Patch Analysis for January 2016

Welcome to this January Patch Tuesday Bulletin. This is not a bad start for Microsoft patches with 9 bulletins, 6 criticals, and 5 of the criticals fixing arbitrary code execution vulnerabilities. Luckily, Microsoft reports that it is unaware of attacks against any of the vulnerabilities that are being patched. Start the month by applying MS16-001 for Internet Explorer. There are only two vulnerabilities being patched in IE this month, far less than recent months, but they are still potential arbitrary code execution and elevation of privilege attack vectors. If Edge is in the environment then apply MS16-002 as well. Follow up with MS16-003, MS16-004, MS16-005, and MS16-006 since these patches fix critical arbitrary code execution vulnerabilities in Microsoft software present in almost all organizations. Finally, test and apply MS16-007, MS16-008, and MS16-0010. These patches fix important vulneraibilities for Microsoft software that is also widely used. This month it is important to start thinking about what versions of Internet Explorer are running in the environment. Starting this month Microsoft will only support the most current version of Internet Explorer for supported operating systems. This means that organizations will have to migrate to IE 11 if they run desktops with Windows 7 and up.

Correlate application security events with all the other enterprise events

If your SIEM isn't getting the security events from Microsoft's enterprise applications, it is missing an important part of the story. SQL Server, Exchange and SharePoint audit logs are too important to be missing from your SIEM or log management solution. Find out more about how to audit these applications, and learn how to get their security audit event data into your SIEM.

Browse to www.logbinder.com/Solutions

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS16-010

3124557
Spoofing

/ Microsoft Exchange
Exchange Servers
No/NoNoImportant Exchange 2013
Exchange 2016
Multiple vulnerabilities, may require restartUpdate after testing
MS16-005

3124584
Arbitrary code

/ Microsoft Windows
Workstations
Terminal Servers
No/NoNoCritical Vista
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Windows 10
Multiple vulnerabilities, requires restartUpdate immediately
MS16-004

3124585
Arbitrary code

/ Microsoft Office, Visual Basic
Workstations
Terminal Servers
Sharepoint Servers
No/NoNoCritical Office 2007
Office 2010
Office 2011 for MAC
Visual Basic 6.0 Runtime
SharePoint Server 2013
Office 2013 RT
Office 2013
Office 2016 for Mac
Office 2016
SharePoint Foundation 2013
Multiple vulnerabilities, may require restartUpdate immediately
MS16-008

3124605
Privilege elevation

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Windows 10
Multiple vulnerabilities, requires restart 
MS16-007

3124901
Arbitrary code

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2008
Server 2008 R2
Windows 7
Windows 8
Server 2012
Windows RT
Server 2012 R2
Windows 8.1
Windows RT 8.1
Windows 10
Multiple vulnerabilities, requires restartUpdate immediately
MS16-001

3124903
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/NoYesCritical Internet Explorer 7
Internet Explorer 8
Internet Explorer 9
Internet Explorer 10
Internet Explorer 11
Multiple vulnerabilities, requires restartUpdate immediately
MS16-002

3124904
Arbitrary code

/ Microsoft Edge
Workstations
Terminal Servers
No/NoNoCritical Edge
Multiple vulnerabilities, requires restartUpdate immediately
MS16-003

3125540
Arbitrary code

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoYesCritical Vista
Server 2008
May require restartUpdate immediately
MS16-006

3126036
Arbitrary code

/ Microsoft Silverlight
Workstations
Terminal Servers
No/NoNoCritical Silverlight 5
Silverlight 5 Developer
Does not require restartUpdate immediately

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.