NET Framework, Microsoft Office, Skype for Business, Microsoft Lync, and Silverlight. The vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a webpage that contains specially crafted embedded fonts.

Posted by on 9 February 2016 | 1:00 am

MS16-013 - Critical: Security Update for Windows Journal to Address Remote Code Execution (3134811) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Posted by on 9 February 2016 | 1:00 am

MS16-016 - Important: Security Update for WebDAV to Address Elevation of Privilege (3136041) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker uses the Microsoft Web Distributed Authoring and Versioning (WebDAV) client to improperly validate input.

Posted by on 9 February 2016 | 1:00 am

MS16-022 - Critical: Security Update for Adobe Flash Player (3135782) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows 10 Version 1511. For more information, see the Affected Software section. The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10, Internet Explorer 11, and Microsoft Edge.

Posted by on 9 February 2016 | 1:00 am

MS15-015 - Critical: Security Update for Microsoft Office to Address Remote Code Execution (3134226) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted by on 9 February 2016 | 1:00 am

MS16-020 - Important: Security Update for Active Directory Federation Services to Address Denial of Service (3134222) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves a vulnerability in Active Directory Federation Services (ADFS). The vulnerability could allow denial of service if an attacker sends certain input data during forms-based authentication to an ADFS Server, causing the server to become nonresponsive.

Posted by on 9 February 2016 | 1:00 am

MS16-018 - Important: Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege (3136082) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (February 9, 2016): Click here to enter text.Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to visit a malicious website.

Posted by on 9 February 2016 | 1:00 am

MS16- - Important: Security Update for NPS RADIUS Server to Address Denial of Service (3133043) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could cause denial of service on a Network Policy Server (NPS) or an Internet Authentication Service (IAS) if an attacker sends specially crafted username strings to the IAS or NPS, which could prevent RADIUS authentication on the NPS or IAS.

Posted by on 9 February 2016 | 1:00 am

MS16-012 - Critical: Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3138938) - Version: 1.0

Severity Rating: CriticalRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if Microsoft Windows PDF Library improperly handles application programming interface (API) calls, which could allow an attacker to run arbitrary code on the user’s system. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. However, an attacker would have no way to force users to download or open a malicious PDF document.

Posted by on 9 February 2016 | 1:00 am

MS16-021 - Important: Security Update for NPS RADIUS Server to Address Denial of Service (3133043) - Version: 1.0

Severity Rating: ImportantRevision Note: V1.0 (February 9, 2016): Bulletin published.Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could cause denial of service on a Network Policy Server (NPS) if an attacker sends specially crafted username strings to the NPS, which could prevent RADIUS authentication on the NPS.

Posted by on 9 February 2016 | 1:00 am

MS15-106 - Critical: Cumulative Security Update for Internet Explorer (3096441) - Version: 2.1

Severity Rating: CriticalRevision Note: V2.1 (January 27, 2016): Bulletin revised to add CVE-2015-6184. This is an informational change only.Summary: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted by on 27 January 2016 | 1:00 am

MS16-007 - Important: Security Update for Microsoft Windows to Address Remote Code Execution (3124901) - Version: 1.1

Severity Rating: ImportantRevision Note: V1.1 (January 27, 2016): 1) Added an Update FAQ to explain that only certain versions of aepic.dll are affected by CVE-2016-0018; therefore, some customers will not be offered update 3121461. 2) Added an Update FAQ to explain why some customers are not being offered update 3109560. These are informational change only. Customers who have already successfully installed the updates do not need to take any further action.Summary: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker is able to log on to a target system and run a specially crafted application.

Posted by on 27 January 2016 | 1:00 am

MS16-006 - Critical: Security Update for Silverlight to Address Remote Code Execution (3126036) - Version: 1.1

Severity Rating: CriticalRevision Note: V1.1 (January 14, 2016): Update to Vulnerability Information for CVE-2016-0034. This is an informational change only.Summary: This security update resolves a vulnerability in Microsoft Silverlight. The vulnerability could allow remote code execution if a user visits a compromised website that contains a specially crafted Silverlight application. An attacker would have no way to force users to visit a compromised website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email or instant message that takes users to the attacker's website.

Posted by on 14 January 2016 | 1:00 am

MS16-005 - Critical: Security Update for Windows Kernel-Mode Drivers to Address Remote Code Execution (3124584) - Version: 1.1

Severity Rating: CriticalRevision Note: V1.1 (January 13, 2016): Corrected severity and impact entries for Windows 10 in the Affected Software and Vulnerability Severity Ratings table. This is an informational change only. Customers who have successfully installed the update do not need to take any further action.Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to visit a malicious website.

Posted by on 13 January 2016 | 1:00 am

MS16-004 - Critical: Security Update for Microsoft Office to Address Remote Code Execution (3124585) - Version: 1.1

Severity Rating: CriticalRevision Note: V1.1 (January 13, 2016): For CVE-2016-0010, clarified that the Preview Pane is an attack vector for this vulnerability.Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Posted by on 13 January 2016 | 1:00 am