Skip to comments.
It's [month] of 2016, and your Windows PC can still be owned by [document type] (Patch Tuesday)
The Register ^
| Jun 14, 2016
| Shaun Nichols
Posted on 06/15/2016 9:14:42 AM PDT by dayglored
The Microsoft Security Bulletin
Critical fixes for Office, Internet Explorer, and Windows DNS Server highlight this month's edition of Patch Update Tuesday.
The Redmond Windows slinger has kicked out 16 bulletins this month, five rated as "critical" and the remaining 11 considered "important" risks.
[Detailed listing clipped, see comment]
Not to be outdone, Adobe is also dumping a load of patches for the second Tuesday of the month.
The Adobe patches include an actively targeted vulnerability in Flash and multiple updates for ColdFusion, Brackets, Creative Cloud desktop application and DNG SDK.
(Excerpt) Read more at theregister.co.uk ...
TOPICS: Business/Economy; Computers/Internet; Hobbies
KEYWORDS: microsuck; patchtuesday; windows; windowspinglist; windowsupdates
You know the drill...
- MS16-063 addresses 10 CVE-listed vulnerabilities in Internet Explorer 11 running on Windows 7 through Windows 10. The fix includes remote code execution flaws exploited through malicious web pages.
- MS16-068 is a fix for eight CVE-listed flaws in Edge. Like the IE flaws, the Edge vulnerabilities would allow remote code execution simply by viewing a web page on the Edge browser.
- MS16-069 addresses three flaws in the VBscript and JScript engines in Windows Vista and Server 2008/R2. The flaws would allow remote code execution by way of a specially crafted website.
- MS16-070 patches critical flaws in Microsoft Office that could be exploited by opening a malicious Office file. The update fixes three remote code execution flaws and one information disclosure vulnerability.
- MS16-071 patches a single CVE-listed remote code execution vulnerability in Windows Server 2012 and Server 2012 R2. The flaw would allow remote code execution by sending malicious DNS requests.
- MS16-072 addresses a vulnerability in Group Policy for Windows Vista through Windows 10. The flaw, CVE-2016-3223, would allow for a man-in-the-middle data collection.
- MS16-073 is a fix for three CVE flaws that allow elevation of privilege or remote code execution in Windows Vista through Windows 10 boxes and and Windows Server 2008-2012 when an attacker is able to launch a specially-crafted application.
- MS16-074 patches three flaws in Windows that allow information disclosure or remote code execution by loading a malicious website or document.
- MS16-075 is a vulnerability in Windows SMB server that allows for elevation of privilege if a user logs into a compromised server and loads a malicious application.
- MS16-076 patches a remote code execution in NetLogon for Windows Server 2008 and 2012. An attacker could target the flaw by running a specially crafted application on the targeted network.
- MS16-077 patches two vulnerabilities in the Windows Web Proxy Auto-Discovery that could allow elevation of privilege when a system attempts to target a new proxy.
- MS16-078 updates a previously patched vulnerability in the SAM and LSAD components for Windows Vista through Windows 10 and Windows Server 2008-2012.
- MS16-079 addresses four elevation of privilege and information disclosure vulnerabilities in Outlook Web Access for Windows. An attacker could use the flaw to load a message without filtering or warning.
- MS16-080 addresses two information disclosure and one remote code execution flaw in Windows when viewing a malicious PDF file. The vulnerability is present in both Windows 8.1 and Windows 10 systems.
- MS16-081 is a flaw in Active Directory for Windows Server 2008 and 2012 that could allow an attacker to perform a denial-of-service attack on a targeted server.
- MS16-082 is a denial-of-service vulnerability in Windows 7 through Windows 10 and Windows Server 2008 and 2012. The flaw could be targeted by an attacker logging into a system and running a malicious application.
1
posted on
06/15/2016 9:14:43 AM PDT
by
dayglored
To: Abby4116; afraidfortherepublic; aft_lizard; AF_Blue; amigatec; AppyPappy; arnoldc1; ATOMIC_PUNK; ...
2
posted on
06/15/2016 9:16:12 AM PDT
by
dayglored
("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
To: dayglored
In Win7, I know how to pick and choose which updates to run and which to not install, but how do you do that in Win10. I’ve been blocking all updates on my Win10 machine so I can keep it functional after I had to roll back to a restore point, but that seems to block Defender updates, as well.
At least I tested 10 before I let it install on my main box.
3
posted on
06/15/2016 9:18:40 AM PDT
by
PAR35
To: PAR35
You no longer have control over patching with Win-10.
Even with the Enterprise version of the OS, you have some (small) measure of when you apply patches, but not if. Should you fall too far behind Microsoft delivers incessant spam warning of dire consequences unless you "get yourself right" with them.
The people I work for suspended their Win-10 migration project for a year because of this. My question to them was, "You think it's going to be any better next year?"
4
posted on
06/15/2016 9:33:24 AM PDT
by
rockrr
(Everything is different now...)
To: dayglored
I use Firefox 99% of the time and when it tells me my flash needs to be updated, I update but when I get back into my FF browser it still says needs to be updated even though Adobe tells me it has been.
Also, anybody else getting pop-ups from Windows Defender asking if they can send FF roaming info to MSFT to help them make Defender better?
5
posted on
06/15/2016 9:46:20 AM PDT
by
hsmomx3
To: rockrr
6
posted on
06/15/2016 9:51:16 AM PDT
by
deoetdoctrinae
(Donate monthly and end FReepathons)
To: dayglored
No patches from Microsoft are allowed on my PC. They have proven they are not to be trusted.
Thanks anyway.
To: PAR35
Bing! err... ping for later.
To: Utilizer
9
posted on
06/15/2016 6:28:52 PM PDT
by
dayglored
("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
To: dayglored
Bless you, mate. I try so hard to make certain the customers I support are kept aware of security issues, and of course then I want to make the FReepers aware also so your untiring efforts in spreading the information out are much appreciated.
Cheers! :)
10
posted on
06/15/2016 8:03:59 PM PDT
by
Utilizer
(Bacon A'kbar! - In world today are only peaceful people, and the muzrims trying to kill them)
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson