Upload
landesk
View
246
Download
0
Embed Size (px)
Citation preview
Patch Tuesday WebinarWednesday, September 14th, 2016
Chris Goettl• Product Manager, Shavlik
Dial In: 1-855-749-4750 (US) Attendees: 927 265 569
Agenda
September 2016 Patch Tuesday Overview
Known Issues
Bulletins
Q & A
1
2
3
4
Best Practices
Privilege Management Mitigates Impact of many exploits
High Threat Level vulnerabilities warrant fast rollout. 2 weeks or less is ideal to reduce exposure.
User Targeted – Whitelisting and Containerization mitigate
Industry News
Microsoft announces servicing change for Windows 7, 8.1, and Server 2008 R2, 2012, 2012 R2• Internet Explorer and OS updates in one of two options:
• Security Bundle – Monthly bundle of Security only updates • Cumulative Rollup – Similar to Windows 10 cumulative bundle
of Security and Non-Security updates in one package• .Net Rollup – Cumulative Bundle each month that applies. Will
update only versions detected, not install new versions. • Flash Player for IE and OS• Office, SharePoint, SQL, Exchange, etc are not affected by the
change set for October
Adobe updated Flash Player distribution announcement. Sept 29th If you have not already done so, get an Adobe ID and sign up for the distribution agreement.
CSWU-030: Cumulative update for Windows 10: September 13, 2016
Maximum Severity: Critical Affected Products: Windows 10, Edge, Internet ExplorerDescription: This update for Windows 10 includes functionality improvements and resolves the vulnerabilities in Windows that are described in the following Microsoft security bulletins and advisory: MS16-104, MS16-105, MS16-106, MS16-110, MS16-111, MS16-112, MS16-113, MS16-114, MS16-115, MS16-116, MS16-117
Impact: Remote Code Execution, Elevation of Privilege, Information Disclosure Fixes 43 vulnerabilities:
CVE-2016-3247, CVE-2016-3291, CVE-2016-3292, CVE-2016-3295, CVE-2016-3297, CVE-2016-3324, CVE-2016-3325, CVE-2016-3351 (Exploited), CVE-2016-3353, CVE-2016-3375, CVE-2016-3247, CVE-2016-3291, CVE-2016-3294, CVE-2016-3295, CVE-2016-3297, CVE-2016-3325, CVE-2016-3330, CVE-2016-3350, CVE-2016-3351, CVE-2016-3370, CVE-2016-3374, CVE-2016-3377, CVE-2016-3348, CVE-2016-3349, CVE–2016-3354, CVE–2016-3355, CVE–2016-3356, CVE-2016-3346, CVE-2016-3352, CVE-2016-3368, CVE-2016-3369, CVE-2016-3305, CVE-2016-3306, CVE-2016-3371, CVE-2016-3372, CVE-2016-3373, CVE-2016-3302, CVE-2016-3344, CVE-2016-3345, CVE-2016-3370, CVE-2016-3374, CVE-2016-3375
Restart Required: Requires Restart
MS16-104: Cumulative Security Update for Internet Explorer (3183038)
Maximum Severity: Critical Affected Products: Internet ExplorerDescription: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
Impact: Remote Code ExecutionFixes 10 vulnerabilities:
CVE-2016-3247, CVE-2016-3291, CVE-2016-3292, CVE-2016-3295, CVE-2016-3297, CVE-2016-3324, CVE-2016-3325, CVE-2016-3351 (Exploited), CVE-2016-3353, CVE-2016-3375
Restart Required: Requires Restart
MS16-105: Cumulative Security Update for Microsoft Edge (3183043)
Maximum Severity: Critical Affected Products: EdgeDescription: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.
Impact: Remote Code ExecutionFixes 12 vulnerabilities:
CVE-2016-3247, CVE-2016-3291, CVE-2016-3294, CVE-2016-3295, CVE-2016-3297, CVE-2016-3325, CVE-2016-3330, CVE-2016-3350, CVE-2016-3351, CVE-2016-3370, CVE-2016-3374, CVE-2016-3377
Restart Required: Requires Restart
MS16-106: Security Update for Microsoft Graphics Component (3185848)
Maximum Severity: Critical Affected Products: WindowsDescription: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Impact: Remote Code ExecutionFixes 5 vulnerabilities:
CVE-2016-3348, CVE-2016-3349, CVE–2016-3354, CVE–2016-3355, CVE–2016-3356
Restart Required: Requires Restart
MS16-107: Security Update for Microsoft Office (3185852)
Maximum Severity: Critical Affected Products: Office, SharePoint Description: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
Impact: Remote Code ExecutionFixes 13 vulnerabilities:
CVE-2016-0137, CVE-2016-0141, CVE-2016-3357, CVE-2016-3358, CVE-2016-3359, CVE-2016-3360, CVE-2016-3361, CVE-2016-3362, CVE-2016-3363, CVE-2016-3364, CVE-2016-3365, CVE-2016-3366, CVE-2016-3381
Restart Required: May Require Restart
MS16-108: Security Update for Microsoft Exchange Server (3185883)
Maximum Severity: CriticalAffected Products: ExchangeDescription: This security update resolves vulnerabilities in Microsoft Exchange Server. The most severe of the vulnerabilities could allow remote code execution in some Oracle Outside In libraries that are built into Exchange Server if an attacker sends an email with a specially crafted attachment to a vulnerable Exchange server.
Impact: Remote Code ExecutionFixes 3 (Microsoft) 18 (Oracle) vulnerabilities:
Microsoft: CVE-2016-0138, CVE-2016-3378, CVE-2016-3379 Oracle Outside In Libraries: CVE-2016-3575, CVE-2016-3581, CVE-2016-3582, CVE-2016-3583, CVE-2016-3595, CVE-2016-
3594, CVE-2015-6014, CVE-2016-3593, CVE-2016-3592, CVE-2016-3596, CVE-2016-3591, CVE-2016-3574, CVE-2016-3576, CVE-2016-3577, CVE-2016-3578, CVE-2016-3579, CVE-2016-3580, CVE-2016-3590
Restart Required: May Require Restart
MS16-116: Security Update in OLE Automation for VBScript Scripting Engine (3188724)
Maximum Severity: CriticalAffected Products: WindowsDescription: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker successfully convinces a user of an affected system to visit a malicious or compromised website. Note that you must install two updates to be protected from the vulnerability discussed in this bulletin: The update in this bulletin, MS16-116, and the update in MS16-104.
Impact: Remote Code ExecutionFixes 1 vulnerabilities:
CVE-2016-3375
Restart Required: Requires Restart
MS16-110: Security Update for Windows (3178467)
Maximum Severity: ImportantAffected Products: WindowsDescription: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker creates a specially crafted request and executes arbitrary code with elevated permissions on a target system.
Impact: Remote Code ExecutionFixes 4 vulnerabilities:
CVE-2016-3346, CVE-2016-3352, CVE-2016-3368, CVE-2016-3369
Restart Required: Requires Restart
MS16-117: Security Update for Adobe Flash Player (3188128)
Maximum Severity: CriticalAffected Products: WindowsDescription: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10.
Impact: Remote Code ExecutionFixes 26 vulnerabilities:
CVE-2016-4271, CVE-2016-4272, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923, CVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932
Restart Required: Requires Restart
APSB16-29: Security updates available for Adobe Flash Player
Maximum Severity: CriticalAffected Products: WindowsDescription: Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and ChromeOS. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.
Impact: Remote Code ExecutionFixes 29 vulnerabilities:
CVE-2016-4182, CVE-2016-4237, CVE-2016-4238, CVE-2016-4271, CVE-2016-4272, CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4277, CVE-2016-4278, CVE-2016-4279, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-4287, CVE-2016-6921, CVE-2016-6922, CVE-2016-6923, CVE-2016-6924, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, CVE-2016-6932
Restart Required: Requires Restart
CHROME-179: Google Chrome 53.0.2785.113
Maximum Severity: HighAffected Products: Google Chrome Description: The stable channel has been updated to 53.0.2785.113 for Windows, Mac, and Linux.
Impact: Remote Code Execution Fixes 6+ (Google) 29 (Adobe Flash) vulnerabilities:
CVE-2016-5170, CVE-2016-5171, CVE-2016-5172, CVE-2016-5173, CVE-2016-5174, CVE-2016-5175
Restart Required: Browser Restart Required
MS16-109: Security Update for Silverlight (3182373)
Maximum Severity: ImportantAffected Products: WindowsDescription: This security update resolves a vulnerability in Microsoft Silverlight. The vulnerability could allow remote code execution if a user visits a compromised website that contains a specially crafted Silverlight application. An attacker would have no way to force a user to visit a compromised website. Instead, an attacker would have to convince the user to visit the website, typically by enticing the user to click a link in either an email or instant message that takes the user to the attacker's website.
Impact: Remote Code ExecutionFixes 1 vulnerabilities:
CVE-2016-3367
Restart Required: Does not require restart
MS16-111: Security Update for Windows Kernel (3186973)
Maximum Severity: ImportantAffected Products: WindowsDescription: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker runs a specially crafted application on a target system.
Impact: Elevation of Privilege Fixes 5 vulnerabilities:
CVE-2016-3305, CVE-2016-3306, CVE-2016-3371, CVE-2016-3372, CVE-2016-3373
Restart Required: Requires Restart
MS16-112: Security Update for Windows Lock Screen (3178469)Maximum Severity: ImportantAffected Products: WindowsDescription: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if Windows improperly allows web content to load from the Windows lock screen.
Impact: Elevation of Privilege Fixes 1 vulnerabilities:
CVE-2016-3302
Restart Required: Requires Restart
MS16-113: Security Update for Windows Secure Kernel Mode (3185876)
Maximum Severity: ImportantAffected Products: Windows Description: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure when Windows Secure Kernel Mode improperly handles objects in memory.
Impact: Information DisclosureFixes 1 vulnerabilities:
CVE-2016-3344
Restart Required: Requires Restart
MS16-114: Security Update for SMBv1 Server (3185879)
Maximum Severity: ImportantAffected Products: Windows Description: This security update resolves a vulnerability in Microsoft Windows. On Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 operating systems, the vulnerability could allow remote code execution if an authenticated attacker sends specially crafted packets to an affected Microsoft Server Message Block 1.0 (SMBv1) Server. The vulnerability does not impact other SMB Server versions. Although later operating systems are affected, the potential impact is denial of service.
Impact: Remote Code ExecutionFixes 1 vulnerabilities:
CVE-2016-3345
Restart Required: Requires Restart
MS16-115: Security Update for Microsoft Windows PDF Library (3188733)
Maximum Severity: ImportantAffected Products: Windows Description: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow information disclosure if a user views specially crafted PDF content online or opens a specially crafted PDF document.
Impact: Information DisclosureFixes 2 vulnerabilities:
CVE-2016-3370, CVE-2016-3374
Restart Required: May Require Restart
Between Patch Tuesdays New Product Support: AutoCad Map 3D 2016\2017, SQL Server 2014 SP2, KeePass Classic\Pro MSISecurity Updates: KeePass Pro MSI (1), MS16-095 (additional patches released) (1), FireFox (2), Microsoft (3), Skype (1), Thunderbird (1), Opera (1), RealTimes Player (1), Chrome (1), Wireshark (1), GoToMeeting (1), PeaZip (1), MozyHome (1) Non-Security Updates: Microsoft (45), TeamViewer (1), Citrix VDA Core Services, Ccleaner (1), GoodSync (4), HipChat (3), WinSCP (1), WinRar (1), AutoCad (4), DropBox (4), Slack Machin-Wide Installer (2), MozyHome, Splunk Forwarder (1), FileZilla (1), SnagIt (1), Google Earth (1), CDBurnerXP (1), Tomcat (2), LibreOffice (1) Security Tools: Microsoft (1)
Resources and Webinars
Get Shavlik Content Updates
Get Social with Shavlik
Sign up for next months Patch Tuesday Webinar
Watch previous webinars and download presentation.
Thank you