27
Patch Tuesday Webinar Wednesday, November 9th, 2016 Chris Goettl Product Manager, Shavlik Dial In: 1-855-749-4750 (US) Attendees: 927 934 532

November2016 patchtuesdayshavlik

  • Upload
    landesk

  • View
    302

  • Download
    2

Embed Size (px)

Citation preview

Page 1: November2016 patchtuesdayshavlik

Patch Tuesday WebinarWednesday, November 9th, 2016

Chris Goettl• Product Manager, Shavlik

Dial In: 1-855-749-4750 (US) Attendees: 927 934 532

Page 2: November2016 patchtuesdayshavlik

Agenda

November 2016 Patch Tuesday Overview

Known Issues

Bulletins

Q & A

1

2

3

4

Page 3: November2016 patchtuesdayshavlik

Best Practices

Privilege Management Mitigates Impact of many exploits

High Threat Level vulnerabilities warrant fast rollout. 2 weeks or less is ideal to reduce exposure.

User Targeted – Whitelisting and Containerization mitigate

Page 4: November2016 patchtuesdayshavlik
Page 5: November2016 patchtuesdayshavlik

Industry News

Page 6: November2016 patchtuesdayshavlik

CSWU-039: Cumulative update for Windows 10: November 9, 2016

Maximum Severity: Critical Affected Products: Windows 10, Edge, Internet ExplorerDescription: This update for Windows 10 includes functionality improvements and resolves the vulnerabilities in Windows that are described in the following Microsoft security bulletins and advisory: MS16-129, MS16-130, MS16-131, MS16-132, MS16-134, MS16-135, MS16-137, MS16-138, MS16-140, MS16-141, MS16-142

Impact: Remote Code Execution, Elevation of Privilege, Fixes 73 vulnerabilities:

CVE-2016-7195, CVE-2016-7196, CVE-2016-7198, CVE-2016-7199 (Publicly Disclosed), CVE-2016-7200, CVE-2016-7201, CVE-2016-7202, CVE-2016-7203, CVE-2016-7204, CVE-2016-7208, CVE-2016-7209 (Publicly Disclosed), CVE-2016-7227, CVE-2016-7239, CVE-2016-7240, CVE-2016-7241, CVE-2016-7242, CVE-2016-7243, CVE-2016-7212, CVE-2016-7221, CVE-2016-7222, CVE-2016-7248, CVE-2016-7205, CVE-2016-7210, CVE-2016-7217, CVE-2016-7256 (Exploited), CVE-2016-0026, CVE-2016-3332, CVE-2016-3333, CVE-2016-3334, CVE-2016-3335, CVE-2016-3338, CVE-2016-3340, CVE-2016-3342, CVE-2016-3343, CVE-2016-7184, CVE-2016-7214, CVE-2016-7215, CVE-2016-7218, CVE-2016-7246, CVE-2016-7255 (Publicly Disclosed, Exploited), CVE-2016-7220, CVE-2016-7237, CVE-2016-7238, CVE-2016-7223, CVE-2016-7224, CVE-2016-7225, CVE-2016-7226, CVE-2016-7247, CVE-2016-7239, CVE-2016-7227, CVE-2016-7198, CVE-2016-7199 (Publicly Disclosed), CVE-2016-7195, CVE-2016-7196, CVE-2016-7241, CVE-2016-7857, CVE-2016-7858, CVE-2016-7859, CVE-2016-7860, CVE-2016-7861, CVE-2016-7862, CVE-2016-7863, CVE-2016-7864, CVE-2016-7865

Restart Required: Requires Restart

Page 7: November2016 patchtuesdayshavlik

SB16-002, SB16-003, SB16-004: November, 2016 Security Only Update

Maximum Severity: Critical Affected Products: Windows, Internet ExplorerDescription: This update is the Security Only Quality Update for Windows 7, 8.1, Server 2008 R2, 2012, and 2012 R2 systems: MS16-130, MS16-131, MS16-132, MS16-134, MS16-135, MS16-137, MS16-138, MS16-139, MS16-140, MS16-142

Impact: Remote Code Execution, Elevation of Privilege, Fixes 39 vulnerabilities:

CVE-2016-7212, CVE-2016-7221, CVE-2016-7222, CVE-2016-7248, CVE-2016-7205, CVE-2016-7210, CVE-2016-7217, CVE-2016-7256 (Exploited), CVE-2016-0026, CVE-2016-3332, CVE-2016-3333, CVE-2016-3334, CVE-2016-3335, CVE-2016-3338, CVE-2016-3340, CVE-2016-3342, CVE-2016-3343, CVE-2016-7184, CVE-2016-7214, CVE-2016-7215, CVE-2016-7218, CVE-2016-7246, CVE-2016-7255 (Publicly Disclosed, Exploited), CVE-2016-7220, CVE-2016-7237, CVE-2016-7238, CVE-2016-7223, CVE-2016-7224, CVE-2016-7225, CVE-2016-7226, CVE-2016-7247, CVE-2016-7216, CVE-2016-7239, CVE-2016-7227, CVE-2016-7198, CVE-2016-7199 (Publicly Disclosed), CVE-2016-7195, CVE-2016-7196, CVE-2016-7241

Restart Required: Requires Restart

Page 8: November2016 patchtuesdayshavlik

CR16-002: November, 2016 Security Monthly Quality Update

Maximum Severity: Critical Affected Products: Windows, Internet ExplorerDescription: This update is the Security Monthly Quality Update for Windows 7, 8.1, Server 2008 R2, 2012, and 2012 R2 systems: MS16-130, MS16-131, MS16-132, MS16-134, MS16-135, MS16-137, MS16-138, MS16-139, MS16-140, MS16-142

Impact: Remote Code Execution, Elevation of Privilege, Fixes 39 vulnerabilities:

CVE-2016-7212, CVE-2016-7221, CVE-2016-7222, CVE-2016-7248, CVE-2016-7205, CVE-2016-7210, CVE-2016-7217, CVE-2016-7256 (Exploited), CVE-2016-0026, CVE-2016-3332, CVE-2016-3333, CVE-2016-3334, CVE-2016-3335, CVE-2016-3338, CVE-2016-3340, CVE-2016-3342, CVE-2016-3343, CVE-2016-7184, CVE-2016-7214, CVE-2016-7215, CVE-2016-7218, CVE-2016-7246, CVE-2016-7255 (Publicly Disclosed, Exploited), CVE-2016-7220, CVE-2016-7237, CVE-2016-7238, CVE-2016-7223, CVE-2016-7224, CVE-2016-7225, CVE-2016-7226, CVE-2016-7247, CVE-2016-7216, CVE-2016-7239, CVE-2016-7227, CVE-2016-7198, CVE-2016-7199 (Publicly Disclosed), CVE-2016-7195, CVE-2016-7196, CVE-2016-7241

Restart Required: Requires Restart

Page 9: November2016 patchtuesdayshavlik

MS16-129: Cumulative Security Update for Microsoft Edge (3199057) 

Maximum Severity: Critical Affected Products: EdgeDescription: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.

Impact: Remote Code ExecutionFixes 17 vulnerabilities:

CVE-2016-7195, CVE-2016-7196, CVE-2016-7198, CVE-2016-7199 (Publicly Disclosed), CVE-2016-7200, CVE-2016-7201, CVE-2016-7202, CVE-2016-7203, CVE-2016-7204, CVE-2016-7208, CVE-2016-7209 (Publicly Disclosed), CVE-2016-7227, CVE-2016-7239, CVE-2016-7240, CVE-2016-7241, CVE-2016-7242, CVE-2016-7243,

Restart Required: Requires Restart

Page 10: November2016 patchtuesdayshavlik

MS16-130: Security Update for Microsoft Windows (3199172) 

Maximum Severity: Critical Affected Products: WindowsDescription: This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a locally authenticated attacker runs a specially crafted application.

Impact: Remote Code ExecutionFixes 3 vulnerabilities:

CVE-2016-7212, CVE-2016-7221, CVE-2016-7222

Restart Required: Requires Restart

Page 11: November2016 patchtuesdayshavlik

MS16-131: Security Update for Microsoft Video Control (3199151)

Maximum Severity: Critical Affected Products: WindowsDescription: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution when Microsoft Video Control fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. However, an attacker must first convince a user to open either a specially crafted file or a program from either a webpage or an email message..

Impact: Remote Code ExecutionFixes 1 vulnerabilities:

CVE-2016-7248

Restart Required: Requires Restart

Page 12: November2016 patchtuesdayshavlik

MS16-132: Security Update for Microsoft Graphics Component (3199120) 

Maximum Severity: CriticalAffected Products: Windows Description: This security update resolves vulnerabilities in Microsoft Windows. The most severe being of the vulnerabilities could allow a remote code execution vulnerability exists when the Windows Animation Manager improperly handles objects in memory if a user visits a malicious webpage. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.

Impact: Remote Code ExecutionFixes 4 vulnerabilities:

CVE-2016-7205, CVE-2016-7210, CVE-2016-7217, CVE-2016-7256 (Exploited)

Restart Required: May Require Restart

Page 13: November2016 patchtuesdayshavlik

MS16-135: Security Update for Windows Kernel-Mode Drivers (3199135)

Maximum Severity: ImportantAffected Products: WindowsDescription: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if Microsoft Video Control fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. However, an attacker must first convince a user to open either a specially crafted file or a program from either a webpage or an email message.

Impact: Elevation of PrivilegeFixes vulnerabilities:

CVE-2016-7214, CVE-2016-7215, CVE-2016-7218, CVE-2016-7246, CVE-2016-7255 (Publicly Disclosed, Exploited)

Restart Required: Requires Restart

Page 14: November2016 patchtuesdayshavlik

MS16-141: Security Update for Adobe Flash Player (3202790)

Maximum Severity: CriticalAffected Products: Adobe Flash Player Plug-In for IEDescription: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10..

Impact: Remote Code ExecutionFixes 9 vulnerabilities:

CVE-2016-7857, CVE-2016-7858, CVE-2016-7859, CVE-2016-7860, CVE-2016-7861, CVE-2016-7862, CVE-2016-7863, CVE-2016-7864, CVE-2016-7865

Restart Required: Requires Restart

Page 15: November2016 patchtuesdayshavlik

MS16-142: Cumulative Security Update for Internet Explorer (3198467)

Maximum Severity: CriticalAffected Products: Internet ExplorerDescription: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Impact: Remote Code ExecutionFixes 7 vulnerabilities:

CVE-2016-7239, CVE-2016-7227, CVE-2016-7198, CVE-2016-7199 (Publicly Disclosed), CVE-2016-7195, CVE-2016-7196, CVE-2016-7241

Restart Required: Requires Restart

Page 16: November2016 patchtuesdayshavlik

APSB16-37: Security updates available for Adobe Flash Player

Maximum Severity: CriticalAffected Products: Adobe Flash PlayerDescription: Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and ChromeOS.  These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system. .

Impact: Remote Code ExecutionFixes 9 vulnerabilities:

CVE-2016-7857, CVE-2016-7858, CVE-2016-7859, CVE-2016-7860, CVE-2016-7861, CVE-2016-7862, CVE-2016-7863, CVE-2016-7864, CVE-2016-7865

Restart Required: Requires Restart

Page 17: November2016 patchtuesdayshavlik

MS16-133: Security Update for Microsoft Office (3199168)

Maximum Severity: ImportantAffected Products: WindowsDescription: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.

Impact: Remote Code ExecutionFixes 12 vulnerabilities:

CVE-2016-7213, CVE-2016-7228, CVE-2016-7229, CVE-2016-7230, CVE-2016-7231, CVE-2016-7232, CVE-2016-7233, CVE-2016-7234, CVE-2016-7235, CVE-2016-7236, CVE-2016-7244, CVE-2016-7245

Restart Required: May Require Restart

Page 18: November2016 patchtuesdayshavlik

MS16-134: Security Update for Common Log File System Driver (3193706)

Maximum Severity: ImportantAffected Products: WindowsDescription: This security update resolves vulnerabilities in Microsoft Windows. The vulnerability could allow elevation of privilege when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. In a local attack scenario, an attacker could exploit these vulnerabilities by running a specially crafted application to take complete control over the affected system. An attacker who successfully exploits this vulnerability could run processes in an elevated context.

Impact: Elevation of Privilege Fixes 10 vulnerabilities:

CVE-2016-0026, CVE-2016-3332, CVE-2016-3333, CVE-2016-3334, CVE-2016-3335, CVE-2016-3338, CVE-2016-3340, CVE-2016-3342, CVE-2016-3343, CVE-2016-7184

Restart Required: Requires Restart

Page 19: November2016 patchtuesdayshavlik

MS16-136: Security Update for SQL Server (3199641)Maximum Severity: ImportantAffected Products: SQL ServerDescription: This security update resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow an attacker could to gain elevated privileges that could be used to view, change, or delete data; or create new accounts. The security update addresses these most severe vulnerabilities by correcting how SQL Server handles pointer casting.

Impact: Elevation of Privilege Fixes 6 vulnerabilities:

CVE-2016-7249, CVE-2016-7250, CVE-2016-7251, CVE-2016-7252, CVE-2016-7253, CVE-2016-7254

Restart Required: May Require Restart

Page 20: November2016 patchtuesdayshavlik

MS16-137: Security Update for Windows Authentication Methods (3199173)

Maximum Severity: ImportantAffected Products: Windows Description: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege. To exploit this vulnerability, the attacker would first need to authenticate to the target, domain-joined system using valid user credentials. An attacker who successfully exploited this vulnerability could elevate their permissions from unprivileged user account to administrator. The attacker could then install programs; view, change or delete data; or create new accounts. The attacker could subsequently attempt to elevate by locally executing a specially crafted application designed to manipulate NTLM password change requests..

Impact: Elevation of Privilege Fixes 3 vulnerabilities:

CVE-2016-7220, CVE-2016-7237, CVE-2016-7238Restart Required: Requires Restart

Page 21: November2016 patchtuesdayshavlik

MS16-138: Security Update to Microsoft Virtual Hard Disk Driver (3199647)

Maximum Severity: ImportantAffected Products: Windows Description: This security update resolves vulnerabilities in Microsoft Windows. The Windows Virtual Hard Disk Driver improperly handles user access to certain files. An attacker could manipulate files in locations not intended to be available to the user by exploiting this vulnerability.

Impact: Elevation of Privilege Fixes 4 vulnerabilities:

CVE-2016-7223, CVE-2016-7224, CVE-2016-7225, CVE-2016-7226Restart Required: Requires Restart

Page 22: November2016 patchtuesdayshavlik

MS16-139: Security Update for Windows Kernel (3199720)

Maximum Severity: ImportantAffected Products: Windows Description: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application to access sensitive information. A locally authenticated attacker could attempt to exploit this vulnerability by running a specially crafted application. An attacker can gain access to information not intended to be available to the user by using this method.

Impact: Elevation of Privilege Fixes 1 vulnerabilities:

CVE-2016-7216Restart Required: Requires Restart

Page 23: November2016 patchtuesdayshavlik

MS16-140: Security Update for Boot Manager (3193479)

Maximum Severity: ImportantAffected Products: Windows Description: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if a physically-present attacker installs an affected boot policy.

Impact: Security Feature BypassFixes 1 vulnerabilities:

CVE-2016-7247Restart Required: Requires Restart

Page 24: November2016 patchtuesdayshavlik

Between Patch Tuesdays New Product Support: Server 2016, .Net 4.6.2, Infopath for Office 365, RealVNC Connect 6Security Updates: Chrome (3), Open Office (1), Microsoft (7), Opera (2), Skype (2), Foxit Reader (1), Java 8 (1), Firefox (1), GoToMeeting (2), Tomcat (1), VMware Tools (1), Flash Player (1), UltraVNC (1), iTunes (1), Filezilla, HP System Management Homepage (1), iTunes (1), Acrobat Reader (1), Non-Security Updates: Google Earth (1), PDFCreator (1), Tomcat (2), Microsoft (46) , Ccleaner (1), Google Drive (1), Notepad++ (1), Foxit Phantom (1), GoodSync (2), Java 8 (1), MozyHome (1), CDBurnerXP (1), Dropbox (1), Citrix Delivery Controller (1), Zimbra (1), SnagIt (1), Libre Office (2), Winzip (1), VMware Player (1), Filezilla (1), PeaZip (1) Security Tools:

Page 25: November2016 patchtuesdayshavlik
Page 26: November2016 patchtuesdayshavlik

Resources and Webinars

Get Shavlik Content Updates

Get Social with Shavlik

Sign up for next months Patch Tuesday Webinar

Watch previous webinars and download presentation.

Page 27: November2016 patchtuesdayshavlik

Thank you