Virtual Administrator’s February 2016 Patch Recommendations
13 Security Bulletins were released – 6 Critical, 7 Important, and 0 Moderate
This Month In Brief
We have not uncovered any widespread problems with any of this month’s Security Bulletins and are releasing all of them.
Denied Non-Security Bulletin Updates: KB3123862 has been denied
MS16-009, MS16-011, MS16-012, MS16-013, MS16-015 and MS16-022 are rated Critical. After your next patch cycle completes you should follow up and make sure these are installed. Opinions vary on the order of importance but MS16-022, MS16-015 and MS16-009/MS16-011 should be your top priority.
No out-of-band security updates were released during the last month.
Windows 10 cumulative updates are KB3135174 and KB3135173
Cumulative Update for Windows 10
https://support.microsoft.com/en-us/kb/3135174
Cumulative Update for Windows 10 Version 1511
https://support.microsoft.com/en-us/kb/3135173
Heads Up! MS16-017 RDP patches may kick two reboots
“You may have to restart the computer multiple times after you install this security update on a Windows 7-based computer that is running RDP 8.0”
https://support.microsoft.com/en-us/kb/3123862
Details about denied patches/updates
KB123862 – Updated capabilities to upgrade Windows 8.1 and Windows 7
https://support.microsoft.com/en-us/kb/3123862
No one is exactly sure what this patch does. Microsoft states “This update adds capabilities to some computers that lets users easily learn about Windows 10 or start an upgrade to Windows 10.” It seems unnervingly similar to last year’s KB3035583 which was an attempt to push out Windows 10 upgrades. For this reason we have denied this optional update.
Notable news: As noted last month support for Windows 8 and older version of Internet Explorer ended on January 12th, 2016. Support for support .NET Framework 4.0, 4.5, and 4.51 also ended.
Internet Explorer and .NET Framework 4.x Support Announcements
https://support.microsoft.com/en-ca/gp/msl-ie-dotnet-an/en
Outside of the exceptions listed below you need to be running IE 11 to receive security updates
Windows Vista SP2 (IE9)
Windows Server 2008 SP2 (IE9)
Windows Server 2008 IA64 Itanium (IE9)
Windows Server 2012 (IE10)
Exploitability
- Publically disclosed: None
- Being exploited: None
- Rated CRITICAL: MS16-009, MS16-011, MS16-012, MS16-013, MS16-015, MS16-022
- (The Severity Rating System: http://technet.microsoft.com/en-us/security/bulletin/rating)
Requires Restart
- Servers:True
- Workstations:True
New Security Bulletins
(MS#/Affected Software/Type)
CRITICAL
MS16-009 Cumulative Security Update for Internet Explorer (3134220) | (Internet Explorer) The vulnerability could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. |
|
MS16-011 Cumulative Security Update for Microsoft Edge (3134225) | (Microsoft Edge) The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. |
|
MS16-012 Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3138938) | (Microsoft Windows) The more severe of the vulnerabilities could allow remote code execution if Microsoft Windows PDF Library improperly handles application programming interface (API) calls, which could allow an attacker to run arbitrary code on the user’s system. |
|
MS16-013 Security Update for Windows Journal to Address Remote Code Execution (3134811) | (Microsoft Windows) The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. |
|
MS16-015 Security Update for Microsoft Office to Address Remote Code Execution (3134226) | (Microsoft Office, Microsoft Office Services and Web Apps, Microsoft Server Software) The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. |
|
MS16-022 Security Update for Adobe Flash Player (3135782) | (Microsoft Windows, Adobe Flash Player) This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1, and Windows 10. |
IMPORTANT
MS16-014 Security Update for Microsoft Windows to Address Remote Code Execution (3134228) | (Microsoft Windows) The most severe of the vulnerabilities could allow remote code execution if an attacker is able to log on to a target system and run a specially crafted application. |
|
MS16-016 Security Update for WebDAV to Address Elevation of Privilege (3136041) | (Microsoft Windows) The vulnerability could allow elevation of privilege if an attacker uses the Microsoft Web Distributed Authoring and Versioning (WebDAV) client to send specifically crafted input to a server. |
|
MS16-017 Security Update for Remote Desktop Display Driver to Address Elevation of Privilege (3134700) | (Microsoft Windows) The vulnerability could allow elevation of privilege if an authenticated attacker logs on to the target system using RDP and sends specially crafted data over the connection. |
|
MS16-018 Security Update for Remote Desktop Display Driver to Address Elevation of Privilege (3134700) | (Microsoft Windows) The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. |
|
MS16-019 Security Update for .NET Framework to Address Denial of Service (3137893) | (Microsoft Windows, Microsoft .NET Framework) The more severe of the vulnerabilities could cause denial of service if an attacker inserts specially crafted XSLT into a client-side XML web part, causing the server to recursively compile XSLT transforms. |
|
MS16-020 Security Update for Active Directory Federation Services to Address Denial of Service (3134222) | (Microsoft Windows) The vulnerability could allow denial of service if an attacker sends certain input data during forms-based authentication to an ADFS server, causing the server to become nonresponsive. |
|
MS16-021 Security Update for NPS RADIUS Server to Address Denial of Service (3133043) | (Microsoft Windows) The vulnerability could cause denial of service on a Network Policy Server (NPS) if an attacker sends specially crafted username strings to the NPS, which could prevent RADIUS authentication on the NPS. |