Patch Analysis for December 2016

Welcome to this December Patch Tuesday Bulletin, the last bulletin of the year. By now, you are aware of the updated patching model for IE and Windows but if not then please visit this blog post. This month there are 12 bulletins, 6 of those are critical updates, and 1 bulletin for a CVE that is being attacked in the wild. Take this month to focus on quickly identifying vulnerable Adobe Flash Player installations and updating or removing this software. Adobe reports limited attacks for CVE-2016-7892 in the wild against 32 bit IE installations. There were no other known attacks on CVE's that were fixed this month so take time to test your patching process with the new security-only updates. Also keep in mind that updating and applying patches may be the first thought when it comes to remediating vulnerabilities but it can often be easier to remove unnecessary software instead of maintaining that software.

You can’t remediate the most vulnerable point on your network; your users, but you can patch the vulnerabilities commonly used to exploit them to gain a foothold in your environment. Join us for our Patch Tuesday Webinar, where we provide you with our expert led Patch Tuesday Analysis.

  • Prioritize updates from Microsoft and 3rd Party vendors
  • Identify vulnerabilities targeting users
  • Manage your virtual infrastructure with VMworld 2016 Security Gold Award winning Shavlik Protect
  • Flexible architecture to manage servers agentless and endpoints with Agents and Cloud Agents

Click here to get started with Shavlik Protect

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS16-152

3199709
Information disclosure

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Windows 10
Server 2016
Requires restartUpdate after testing
MS16-144

3204059
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/NoNoCritical Internet Explorer 9
Internet Explorer 10
Internet Explorer 11
Multiple vulnerabilities, requires restartUpdate immediately
MS16-145

3204062
Arbitrary code

/ Microsoft Edge
Workstations
Terminal Servers
No/NoNoCritical Edge
Multiple vulnerabilities, requires restartUpdate immediately
MS16-147

3204063
Arbitrary code

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoCritical Vista
Server 2008
Server 2008 R2
Windows 7
Server 2012
Server 2012 R2
Windows 8.1
Windows RT 8.1
Windows 10
Server 2016
Requires restartUpdate immediately
MS16-146

3204066
Arbitrary code

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoCritical Vista
Server 2008
Server 2008 R2
Windows 7
Server 2012
Server 2012 R2
Windows 8.1
Windows RT 8.1
Windows 10
Server 2016
Multiple vulnerabilities, requires restartUpdate immediately
MS16-148

3204068
Arbitrary code

/ Microsoft Office
Workstations
Terminal Servers
Sharepoint Servers
No/NoNoCritical Office 2007
SharePoint Server 2007
Office 2010
Office 2011 for MAC
SharePoint Server 2010
Office 2013 RT
Office 2013
Office 2010 Web Apps
Office 2016 for Mac
Office 2016
Multiple vulnerabilities, may require restartUpdate immediately
MS16-155

3205640
Information disclosure

/ Microsoft .NET Framework
Workstations
Terminal Servers
Servers
No/NoNoImportant .NET Framework 4.6.2
Requires restartUpdate after testing
MS16-150

3205642
Privilege elevation

/ Microsoft Windows
Workstations
Servers
No/NoNoImportant Windows 10
Server 2016
Requires restartUpdate after testing
MS16-151

3205651
Privilege elevation

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2008
Server 2008 R2
Windows 7
Server 2012
Server 2012 R2
Windows 8.1
Windows RT 8.1
Windows 10
Server 2016
Multiple vulnerabilities, requires restartUpdate after testing
MS16-149

3205655
Privilege elevation

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2008
Server 2008 R2
Windows 7
Server 2012
Server 2012 R2
Windows 8.1
Windows 10
Server 2016
Multiple vulnerabilities, requires restartUpdate after testing
MS16-153

3207328
Information disclosure

/ Microsoft Windows
Workstations
Terminal Servers
Servers
No/NoNoImportant Vista
Server 2008
Server 2008 R2
Windows 7
Server 2012
Server 2012 R2
Windows 8.1
Windows RT 8.1
Windows 10
Server 2016
Requires restartUpdate after testing
MS16-154

3209498
Arbitrary code

/ Adobe Flash Player
Workstations
Terminal Servers
Servers
No/YesYesCritical Server 2012
Server 2012 R2
Windows 8.1
Windows RT 8.1
Windows 10
Server 2016
Multiple vulnerabilities, requires restartUpdate immediately

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.