October Patch Tuesday: Microsoft Releases 10 Security Bulletins, Five Rated Critical

Microsoft has officially rolled out security updates for this month’s Patch Tuesday, marking the first of its new rollup model aimed at providing a “more consistent and simplified servicing experience.” This means that security and non-security fixes will be deployed in a consolidated pack, while a monthly security update will also be released together with the previous month’s patches. Further, Microsoft will also release a “preview rollup” of upcoming non-security patches on the third Tuesday of every month, a week following Patch Tuesday. This preview of patches allows customers to test applications prior to the actual monthly release of the consolidated bundle of fixes.

This month’s security update includes ten bulletins, five of which are tagged as “Critical” patching issues. Four of ten are marked as “Important”, and one as “Moderate”. The five fixed vulnerabilities allow for remote code execution when exploited by an attacker using the following:

Such vulnerabilities are commonly exploited by any attacker using a specially crafted webpage. In the case of the Microsoft Voice Control flaw, a user is convinced to open a specially crafted file or a program obtained either from a webpage to an email message. Other security issues, tagged as “Important” include vulnerabilities in Windows Kernel-Mode Drivers, Microsoft Office, Windows Registry, and Diagnostics Hub that could potentially allow elevation of privilege to an attacker. The identified “moderate” vulnerability is a Microsoft Internet Messaging API that allows information disclosure to an attacker.

As one of the Critical bulletins provided a fix for a flaw in Adobe Flash Player, Adobe, in sync with Microsoft, also released security updates for their own products. The updates include fixes for 12 disclosed vulnerabilities in Adobe Acrobat and Reader (APSB16-33), Adobe Creative Cloud Desktop Application (APSB16-34), and Flash Player (APSB16-32). This brings the current version of Flash Player to 23.0.0.185.

The following vulnerabilities were disclosed via Trend Micro’s Zero Day Initiative (ZDI):

  • CVE-2016-3382 (MS16-118, MS16-119)
  • CVE-2016-3386 (MS16-119)
  • CVE-2016-3383 (MS16-118, MS16-119)
  • CVE-2016-3384 (MS16-118)
  • CVE-2016-6986 (APSB16-32)
  • CVE-2016-6987 (APSB16-32)
  • CVE-2016-6971 (APSB16-33)
  • CVE-2016-6944 (APSB16-33)
  • CVE-2016-6945 (APSB16-33)
  • CVE-2016-6940 (APSB16-33)
  • CVE-2016-6941 (APSB16-33)
  • CVE-2016-6969 (APSB16-33)
  • CVE-2016-6959 (APSB16-33)
  • CVE-2016-6960 (APSB16-33)
  • CVE-2016-6961 (APSB16-33)
  • CVE-2016-6962 (APSB16-33)
  • CVE-2016-6963 (APSB16-33)
  • CVE-2016-6964 (APSB16-33)
  • CVE-2016-6965 (APSB16-33)
  • CVE-2016-6966 (APSB16-33)
  • CVE-2016-6967 (APSB16-33)
  • CVE-2016-6968 (APSB16-33)
  • CVE-2016-6972 (APSB16-33)
  • CVE-2016-6973 (APSB16-33)
  • CVE-2016-6974 (APSB16-33)
  • CVE-2016-6975 (APSB16-33)
  • CVE-2016-6976 (APSB16-33)
  • CVE-2016-6977 (APSB16-33)
  • CVE-2016-6979 (APSB16-33)
  • CVE-2016-6978 (APSB16-33)

 

Trend Micro Solutions

Trend Micro Deep Security and Vulnerability Protection protect user systems from any threats that may target these Microsoft vulnerabilities via the following DPI rules:

  • 1007985-Microsoft Internet Explorer Information Disclosure Vulnerability (CVE-2016-3298)
  • 1007983-Microsoft Edge Scripting Engine Information Disclosure Vulnerability (CVE-2016-7189)
  • 1007984-Microsoft Edge Scripting Engine Memory Corruption Vulnerability (CVE-2016-3386)
  • 1007979-Microsoft Office Memory Corruption Vulnerability (CVE-2016-7193)
  • 1007995-Microsoft Windows Diagnostics Hub Elevation Of Privilege (CVE-2016-7188)
  • 1007978-Microsoft Windows GDI+ Information Disclosure Vulnerability (CVE-2016-3263)
  • 1007980-Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2016-3385)
  • 1007986-Microsoft Internet Explorer And Edge Memory Corruption Vulnerability (CVE-2016-3331)
  • 1007975-Microsoft Windows Multiple Security Vulnerabilities (MS16-123)
  • 1007981-Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2016-3383)
  • 1007976-Microsoft Windows Multiple Elevation Of Privilege Vulnerabilities (MS16-120)
  • 1007977-Microsoft Windows GDI+ Information Disclosure Vulnerability (CVE-2016-3262)
  • 1007989-Microsoft Windows Multiple Security Vulnerabilities (MS16-118, MS16-119)
  • 1007991-Microsoft Internet Explorer And Edge Information Disclosure Vulnerability (CVE-2016-3267)
  • 1007994-Microsoft Edge Scripting Engine Memory Corruption Vulnerability (CVE-2016-7194)
  • 1007988-Microsoft Windows Multiple Security Vulnerabilities (MS16-124)
  • 1007974-Microsoft Windows GDI+ Information Disclosure Vulnerability (CVE-2016-3209)
  • 1007982-Microsoft Edge Scripting Engine Memory Corruption Vulnerability (CVE-2016-7190)
  • 1007987-Microsoft Internet Explorer And Edge Memory Corruption Vulnerability (CVE-2016-3382)

TippingPoint customers are protected from attacks exploiting these vulnerabilities with the following MainlineDV filters:

  • 24242: HTTP: Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability
  • 24324: HTTP: Microsoft Internet Explorer and Edge eval Type Confusion Vulnerability
  • 24996: HTTP: Microsoft Internet Explorer Link Use-After-Free Vulnerability
  • 25008: HTTP: Microsoft Internet Explorer VBScript Array Type Confusion Vulnerability
  • 25146: HTTP: Microsoft Windows Graphics Component Information Disclosure Vulnerability
  • 25147: HTTP: Microsoft Windows Graphics Component Buffer Overflow Vulnerability
  • 25148: HTTP: Microsoft Internet Explorer Information Disclosure Vulnerability
  • 25149: HTTP: Microsoft Internet Explorer and Edge EMODEL.dll Use-After-Free Vulnerability
  • 25150: HTTP: Microsoft Internet Explorer and Edge Boundary Descriptor Privilege Escalation Vulnerability
  • 25151: HTTP: Microsoft Internet Explorer and Edge DACL Privilege Escalation Vulnerability
  • 25152: HTTP: Microsoft Edge map Type Confusion Vulnerability
  • 25156: HTTP: Microsoft Windows TTF CVT Information Disclosure Vulnerability
  • 25159: HTTP: Microsoft Windows ExtTextOut Memory Corruption Vulnerability
  • 25162: HTTP: Microsoft Windows Ntoskrnl Integer Overflow Vulnerability
  • 25163: HTTP: Microsoft Windows CMAPi Privilege Escalation Vulnerability
  • 25164: HTTP: Microsoft Windows PiCMOpenClassKey Privilege Escalation Vulnerability
  • 25165: HTTP: Microsoft Windows NtLoadKeyEx Privilege Escalation Vulnerability
  • 25171: HTTP: Microsoft Edge Array Buffer Overflow Vulnerability
  • 25175: HTTP: RTF Document Loading Embedded otkloadr.dll
  • 25176: HTTP: Microsoft Windows Win32k-GDI Privilege Escalation Vulnerability
  • 25177: HTTP: Microsoft Internet Explorer and Edge readyState Information Disclosure Vulnerability
  • 25230: HTTP: Microsoft Windows tm.sys BLF Memory Corruption Vulnerability
  • 25231: HTTP: Microsoft Edge Array Type Confusion Vulnerability
  • 25232: HTTP: Microsoft Windows win32kfull.sys Use-After-Free Vulnerability
  • 25236: HTTP: Microsoft Windows TTF Memory Corruption Vulnerability

Post from: Trendlabs Security Intelligence Blog – by Trend Micro

October Patch Tuesday: Microsoft Releases 10 Security Bulletins, Five Rated Critical

Read more: October Patch Tuesday: Microsoft Releases 10 Security Bulletins, Five Rated Critical

Incoming search terms

Story added 12. October 2016, content source with full text you can find at link above.