Microsoft fixed vulnerabilities in its products

    Microsoft has released a suite of updates for its products that cover 44 vulnerabilities in various components of Windows, as well as Office. The peculiarity of this update release is that within its framework, as many as five 0day vulnerabilities that were used by attackers in cyber attacks were fixed. One of these 0day vulnerabilities such as Information Disclosure is present in Internet Explorer 9-11. It allows attackers to remotely check the presence of files on disk in a vulnerable system.



    In addition, the October patch tuesday was the first for Windows 7 and Windows 8.1, for which Microsoft began to use the cumulative update delivery model (Windows 10), which we wrote about earlier. Instead of individual updates (security bulletins) in the update center, the user will now see one update, "A monthly set of security system quality patches for Windows systems. "

    The MS16-118 update fixes 11 vulnerabilities in Internet Explorer 9-11. Most of the fixed vulnerabilities are of the Remote Code Execution (RCE) type and can be used by attackers to remotely execute code using a specially crafted web page. Critical.

    Update MS16-119fixes 13 vulnerabilities in the Edge web browser on Windows 10. Most of the fixed vulnerabilities are also RCE type and can be used by attackers to remotely install malware using an exploit web page. One of the RCE vulnerabilities with the identifier CVE-2016-7189 (Scripting Engine Remote Code Execution Vulnerability) is used by attackers in targeted attacks. Critical.

    Update MS16-120fixes seven vulnerabilities in the Windows Vista SP2 graphics subsystem - Windows 10. A vulnerability with the identifier CVE-2016-3270 is present in the Win32k.sys driver and allows attackers to run arbitrary code with SYSTEM privileges. Remote exploitation of RCE vulnerabilities in the graphics subsystem is possible using a specially crafted exploit web page. Critical.

    Update MS16-121 fixes one RCE vulnerability with identifier CVE-2016-7193 in Office 2007 - 2016 products. The vulnerability can be exploited using a special malicious RTF file that can be placed on a resource on the network or sent to an e-mail victim. Vulnerability is not marked as Critical, because the attacker needs to force the victim to open the file. Important

    The MS16-122 update fixes the critical RCE vulnerability in Video Control on all editions of Windows. Remote exploitation of the vulnerability is possible using malicious content hosted on a web resource. Critical.

    Update MS16-123 fixes five LPE vulnerabilities in the kernel mode components of all supported editions of Windows. Four vulnerabilities are present in the win32k.sys driver and allow attackers to run arbitrary code on a system with SYSTEM rights. Another LPE vulnerability is present in the Windows Transaction Manager driver. Important

    Update MS16-124fixes four LPE vulnerabilities that are present in the kernel (ntoskrnl) of all supported editions of Windows. The update closes vulnerabilities in the implementation of system API functions that allowed attackers to illegally obtain important information from the system registry by running a special malicious application with an exploit. Important

    Update MS16-125 fixes the LPE vulnerability with identifier CVE-2016-7188 in the Windows 10 service called Diagnostics Hub Standard Collector. Attackers can gain higher rights in the system by running an exploit application in it that exploits a vulnerability in the service when processing incoming data. Important

    Update MS16-126fixes a vulnerability with identifier CVE-2016-3298 such as Information Disclosure on Windows Vista and 7. A vulnerability is exposed in the Microsoft Internet Messaging API, which allows a remote attacker to check the presence of files on a disk. Important

    The MS16-127 update delivers Adove Flash Player vulnerability patches to users of Internet Explorer 10.11, as well as Edge. Critical.

    We recommend that our users install updates as soon as possible and, if you have not already done so, enable automatic delivery of updates using Windows Update (this option is enabled by default).

    image
    be secure.

    Also popular now: