Patch Analysis for August 2016

Welcome to this August Patch Tuesday Bulletin. This is the lightest month since January with 9 total patches, 5 critical and 4 important rated severities. The good news is there were no vulnerabilities known to be exploited at the time of this bulletin. Start the off with Internet Explorer (MS16-095) and Edge (MS16-096) this month. Follow up with MS16-102 to fix a vulnerability in Edge's PDF reader. There is a good workaround that removes Edge as a default file type association for PDF documents that can be implemented until the patch is deployed. Next, take a look at MS16-097 and MS16-099 which fixes arbitrary code execution vulnerabilities with Office, Skype and Lync. MS16-98 and MS16-101 fix elevation of privilege vulnerabilities that may be exploited by running a maliciously crafted application on the host. Finish this month of patching with MS16-100 and MS16-103 to remediate a security feature bypass vulnerability in Secure Boot and an information disclosure vulnerability with ActiveSync.

Correlate application security events with all the other enterprise events

If your SIEM isn't getting the security events from Microsoft's enterprise applications, it is missing an important part of the story. SQL Server, Exchange and SharePoint audit logs are too important to be missing from your SIEM or log management solution. Find out more about how to audit these applications and learn how to get their security audit event data into your SIEM.

Browse to www.logbinder.com/Solutions

BulletinExploit Types
/Technologies Affected
System Types AffectedExploit
details public?
/ Being exploited?
Comprehensive,
practical
workaround
available?
MS severity ratingProducts AffectedNotesRandy's recommendation
MS16-095

3177356
Arbitrary code

/ Internet Explorer
Workstations
Terminal Servers
No/NoNoCritical Internet Explorer 9
Internet Explorer 10
Internet Explorer 11
Multiple vulnerabilities, requires restartUpdate immediately
MS16-096

3177358
Arbitrary code

/ Microsoft Edge
Workstations
Terminal Servers
No/NoYesCritical Edge
Multiple vulnerabilities, requires restartUpdate immediately
MS16-097

3177393
Arbitrary code

/ Microsoft Office, Communications Platforms
Workstations
Terminal Servers
Servers
No/NoNoCritical Vista
Office 2007
Server 2008
Server 2008 R2
Windows 7
Office 2010
Lync 2010
Server 2012
Lync 2013
Server 2012 R2
Windows 8.1
Windows RT 8.1
Live Meeting 2007
Windows 10
Skype for Business 2016
Multiple vulnerabilities, may require restartUpdate immediately
MS16-099

3177451
Arbitrary code

/ Microsoft Office
Workstations
Terminal Servers
No/NoNoCritical Office 2007
Office 2010
Office 2011 for MAC
Office 2013 RT
Office 2013
Office 2016 for Mac
Office 2016
Multiple vulnerabilities, may require restartUpdate immediately
MS16-101

3178465
Privilege elevation

/ Microsoft Windows
Workstations
Servers
No/NoNoImportant Vista
Server 2008
Server 2008 R2
Windows 7
Server 2012
Server 2012 R2
Windows 8.1
Windows RT 8.1
Windows 10
Multiple vulnerabilitiesUpdate after testing
MS16-098

3178466
Privilege elevation

/ Microsoft Windows
Workstations
Servers
No/NoNoImportant Vista
Server 2008
Server 2008 R2
Windows 7
Server 2012
Server 2012 R2
Windows 8.1
Windows 10
Multiple vulnerabilities, requires restartUpdate immediately
MS16-100

3179577
Security feature bypass

/ Microsoft Windows
Workstations
Servers
No/NoYesImportant Server 2012
Server 2012 R2
Windows 8.1
Windows RT 8.1
Windows 10
Does not require restartUpdate after testing
MS16-102

3182248
Arbitrary code

/ Microsoft Windows
Workstations
Terminal Servers
No/NoNoCritical Server 2012
Server 2012 R2
Windows 8.1
Windows RT 8.1
Windows 10
May require restartUpdate immediately
MS16-103

3182332
Information disclosure

/ Microsoft Windows
Workstations
No/NoNoImportant Windows 10
Requires restartUpdate after testing

Receive Randy's same-day, independent analysis each Patch Tuesday

Email:
We will not share your address. Unsubscribe anytime. 

"Thank you. I am very glad I subscribed to this newsletter.  Relevant content clearly and concisely. Finally!!!"

- John K.

"I really like the Fast Facts on this Month's Microsoft Security Bulletins. Do you keep old copies? If yes, please let me know how I can access them?"

-Susan D.

"Thanks, Randy. Your regular updates have streamlined my monthly patching. Much appreciated,"

-  Steve T.

"Really appreciate your patch observor. In the corporate IT world, anything we can get our hands on that speeds the process of analyzing threats and how they may or may not apply to our environments is a God-send. Thanks so much for your efforts."

- Tess G.

"Many thanks for this Randy"

- Roger G.

"The chart is a REAAALLY good idea :)"

- Phil J.

"I like the table. Your insight is very valuable. "

Tom C.

"I liked your high level overview of patches in the table. There are so many sources of patch information which can be very specific or surrounded by other stuff that it’s refreshing to get everything summarised like this. The “Randy’s Recommendation” comment is useful starting point too. Please keep up the good work."

- David A.

"Your Patch Observer is a very good tool in making the decision whether to patch or not to patch. And also to patch asap or to wait a while before patching. Also I do think the use of the table is realy improving the readability of the provided information."

- Gerard T.

 

Additional Resources