Microsoft closes the year with major security updates for its products

Khushaar Tanveer avatar. By: Khushaar Tanveer
4 minute read

Home » Microsoft closes the year with major security updates for its products

With 2016 almost reaching its departure, Microsoft released their one last ‘Patch Tuesday‘ update for the year. This update has by far the highest number of security updates released in a single patch. It features six critical patches, with the remaining six rated as important. It covered 34 individual flaws, all of which if exploited could lead to Remote Code Execution. So get ready for restarts. It is favorable to not delay the deployment of these patches. Since three of them, address vulnerabilities which have been publicly disclosed.

The critical flaws are explained in bulletins MS16-144, MS16-145, MS16-146, MS16-147, MS16-148, and MS16-154. They are said to overcome susceptibilities in Windows, Internet Explorer, Edge, and Office. More specifically, the glitch Windows 10 users were facing while connecting to the internet after the last wave of patches released by Microsoft.

Marked ‘Critical’:

MS16-144

MS16-144 is released to address a plethora of bugs in Internet Explorer. It also fixes a couple of glitches which tend to cause information leaks and one that could lead to a breach of information in Windows hyperlink object library. This patch will be included in the December monthly security update for Windows.

Here are the publicly disclosed flaws

  • CVE-2016-7282 – a Microsoft browser information disclosure vulnerability.
  • CVE-2016-7281 – the Microsoft browser security feature bypass bug.
  • A CVE-2016-7202 – a scripting engine memory corruption anomaly.

This update has been rated “Patch Now”, mainly because of the severity of the issue it is designated to fix. MS16-144 will be applied to all currently supported versions of IE.

MS16-145

MS16-145 overhauls several of the reported bugs in Microsoft’s ‘new and improved’ Edge browser. The number of reported glitches are surprisingly even more than Internet Explorer, that is censured with 11 flaws. MS16-145 solves these critical issues.

  • Five of the usual scripting engine flaws.
  • Two of the memory corruption bug.
  • A security feature bypass.

MS16-146

MS16-146 tends to patch critical Remote Code Execution vulnerabilities in the Microsoft Graphics Component of Windows. Moreover, it fixes the  Windows GDI information disclosure flaw.  All these vulnerabilities are privately reported. The patch is to replace last month’s graphic component update for all Windows 10 and Server 2016 systems.

It is also the second patch for Windows Security Only or “roll-up” update for this month.

MS16-147

MS16-147  is released to solely address a persisting liability in Windows Uniscribe. The bug is said to set-off a Remote Code Execution scenario. That is if users visit a specially crafted website or open a specially crafted document. It is certainly something we don’t see every month.

For those who don’t know, the Uniscribe component is a collection of API’s, which are meant to handle typography in Windows for different languages.

MS16-148

The MS16-148 is released to address a galore of Remote Code Execution vulnerabilities. The 16 privately inscribed flaws persist in Microsoft Office. The severity of the glitches can be determined by the fact that if left unpatched, they could lead to a Remote Code Execution scenario on the target system. Here’s the list of glitches:

  • Four memory corruption bugs.
  • An Office OLE DLL side-loading problem.
  • A bug that discloses critical GDI information along with several others.

MS16-154

The MS16-154 patch is a wrapper and remediates crucial flaws in the embedded Adobe Flash Player. This is potentially the most dangerous issue if left unpatched. It is said to fix 17 problems including one flaw that is currently running in the wild. Microsoft has surprisingly suggested a mitigating factor for this issue. It is astonishing because the company usually never does that. The workaround is to Uninstall Flash completely.

Reports regarding a zero-day vulnerability have been received, which managed to compromise 32-bit Internet Explorer systems. So, this is a critical “Patch Now” update.

It addresses:

  • Four buffer overflow bugs.
  • Five memory corruption issues that could potentially cause Remote Code Execution.

Marked ‘Important’:

MS16-149

The patch is released to resolve two privately reported issues in Windows.

  • A Windows crypto information disclosure flaw, that involves object handling in memory.
  • A bug that leads to elevation of privilege in Windows cryptography component.

MS16-149 will be added to this month’s security roll-up.

MS16-150

This is a security update for a sole vulnerability, reported privately. MS16-150 regards to Windows Kernel’s persisting issue that could compromise user privileges. It is mainly caused by mishandling objects in memory.

MS16-151

MS16-151 attempts to overhaul a couple of minor bugs. Each privately reported and are estimated to cause minimal harm. One is related to the Win32k EoP flaw in Windows Kernel mode drivers. The other issue it addresses is the Windows graphics component, mishandling objects in memory.

MS16-152

MS16-152  is a security patch for Windows Kernel and aims to address a sole liability. It is a privately reported vulnerability in Windows Kernel that only affects Windows 10 and Server 2016 systems. The bug is known to cause information disclosure, at worst. This patch will be bundled with the Windows monthly roll-up.

MS16-153

This patch resolves a single information disclosure glitch, also privately stated. The bug persists in a Windows driver sub-system, triggered by updating the Common Log File System (CLFS).

MS16-155

MS16-155 repairs a .NET framework liability. Microsoft noted that the bug is publicly disclosed but is not being exploited. It is potentially a lower risk vulnerability and has its own update package. Therefore, it has been spared from inclusion in the Windows quality and security roll-ups.

That is enough you need to know about each security update of this year’s final Patch Tuesday. So until next year, Happy Patching.

Related Stories you should read:

Discussions

Next up

Top 5 YouTube live-streaming software to get more followers

Vladimir Popescu avatar. By: Vladimir Popescu
Less than a 1 minute read

Live streaming is quickly becoming one of the most important ways people use to broadcast themselves online. People use live streaming to cover a wide […]

Continue Reading

How to fix corrupted Ableton files on Windows 10

Vladimir Popescu avatar. By: Vladimir Popescu
3 minute read

There is nothing worse than getting an error message when trying to open your Ableton Live set. All the hard work you put in seems […]

Continue Reading

How to fix corrupted memory dump effectively and efficiently

Sovan Mandal avatar. By: Sovan Mandal
3 minute read

It isn’t every day that you come across a corrupted memory dump file But when you do, you will rue your luck you did. That […]

Continue Reading