MS Security Bulletin - revisions/updates
FYI...
MS Security Bulletin MS16-003 - Critical
Cumulative Security Update for JScript and VBScript to Address Remote Code Execution (3125540)
- https://technet.microsoft.com/en-us/...urity/MS16-003
V1.1 (May 25, 2016): Removed redundant rows from the Vulnerability Severity Rating and Maximum Security Impact by Affected Software table, and added the applicable update numbers for clarity. This is an informational change only.
___
Microsoft Security Bulletin MS15-126 - Critical
Cumulative Security Update for JScript and VBScript to Address Remote Code Execution (3116178)
- https://technet.microsoft.com/en-us/...urity/MS15-126
V1.1 (May 25, 2016): Removed redundant rows from the Vulnerability Severity Rating and Maximum Security Impact by Affected Software table, and added the applicable update numbers for clarity. This is an informational change only.
___
Update installs 'Get Windows 10 app' in Windows 8.1 and Windows 7 SP1
- https://support.microsoft.com/en-us/kb/3035583
Last Review: 05/25/2016 17:40:00 - Rev: 14.0
>> http://windowssecrets.com/patch-watc...or-windows-10/
May 25, 2016
GWX Control Panel
> http://blog.ultimateoutsider.com/201...ly-remove.html
Version: 1.7.4.1
April 1, 2016
> http://blog.ultimateoutsider.com/201...notes-and.html
:fear::fear::fear:
MS Security Bulletin Summary - June 2016
FYI...
- https://technet.microsoft.com/en-us/...urity/ms16-jun
June 14, 2016 - "This bulletin summary lists security bulletins released for June 2016...
(Total of -16-)
Microsoft Security Bulletin MS16-063 - Critical
Cumulative Security Update for Internet Explorer (3163649)
- https://technet.microsoft.com/library/security/MS16-063
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer
Microsoft Security Bulletin MS16-068 - Critical
Cumulative Security Update for Microsoft Edge (3163656)
- https://technet.microsoft.com/library/security/MS16-068
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Microsoft Edge
Microsoft Security Bulletin MS16-069 - Critical
Cumulative Security Update for JScript and VBScript (3163640)
- https://technet.microsoft.com/library/security/MS16-069
Critical - Remote Code Execution - May require restart - Microsoft Windows
Microsoft Security Bulletin MS16-070 - Critical
Security Update for Microsoft Office (3163610)
- https://technet.microsoft.com/library/security/MS16-070
Critical - Remote Code Execution - May require restart - Microsoft Office, Microsoft Office Services and Web Apps
Microsoft Security Bulletin MS16-071 - Critical
Security Update for Microsoft Windows DNS Server (3164065)
- https://technet.microsoft.com/library/security/MS16-071
Critical - Remote Code Execution - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS16-072 - Important
Security Update for Group Policy (3163622)
- https://technet.microsoft.com/library/security/MS16-072
Important - Elevation of Privilege - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS16-073 - Important
Security Update for Windows Kernel-Mode Drivers (3164028)
- https://technet.microsoft.com/library/security/MS16-073
Important - Elevation of Privilege - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS16-074 - Important
Security Update for Microsoft Graphics Component (3164036)
- https://technet.microsoft.com/library/security/MS16-074
Important - Elevation of Privilege - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS16-075 - Important
Security Update for Windows SMB Server (3164038)
- https://technet.microsoft.com/library/security/MS16-075
Important - Elevation of Privilege - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS16-076 - Important
Security Update for Netlogon (3167691)
- https://technet.microsoft.com/library/security/MS16-076
Important - Remote Code Execution - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS16-077 - Important
Security Update for WPAD (3165191)
- https://technet.microsoft.com/library/security/MS16-077
Important - Elevation of Privilege - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS16-078 - Important
Security Update for Windows Diagnostic Hub (3165479)
- https://technet.microsoft.com/library/security/MS16-078
Important - Elevation of Privilege - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS16-079 - Important
Security Update for Microsoft Exchange Server (3160339)
- https://technet.microsoft.com/library/security/MS16-079
Important - Elevation of Privilege - May require restart - Microsoft Windows
Microsoft Security Bulletin MS16-080 - Important
Security Update for Microsoft Windows PDF (3164302)
- https://technet.microsoft.com/library/security/MS16-080
Important - Remote Code Execution - May require restart - Microsoft Windows
Microsoft Security Bulletin MS16-081 - Important
Security Update for Active Directory (3160352)
- https://technet.microsoft.com/library/security/MS16-081
Important - Denial of Service - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS16-082 - Important
Security Update for Microsoft Windows Search Component (3165270)
- https://technet.microsoft.com/library/security/MS16-082
Important - Denial of Service - Requires restart - Microsoft Windows
___
- https://blogs.technet.microsoft.com/...pdate-release/
June 14, 2016
- https://technet.microsoft.com/en-us/.../mt631688.aspx
June 2016 Office Update Release
- https://blogs.technet.microsoft.com/...pdate-release/
June 14, 2016 - "... there are 22 security updates (1 bulletin) and 46 non-security updates.
Security bulletins:
MS16-070: https://technet.microsoft.com/en-us/.../ms16-070.aspx
All of the security and non-security updates for June are listed in KB article 3166910*
* http://support.microsoft.com/kb/3166910
A new version of Office 2013 Click-To-Run is available: 15.0.4833.1001
A new version of Office 2010 Click-To-Run is available: 14.0.7170.5000
For information on Office 365 Click-To-Run updates, see Office 365 client update branch releases:
- https://technet.microsoft.com/en-us/mt465751
___
MS16-063: http://www.securitytracker.com/id/1036096
MS16-068: http://www.securitytracker.com/id/1036099
MS16-069: http://www.securitytracker.com/id/1036097
MS16-070: http://www.securitytracker.com/id/1036093
MS16-071: http://www.securitytracker.com/id/1036095
MS16-072: http://www.securitytracker.com/id/1036100
MS16-073: http://www.securitytracker.com/id/1036109
MS16-074: http://www.securitytracker.com/id/1036101
MS16-075: http://www.securitytracker.com/id/1036110
MS16-076: http://www.securitytracker.com/id/1036103
MS16-077: http://www.securitytracker.com/id/1036104
MS16-078: http://www.securitytracker.com/id/1036105
MS16-079: http://www.securitytracker.com/id/1036106
MS16-080:
MS16-081: http://www.securitytracker.com/id/1036108
MS16-082: http://www.securitytracker.com/id/1036102
___
ISC Analysis
- https://isc.sans.edu/mspatchdays.htm...day=2016-06-14
2016-06-14
Qualys Analysis
- https://blog.qualys.com/laws-of-vuln...sday-june-2016
June 14, 2016 - "... 16 bulletins fixing over 40 distinct vulnerabilities (CVEs). It brings up the half-year total to 81 which projects to a total of over 160 bulletins for 2016, a new record in terms of patches for the last decade..."
.
MS16-039 re-released, Cumulative update for Win10, MS16-072: NOT
FYI...
Microsoft Security Bulletin MS16-039 - Critical
Security Update for Microsoft Graphics Component (3148522)
- https://technet.microsoft.com/librar.../ms16-039.aspx
V3.0 (June 14, 2016): Microsoft has re-released security update 3144427 for affected editions of Microsoft Lync 2010 and Microsoft Lync 2010 Attendee. The re-release addresses issues customers might have experienced downloading security update 3144427. Customers running Microsoft Lync 2010 should install the update to be fully protected from the vulnerability. See Microsoft Knowledge Base Article 3144427* for more information.
* https://support.microsoft.com/en-us/kb/3144427
Last Review: 05/31/2016 00:46:00 - Rev: 4.0
___
Cumulative update for Windows 10
- https://support.microsoft.com/en-us/kb/3163017
Last Review: 06/14/2016 18:16:00 - Rev: 1.0
___
MS16-072 patch/update borks Group Policy...
- http://www.theregister.co.uk/2016/06..._group_policy/
15 Jun 2016 - "... most recent security update is causing problems with Windows Group Policy settings.
Users on Reddit* and Microsoft support forums** are reporting that after the MS16-072 update was installed, changes were made in Group Policy object (GPO) settings that left previously hidden drives and devices accessible..."
* https://www.reddit.com/r/sysadmin/co...to_remove_all/
** https://social.technet.microsoft.com...um=winserverGP
MS16-072: Security update for Group Policy
- https://support.microsoft.com/en-gb/kb/3163622
Last Review: 06/16/2016 21:06:00 - Rev: 4.0
Applies to:
Windows 10 ...
Windows Server 2012 ...
Windows 8.1 ...
Windows Server 2008 ...
Windows 7 SP1
Windows Vista SP2...
[ Known issues:
MS16-072 changes the security context with which user group policies are retrieved. This 'by-design' behavior change protects customers’ computers from a security vulnerability. Before MS16-072 is installed, user group policies were retrieved by using the user’s security context. After MS16-072 is installed, user group policies are retrieved by using the machines security context. This issue is applicable for the following KB articles:
• https://support.microsoft.com/en-us/kb/3159398 - MS16-072: Description of the security update for Group Policy: June 14, 2016
• https://support.microsoft.com/en-us/kb/3163017 - Cumulative update for Windows 10: June 14, 2016
• https://support.microsoft.com/en-us/kb/3163018 - Cumulative update for Windows 10 Version 1511 and Windows Server 2016 Technical Preview 4: June 14, 2016
• https://support.microsoft.com/en-us/kb/3163016 - Cumulative Update for Windows Server 2016 Technical Preview 5: June 14 2016
Symptoms: All user Group Policy, including those that have been security filtered on user accounts or security groups, or both, may fail to apply on domain joined computers.
Cause: This issue may occur if the Group Policy Object is missing the Read permissions for the Authenticated Users group or if you are using security filtering and are missing Read permissions for the domain computers group.
Resolution: To resolve this issue, use the Group Policy Management Console (GPMC.MSC) and follow one of the following steps:
Add the Authenticated Users group with Read Permissions on the Group Policy Object (GPO).
If you are using security filtering, add the Domain Computers group with read permission. ]
> https://blogs.technet.microsoft.com/...to-check-gpos/
June 16, 2016
>> https://social.technet.microsoft.com...um=winserverGP
"... uninstalled this update and rebooted, everything was back to normal..."
Related: MS16-072: Description of the security update for Group Policy
> https://support.microsoft.com/en-us/kb/3159398
Last Review: 06/16/2016 21:18:00 - Rev: 2.0
See "Known issues"
> https://support.microsoft.com/en-us/kb/3163016
Last Review: 06/16/2016 21:09:00 - Rev: 2.0
Applies to: Windows Server 2016
See "Known issues"
> https://support.microsoft.com/en-us/kb/3163017
Last Review: 06/16/2016 21:14:00 - Rev: 2.0
Applies to: Windows 10
See "Known issues"
> https://support.microsoft.com/en-us/kb/3163018
Last Review: 06/15/2016 08:02:00 - Rev: 2.0
Applies to: Windows Server 2016... Windows 10
:fear:
Win7SP1 - WinSvr2008R2 updates revised
FYI... Win7SP1 - WinSvr2008R2 updates revised
June 2016 update rollup for Win7SP1 and Windows Svr 2008 R2 SP1
- https://support.microsoft.com/en-us/kb/3161608
Last Review: 06/22/2016 10:00:00 - Rev: 2.0
"The June 2016 update rollup package for Windows 7 Service Pack 1 (SP1) and Windows Server 2008 R2 SP1 fixes issues and includes performance and reliability improvements. We recommend that you apply this update rollup as part of your regular maintenance routines...
Method 1: Windows Update: This update is provided as an -Optional- update on Windows Update..."
>> http://www.infoworld.com/article/308...ate-scans.html
Jun 22, 2016
___
Windows Update Client for Win7 and Windows Svr 2008 R2
- https://support.microsoft.com/en-us/kb/3161647
Last Review: 06/21/2016 17:25:00 - Rev: 2.0
"This update contains some improvements to Windows Update Client in Windows 7 Service Pack 1 (SP1) and Windows Server 2008 R2 SP1. This includes the following:
• An optimization that addresses long scan time for updates that's reported on some computers.
• Fix for a Windows Update error 0x8007000E on some computers while they are updating.
• Some reliability improvements..."
:fear::fear:
Compatibility update for upgrading Win7-Win8 Rev 23.0, 27.0
FYI...
Compatibility update for upgrading Windows 7
- https://support.microsoft.com/en-us/kb/2952664
Last Review: 07/05/2016 16:22:00 - Rev: 23.0
Applies to:
Windows 7 SP1
___
Compatibility update for Windows 8.1 and Windows 8
- https://support.microsoft.com/en-us/kb/2976978
Last Review: 07/05/2016 16:23:00 - Rev: 27.0
Applies to:
Windows 8.1 Enterprise, Windows 8.1, Windows 8.1 Pro, Windows 8 Enterprise, Windows 8, Windows 8 Pro
___
> http://www.infoworld.com/article/309...l-3170735.html
Jul 6, 2016
- https://support.microsoft.com/en-us/kb/2977759
Last Review: 07/05/2016 16:24:00 - Rev: 23.0
Applies to:
Windows 7 Enterprise, Windows 7 Home Premium, Windows 7 Home Basic, Windows 7 Professional, Windows 7 Starter, Windows 7 Ultimate
Update for Journal.dll binary in Windows
- https://support.microsoft.com/en-us/kb/3138378
Last Review: 05/10/2016 17:25:00 - Rev: 4.0
Applies to:
Windows Server 2012 R2 Datacenter, Windows Server 2012 R2 Standard, Windows Server 2012 R2 Essentials, Windows Server 2012 R2 Foundation, Windows 8.1 Enterprise, Windows 8.1 Pro, Windows 8.1, Windows RT 8.1, Windows Server 2012 Datacenter, Windows Server 2012 Standard, Windows Server 2012 Essentials, Windows Server 2012 Foundation, Windows Server 2008 R2 Service Pack 1, Windows 7 Service Pack 1, Windows Server 2008 Service Pack 2, Windows Vista Service Pack 2
:fear::fear:
July 2016 'Non-Security' Office Update Release / MS16-072 more detail
FYI...
July 2016 'Non-Security' Office Update Release
> https://blogs.technet.microsoft.com/...pdate-release/
July 5, 2016
"Listed below are the non-security updates we released on Microsoft Update and the Download Center today. See the linked KB articles for more information.
Office 2007: Update for Microsoft Office Outlook 2007 Junk Email Filter (KB3115307)*
Office 2010: Definition Update for Microsoft Office 2010 (KB3115321)**
Office 2013 ...
Office 2016 ..."
* https://support.microsoft.com/en-us/kb/3115307
Last Review: 07/05/2016 16:32:00 - Rev: 1.0
** https://support.microsoft.com/en-us/kb/3115321
Last Review: 07/05/2016 16:33:00 - Rev: 1.0
___
MS posts -more- details for botched permissions in MS16-072
- http://www.infoworld.com/article/309...-ms16-072.html
Jul 6, 2016 - "... The patch caused problems, though - not with client-side computers, but in the way admins have set permissions for Group Policies - on the server side..."
:spider:
MS Security Bulletin Summary - July 2016
FYI...
- https://technet.microsoft.com/library/security/ms16-jul
July 12, 2016
MS16-084 – MS16-094
(Total of -11-)
Microsoft Security Bulletin MS16-084 - Critical
Cumulative Security Update for Internet Explorer (3169991)
- https://technet.microsoft.com/library/security/MS16-084
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer
Microsoft Security Bulletin MS16-085 - Critical
Cumulative Security Update for Microsoft Edge (3169999)
- https://technet.microsoft.com/library/security/MS16-085
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Microsoft Edge
Microsoft Security Bulletin MS16-086 - Critical
Cumulative Security Update for JScript and VBScript (3169996)
- https://technet.microsoft.com/library/security/MS16-086
Critical - Remote Code Execution - May require restart - Microsoft Windows
Microsoft Security Bulletin MS16-087 - Critical
Security Update for Windows Print Spooler Components (3170005)
- https://technet.microsoft.com/library/security/MS16-087
Critical - Remote Code Execution - May require restart - Microsoft Windows
Microsoft Security Bulletin MS16-088 - Critical
Security Update for Microsoft Office (3170008)
- https://technet.microsoft.com/library/security/MS16-088
Critical - Remote Code Execution - May require restart - Microsoft Office, Microsoft Office Services and Web Apps
Microsoft Security Bulletin MS16-089 - Important
Security Update for Windows Secure Kernel Mode (3170050)
- https://technet.microsoft.com/library/security/MS16-089
Important - Information Disclosure - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS16-090 - Important
Security Update for Windows Kernel-Mode Drivers (3171481)
- https://technet.microsoft.com/library/security/MS16-090
Important - Elevation of Privilege - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS16-091 - Important
Security Update for .NET Framework (3170048)
- https://technet.microsoft.com/library/security/MS16-091
Important - Information Disclosure - May require restart - Microsoft Windows, Microsoft .NET Framework
Microsoft Security Bulletin MS16-092 - Important
Security Update for Windows Kernel (3171910)
- https://technet.microsoft.com/library/security/MS16-092
Important - Security Feature Bypass - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS16-093 - Critical
Security Update for Adobe Flash Player (3174060)
- https://technet.microsoft.com/library/security/MS16-093
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Adobe Flash Player
Microsoft Security Bulletin MS16-094 - Important
Security Update for Secure Boot (3177404)
- https://technet.microsoft.com/library/security/MS16-094
Important - Security Feature Bypass - Requires restart - Microsoft Windows
___
July 2016 Office Update Release
- https://blogs.technet.microsoft.com/...pdate-release/
July 12, 2016 - "... This month, there are -26- security updates (1 bulletin) and -41- non-security updates.
Security bulletins: MS16-088: https://technet.microsoft.com/en-us/.../ms16-088.aspx
All of the security and non-security updates for June are listed in KB article 3173835* ..."
* https://support.microsoft.com/en-us/kb/3173835
Last Review: 07/12/2016 16:32:00 - Rev: 1.0
___
MS16-084: http://www.securitytracker.com/id/1036283
MS16-085: http://www.securitytracker.com/id/1036286
MS16-086: http://www.securitytracker.com/id/1036282
MS16-087: http://www.securitytracker.com/id/1036277
MS16-088: http://www.securitytracker.com/id/1036274
- http://www.securitytracker.com/id/1036275
MS16-089: http://www.securitytracker.com/id/1036287
MS16-090: http://www.securitytracker.com/id/1036288
MS16-091: http://www.securitytracker.com/id/1036291
MS16-092: http://www.securitytracker.com/id/1036289
MS16-093:
MS16-094: http://www.securitytracker.com/id/1036290
___
ISC Analysis: https://isc.sans.edu/diary.html?storyid=21249
2016-07-12: https://isc.sans.edu/mspatchdays.htm...day=2016-07-12
Qualys Analysis: https://blog.qualys.com/laws-of-vuln...soft-and-adobe
July 12, 2016 - "... 11 security updates that affect a host of desktop and server systems. Six updates are categorized as Critical while the rest are categorized as Important. All critical updates released today affect desktop systems. Top priority should be given to fixing browsers and Office which includes MS16-084 that affects Internet Explorer, MS16-085 which affects Microsoft Edge and MS16-088 for Office. All three updates fix vulnerabilities that allow an attacker to take complete control of the victim’s machine and therefore these should be patched immediately... Adobe Reader is back after being dormant for three months. Adobe has released APSB16-26 which fixes 30 vulnerabilities on Windows and Mac platforms. Many vulnerabilities fixed by APSB16-26 allows an attacker to take complete control of the victim machine and we recommend applying patch for this critical issue as soon as possible. This is the third Acrobat Reader fix in 2016 while the count of Adobe Flash is more than double. Adobe has also released an update for its Flash Player – APSB16-25 which fixes -52- vulnerabilities... we recommend applying the Flash and Reader update immediately..."
.
'Get Windows 10 app' - Rev 16.0
FYI...
Update installs 'Get Windows 10 app' in Win8.1 and Win7SP1
- https://support.microsoft.com/en-us/kb/3035583
Last Review: 07/19/2016 20:10:00 - Rev: 16.0
Applies to:
Windows 8.1 Pro
Windows 8.1
Windows 7 SP1
Win10 NAG screen: http://core0.staticworld.net/images/...large.idge.jpg
___
GWX Control Panel
> http://ultimateoutsider.com/downloads/
"... disable 'Upgrade to Windows 10' behavior in the Windows Update control panel"
- http://www.infoworld.com/article/309...yet-again.html
Jul 20, 2016
:fear::fear:
Update for Windows Journal component removal / Win10 upgrade stuck at 99 percent
FYI...
Update for Windows Journal component removal
- https://support.microsoft.com/en-us/kb/3161102
Article ID: 3161102 - Last Review: 07/29/2016 03:01:00 - Rev: 2.0
Applies to:
Windows 8.1 Enterprise, Windows 8.1 Pro, Windows 8.1, Windows 7 Service Pack 1
"Known issues in this update: This update does not work on Windows Embedded 7 and should not be installed on that operating system.
Remove Windows Journal Component: This update removes the Windows Journal component. We recommend that all users install this update immediately..."
___
Windows 10 upgrade stuck at 99 percent? Here are your options
- http://www.infoworld.com/article/310...r-options.html
Jul 28, 2016
> http://answers.microsoft.com/en-us/w...a-d2553f2fd645
___
Excel Workbooks may not open after installing MS16-088
- https://blogs.technet.microsoft.com/...ling-ms16-088/
"... Update 7/28/2016
Update: Our dev team is working on options to preserve security and assist customers with their workflow. Currently we do not have any further workarounds.
Additional background: The security update changed how Excel handles documents that are opened from untrusted locations (such the Internet zone) which are not supported in Protected View, such as HTML/XML/XLA files. Opening them without Protected View has led to a security vulnerability, and therefore files open from such locations are now blocked. We realize this breaks compatibility with some existing solutions, and are working on getting these file types supported with Protected View. Until that happens, users will need to manually trust the file before they open them in Excel, as demonstrated in one of the workaround suggestions. Excel can still open these files without an issue if they are trusted.
We strongly recommend against removing the security update..."
See: 'Additional info' for Office 2016, 2013, 2010 on '0ffice Trusted Locations'.
:fear::fear: