Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

October2016 patchtuesdayshavlik

379 views

Published on

Patch Tuesday October 2016

Published in: Software
  • Be the first to comment

  • Be the first to like this

October2016 patchtuesdayshavlik

  1. 1. Patch Tuesday Webinar Wednesday, October 11th, 2016 Chris Goettl • Product Manager, Shavlik Dial In: 1-855-749-4750 (US) Attendees: 925 670 957
  2. 2. Agenda October 2016 Patch Tuesday Overview Known Issues Bulletins Q & A 1 2 3 4
  3. 3. Best Practices Privilege Management Mitigates Impact of many exploits High Threat Level vulnerabilities warrant fast rollout. 2 weeks or less is ideal to reduce exposure. User Targeted – Whitelisting and Containerization mitigate
  4. 4. Industry News Microsoft implements servicing change for Windows 7, 8.1, and Server 2008 R2, 2012, 2012 R2 • Internet Explorer and OS updates in one of two options: • Security Bundle – Monthly bundle of Security only updates • Cumulative Rollup – Similar to Windows 10 cumulative bundle of Security and Non-Security updates in one package • .Net Rollup – Cumulative Bundle each month that applies. Will update only versions detected, not install new versions. • Flash Player for IE and OS • Office, SharePoint, SQL, Exchange, etc are not affected by the change set for October Adobe updated Flash Player distribution announcement. Sept 29th If you have not already done so, get an Adobe ID and sign up for the distribution agreement. ESR has also EOLed.
  5. 5. CSWU-036: Cumulative update for Windows 10: October 11, 2016  Maximum Severity: Critical  Affected Products: Windows 10, Edge, Internet Explorer  Description: This update for Windows 10 includes functionality improvements and resolves the vulnerabilities in Windows that are described in the following Microsoft security bulletins and advisory: MS16-118, MS16-119, MS16-120, MS16-122, MS16-123, MS16-124, MS16-125  Impact: Remote Code Execution, Elevation of Privilege, Information Disclosure  Fixes 42 vulnerabilities:  CVE-2016-3267, CVE-2016-3298 (Exploited), CVE-2016-3331, CVE-2016-3382, CVE-2016-3383, CVE-2016-3384, CVE-2016- 3385, CVE-2016-3387, CVE-2016-3388, CVE-2016-3390, CVE-2016-3391, CVE-2016-3267, CVE-2016-3331, CVE-2016-3382, CVE-2016-3386, CVE-2016-3387, CVE-2016-3388, CVE-2016-3389, CVE-2016-3390, CVE-2016-3391, CVE-2016-3392, CVE-2016- 7189 (Exploited), CVE-2016-7190, CVE-2016-7194, CVE-2016-3209, CVE-2016-3262, CVE-2016-3263, CVE-2016-3270, CVE- 2016-3393 (Exploited), CVE-2016-3396, CVE-2016-7182, CVE-2016-0142, CVE-2016-3266, CVE-2016-3341, CVE-2016-3376, CVE-2016-7185, CVE-2016-7191, CVE-2016-0070, CVE-2016-0073, CVE-2016-0075, CVE-2016-0079, CVE-2016-7188, APSB16- 32  Restart Required: Requires Restart
  6. 6. SB16-001: October, 2016 Security Only Quality Update  Maximum Severity: Critical  Affected Products: Windows, Internet Explorer  Description: This update is the Security Only Quality Update for Windows 7, 8.1, Server 2008 R2, 2012, and 2012 R2 systems: MS16-118, MS16-120, MS16-122, MS16-123, MS16-124, MS16-126  Impact: Remote Code Execution, Elevation of Privilege, Information Disclosure  Fixes 29 vulnerabilities:  CVE-2016-3267, CVE-2016-3298 (Exploited), CVE-2016-3331, CVE-2016-3382, CVE-2016-3383, CVE-2016-3384, CVE-2016- 3385, CVE-2016-3387, CVE-2016-3388, CVE-2016-3390, CVE-2016-3391, CVE-2016-3209, CVE-2016-3262, CVE-2016-3263, CVE-2016-3270, CVE-2016-3393 (Exploited), CVE-2016-3396, CVE-2016-7182, CVE-2016-0142, CVE-2016-3266, CVE-2016- 3341, CVE-2016-3376, CVE-2016-7185, CVE-2016-7191, CVE-2016-0070, CVE-2016-0073, CVE-2016-0075, CVE-2016-0079, CVE-2016-3298 (Exploited)  Restart Required: Requires Restart
  7. 7. CR16-001: October, 2016 Security Monthly Quality Update  Maximum Severity: Critical  Affected Products: Windows, Internet Explorer  Description: This update is the Security Monthly Quality Update for Windows 7, 8.1, Server 2008 R2, 2012, and 2012 R2 systems: MS16-118, MS16-120, MS16-122, MS16-123, MS16-124, MS16-126  Impact: Remote Code Execution, Elevation of Privilege, Information Disclosure  Fixes 29 vulnerabilities:  CVE-2016-3267, CVE-2016-3298 (Exploited), CVE-2016-3331, CVE-2016-3382, CVE-2016-3383, CVE-2016-3384, CVE-2016- 3385, CVE-2016-3387, CVE-2016-3388, CVE-2016-3390, CVE-2016-3391, CVE-2016-3209, CVE-2016-3262, CVE-2016-3263, CVE-2016-3270, CVE-2016-3393 (Exploited), CVE-2016-3396, CVE-2016-7182, CVE-2016-0142, CVE-2016-3266, CVE-2016- 3341, CVE-2016-3376, CVE-2016-7185, CVE-2016-7191, CVE-2016-0070, CVE-2016-0073, CVE-2016-0075, CVE-2016-0079, CVE-2016-3298 (Exploited)  Restart Required: Requires Restart
  8. 8. MS16-118: Cumulative Security Update for Internet Explorer (3192887)  Maximum Severity: Critical  Affected Products: Internet Explorer  Description: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.  Impact: Remote Code Execution  Fixes 12 vulnerabilities:  CVE-2016-3267, CVE-2016-3298 (Exploited), CVE-2016-3331, CVE-2016-3382, CVE-2016-3383, CVE-2016-3384, CVE-2016- 3385, CVE-2016-3387, CVE-2016-3388, CVE-2016-3390, CVE-2016-3391  Restart Required: Requires Restart
  9. 9. MS16-119: Cumulative Security Update for Microsoft Edge (3192890)  Maximum Severity: Critical  Affected Products: Edge  Description: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.  Impact: Remote Code Execution  Fixes 13 vulnerabilities:  CVE-2016-3267, CVE-2016-3331, CVE-2016-3382, CVE-2016-3386, CVE-2016-3387, CVE-2016-3388, CVE-2016-3389, CVE-2016- 3390, CVE-2016-3391, CVE-2016-3392, CVE-2016-7189 (Exploited), CVE-2016-7190, CVE-2016-7194  Restart Required: Requires Restart
  10. 10. MS16-120: Security Update for Microsoft Graphics Component (3192884)  Maximum Severity: Critical  Affected Products: Windows, .Net, Office, Skype, Lync, Silverlight  Description: This security update resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Skype for Business, Silverlight, and Microsoft Lync. The most serious of these vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.  Impact: Remote Code Execution  Fixes 7 vulnerabilities:  CVE-2016-3209, CVE-2016-3262, CVE-2016-3263, CVE-2016-3270, CVE-2016-3393 (Exploited), CVE-2016-3396, CVE-2016- 7182,  Restart Required: Requires Restart
  11. 11. MS16-121: Security Update for Microsoft Office (3194063)  Maximum Severity: Important  Affected Products: Office, SharePoint  Description: This security update resolves a vulnerability in Microsoft Office. An Office RTF remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle RTF files. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.  Impact: Remote Code Execution  Fixes vulnerabilities:  CVE-2016-7193 (Exploited)  Restart Required: May Require Restart
  12. 12. MS16-122: Security Update for Microsoft Video Control (3195360)  Maximum Severity: Critical  Affected Products: Windows  Description: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if Microsoft Video Control fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. However, an attacker must first convince a user to open either a specially crafted file or a program from either a webpage or an email message.  Impact: Remote Code Execution  Fixes vulnerabilities:  CVE-2016-0142  Restart Required: Requires Restart
  13. 13. MS16-127: Security Update for Adobe Flash Player (3194343)  Maximum Severity: Critical  Affected Products: Adobe Flash Player Plug-In for IE  Description: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10..  Impact: Remote Code Execution  Fixes 12 vulnerabilities:  CVE-2016-4273, CVE-2016-4286, CVE-2016-6981, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016- 6986, CVE-2016-6987, CVE-2016-6989, CVE-2016-6990, CVE-2016-6992  Restart Required: Requires Restart
  14. 14. APSB16-32: Security updates available for Adobe Flash Player  Maximum Severity: Critical  Affected Products: Adobe Flash Player  Description: Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and ChromeOS. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system. .  Impact: Remote Code Execution  Fixes 12 vulnerabilities:  CVE-2016-4273, CVE-2016-4286, CVE-2016-6981, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016- 6986, CVE-2016-6987, CVE-2016-6989, CVE-2016-6990, CVE-2016-6992  Restart Required: Requires Restart
  15. 15. MS16-123: Security Update for Windows Kernel-Mode Drivers (3192892)  Maximum Severity: Important  Affected Products: Windows  Description: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.  Impact: Elevation of Privilege  Fixes 5 vulnerabilities:  CVE-2016-3266, CVE-2016-3341, CVE-2016-3376, CVE-2016-7185, CVE-2016-7191  Restart Required: Requires Restart
  16. 16. MS16-124: Security Update for Windows Registry (3193227)  Maximum Severity: Important  Affected Products: Windows  Description: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker can access sensitive registry information.  Impact: Elevation of Privilege  Fixes 4 vulnerabilities:  CVE-2016-0070, CVE-2016-0073, CVE-2016-0075, CVE-2016-0079  Restart Required: Requires Restart
  17. 17. MS16-125: Security Update for Diagnostics Hub (3193229)  Maximum Severity: Important  Affected Products: Windows  Description: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application.  Impact: Elevation of Privilege  Fixes 1 vulnerabilities:  CVE-2016-7188  Restart Required: Requires Restart
  18. 18. MS16-126: Security Update for Microsoft Internet Messaging API (3196067)  Maximum Severity: Moderate  Affected Products: Windows  Description: This security update resolves a vulnerability in Microsoft Windows. An information disclosure vulnerability exists when the Microsoft Internet Messaging API improperly handles objects in memory. An attacker who successfully exploited this vulnerability could test for the presence of files on disk.  Impact: Information Disclosure  Fixes 1 vulnerabilities:  CVE-2016-3298 (Exploited)  Restart Required: Requires Restart
  19. 19. APSB16-33: Security Updates Available for Adobe Acrobat and Reader  Maximum Severity: Important  Affected Products: Adobe Acrobat and Reader  Description: Adobe has released security updates for Adobe Acrobat and Reader for Windows and Macintosh. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.  Impact: Remote Code Execution  Fixes 77 vulnerabilities:  CVE-2016-1089, CVE-2016-1091, CVE-2016-6939, CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016- 6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6947, CVE-2016-6948, CVE-2016-6949, CVE-2016-6950, CVE-2016-6951, CVE-2016-6952, CVE-2016-6953, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6957, CVE-2016-6958, CVE-2016- 6959, CVE-2016-6960, CVE-2016-6961, CVE-2016-6962, CVE-2016-6963, CVE-2016-6964, CVE-2016-6965, CVE-2016-6966, CVE-2016-6967, CVE-2016-6968, CVE-2016-6969, CVE-2016-6970, CVE-2016-6971, CVE-2016-6972, CVE-2016-6973, CVE-2016- 6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6979, CVE-2016-6988, CVE-2016-6993, CVE-2016-6994, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-6999, CVE-2016-7000, CVE-2016- 7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016- 7016, CVE-2016-7017, CVE-2016-7018, CVE-2016-7019  Restart Required: May Require Restart
  20. 20. Between Patch Tuesdays New Product Support: Notepad++ x64, Windows 10 LTSB 2016 x86x64 Security Updates: Microsoft (5), Google Chrome (2), FireFoxESR (3), Tomcat (1), Opera (3), Notepad++ (1), 7Zip (2), Shockwave (1), Filezilla (2), Thunderbird (1), Wireshark (1), Non-Security Updates: Microsoft (33), Citrix Receiver (1), VMware Player (1), WinSCP (1), Dropbox (3), PDF-Xchange Pro (1), Slack (1), TeamViewer (2), CoreFTP (1), GoodSync (5), Libre Office (1), Splunk Universal Forwarder (1), TightVNC (1), Google Drive (1), HipChat (1), Security Tools:
  21. 21. Resources and Webinars Get Shavlik Content Updates Get Social with Shavlik Sign up for next months Patch Tuesday Webinar Watch previous webinars and download presentation.
  22. 22. Thank you

×