October2016 patchtuesdayshavlik

24
Patch Tuesday Webinar Wednesday, October 11th, 2016 Chris Goettl Product Manager, Shavlik Dial In: 1-855-749-4750 (US) Attendees: 925 670 957

Transcript of October2016 patchtuesdayshavlik

Page 1: October2016 patchtuesdayshavlik

Patch Tuesday WebinarWednesday, October 11th, 2016

Chris Goettl• Product Manager, Shavlik

Dial In: 1-855-749-4750 (US) Attendees: 925 670 957

Page 2: October2016 patchtuesdayshavlik

Agenda

October 2016 Patch Tuesday Overview

Known Issues

Bulletins

Q & A

1

2

3

4

Page 3: October2016 patchtuesdayshavlik

Best Practices

Privilege Management Mitigates Impact of many exploits

High Threat Level vulnerabilities warrant fast rollout. 2 weeks or less is ideal to reduce exposure.

User Targeted – Whitelisting and Containerization mitigate

Page 4: October2016 patchtuesdayshavlik
Page 5: October2016 patchtuesdayshavlik

Industry News

Microsoft implements servicing change for Windows 7, 8.1, and Server 2008 R2, 2012, 2012 R2• Internet Explorer and OS updates in one of two options:

• Security Bundle – Monthly bundle of Security only updates • Cumulative Rollup – Similar to Windows 10 cumulative bundle

of Security and Non-Security updates in one package• .Net Rollup – Cumulative Bundle each month that applies. Will

update only versions detected, not install new versions. • Flash Player for IE and OS• Office, SharePoint, SQL, Exchange, etc are not affected by the

change set for October

Adobe updated Flash Player distribution announcement. Sept 29th If you have not already done so, get an Adobe ID and sign up for the distribution agreement. ESR has also EOLed.

Page 6: October2016 patchtuesdayshavlik

CSWU-036: Cumulative update for Windows 10: October 11, 2016

Maximum Severity: Critical Affected Products: Windows 10, Edge, Internet ExplorerDescription: This update for Windows 10 includes functionality improvements and resolves the vulnerabilities in Windows that are described in the following Microsoft security bulletins and advisory: MS16-118, MS16-119, MS16-120, MS16-122, MS16-123, MS16-124, MS16-125

Impact: Remote Code Execution, Elevation of Privilege, Information Disclosure Fixes 42 vulnerabilities:

CVE-2016-3267, CVE-2016-3298 (Exploited), CVE-2016-3331, CVE-2016-3382, CVE-2016-3383, CVE-2016-3384, CVE-2016-3385, CVE-2016-3387, CVE-2016-3388, CVE-2016-3390, CVE-2016-3391, CVE-2016-3267, CVE-2016-3331, CVE-2016-3382, CVE-2016-3386, CVE-2016-3387, CVE-2016-3388, CVE-2016-3389, CVE-2016-3390, CVE-2016-3391, CVE-2016-3392, CVE-2016-7189 (Exploited), CVE-2016-7190, CVE-2016-7194, CVE-2016-3209, CVE-2016-3262, CVE-2016-3263, CVE-2016-3270, CVE-2016-3393 (Exploited), CVE-2016-3396, CVE-2016-7182, CVE-2016-0142, CVE-2016-3266, CVE-2016-3341, CVE-2016-3376, CVE-2016-7185, CVE-2016-7191, CVE-2016-0070, CVE-2016-0073, CVE-2016-0075, CVE-2016-0079, CVE-2016-7188, APSB16-32

Restart Required: Requires Restart

Page 7: October2016 patchtuesdayshavlik

SB16-001: October, 2016 Security Only Quality Update

Maximum Severity: Critical Affected Products: Windows, Internet ExplorerDescription: This update is the Security Only Quality Update for Windows 7, 8.1, Server 2008 R2, 2012, and 2012 R2 systems: MS16-118, MS16-120, MS16-122, MS16-123, MS16-124, MS16-126

Impact: Remote Code Execution, Elevation of Privilege, Information Disclosure Fixes 29 vulnerabilities:

CVE-2016-3267, CVE-2016-3298 (Exploited), CVE-2016-3331, CVE-2016-3382, CVE-2016-3383, CVE-2016-3384, CVE-2016-3385, CVE-2016-3387, CVE-2016-3388, CVE-2016-3390, CVE-2016-3391, CVE-2016-3209, CVE-2016-3262, CVE-2016-3263, CVE-2016-3270, CVE-2016-3393 (Exploited), CVE-2016-3396, CVE-2016-7182, CVE-2016-0142, CVE-2016-3266, CVE-2016-3341, CVE-2016-3376, CVE-2016-7185, CVE-2016-7191, CVE-2016-0070, CVE-2016-0073, CVE-2016-0075, CVE-2016-0079, CVE-2016-3298 (Exploited)

Restart Required: Requires Restart

Page 8: October2016 patchtuesdayshavlik

CR16-001: October, 2016 Security Monthly Quality Update

Maximum Severity: Critical Affected Products: Windows, Internet ExplorerDescription: This update is the Security Monthly Quality Update for Windows 7, 8.1, Server 2008 R2, 2012, and 2012 R2 systems: MS16-118, MS16-120, MS16-122, MS16-123, MS16-124, MS16-126

Impact: Remote Code Execution, Elevation of Privilege, Information Disclosure Fixes 29 vulnerabilities:

CVE-2016-3267, CVE-2016-3298 (Exploited), CVE-2016-3331, CVE-2016-3382, CVE-2016-3383, CVE-2016-3384, CVE-2016-3385, CVE-2016-3387, CVE-2016-3388, CVE-2016-3390, CVE-2016-3391, CVE-2016-3209, CVE-2016-3262, CVE-2016-3263, CVE-2016-3270, CVE-2016-3393 (Exploited), CVE-2016-3396, CVE-2016-7182, CVE-2016-0142, CVE-2016-3266, CVE-2016-3341, CVE-2016-3376, CVE-2016-7185, CVE-2016-7191, CVE-2016-0070, CVE-2016-0073, CVE-2016-0075, CVE-2016-0079, CVE-2016-3298 (Exploited)

Restart Required: Requires Restart

Page 9: October2016 patchtuesdayshavlik

MS16-118: Cumulative Security Update for Internet Explorer (3192887)

Maximum Severity: Critical Affected Products: Internet ExplorerDescription: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Impact: Remote Code ExecutionFixes 12 vulnerabilities:

CVE-2016-3267, CVE-2016-3298 (Exploited), CVE-2016-3331, CVE-2016-3382, CVE-2016-3383, CVE-2016-3384, CVE-2016-3385, CVE-2016-3387, CVE-2016-3388, CVE-2016-3390, CVE-2016-3391

Restart Required: Requires Restart

Page 10: October2016 patchtuesdayshavlik

MS16-119: Cumulative Security Update for Microsoft Edge (3192890)

Maximum Severity: Critical Affected Products: EdgeDescription: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.

Impact: Remote Code ExecutionFixes 13 vulnerabilities:

CVE-2016-3267, CVE-2016-3331, CVE-2016-3382, CVE-2016-3386, CVE-2016-3387, CVE-2016-3388, CVE-2016-3389, CVE-2016-3390, CVE-2016-3391, CVE-2016-3392, CVE-2016-7189 (Exploited), CVE-2016-7190, CVE-2016-7194

Restart Required: Requires Restart

Page 11: October2016 patchtuesdayshavlik

MS16-120: Security Update for Microsoft Graphics Component (3192884)

Maximum Severity: Critical Affected Products: Windows, .Net, Office, Skype, Lync, SilverlightDescription: This security update resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Skype for Business, Silverlight, and Microsoft Lync. The most serious of these vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Impact: Remote Code ExecutionFixes 7 vulnerabilities:

CVE-2016-3209, CVE-2016-3262, CVE-2016-3263, CVE-2016-3270, CVE-2016-3393 (Exploited), CVE-2016-3396, CVE-2016-7182,

Restart Required: Requires Restart

Page 12: October2016 patchtuesdayshavlik

MS16-121: Security Update for Microsoft Office (3194063)

Maximum Severity: ImportantAffected Products: Office, SharePoint Description: This security update resolves a vulnerability in Microsoft Office. An Office RTF remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle RTF files. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.

Impact: Remote Code ExecutionFixes vulnerabilities:

CVE-2016-7193 (Exploited)

Restart Required: May Require Restart

Page 13: October2016 patchtuesdayshavlik

MS16-122: Security Update for Microsoft Video Control (3195360)

Maximum Severity: CriticalAffected Products: WindowsDescription: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if Microsoft Video Control fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. However, an attacker must first convince a user to open either a specially crafted file or a program from either a webpage or an email message.

Impact: Remote Code ExecutionFixes vulnerabilities:

CVE-2016-0142

Restart Required: Requires Restart

Page 14: October2016 patchtuesdayshavlik

MS16-127: Security Update for Adobe Flash Player (3194343)

Maximum Severity: CriticalAffected Products: Adobe Flash Player Plug-In for IEDescription: This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10..

Impact: Remote Code ExecutionFixes 12 vulnerabilities:

CVE-2016-4273, CVE-2016-4286, CVE-2016-6981, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6987, CVE-2016-6989, CVE-2016-6990, CVE-2016-6992

Restart Required: Requires Restart

Page 15: October2016 patchtuesdayshavlik

APSB16-32: Security updates available for Adobe Flash Player

Maximum Severity: CriticalAffected Products: Adobe Flash PlayerDescription: Adobe has released security updates for Adobe Flash Player for Windows, Macintosh, Linux and ChromeOS.  These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system. .

Impact: Remote Code ExecutionFixes 12 vulnerabilities:

CVE-2016-4273, CVE-2016-4286, CVE-2016-6981, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6987, CVE-2016-6989, CVE-2016-6990, CVE-2016-6992

Restart Required: Requires Restart

Page 16: October2016 patchtuesdayshavlik

MS16-123: Security Update for Windows Kernel-Mode Drivers (3192892)

Maximum Severity: ImportantAffected Products: WindowsDescription: This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.

Impact: Elevation of Privilege Fixes 5 vulnerabilities:

CVE-2016-3266, CVE-2016-3341, CVE-2016-3376, CVE-2016-7185, CVE-2016-7191

Restart Required: Requires Restart

Page 17: October2016 patchtuesdayshavlik

MS16-124: Security Update for Windows Registry (3193227)

Maximum Severity: ImportantAffected Products: WindowsDescription: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker can access sensitive registry information.

Impact: Elevation of Privilege Fixes 4 vulnerabilities:

CVE-2016-0070, CVE-2016-0073, CVE-2016-0075, CVE-2016-0079

Restart Required: Requires Restart

Page 18: October2016 patchtuesdayshavlik

MS16-125: Security Update for Diagnostics Hub (3193229)Maximum Severity: ImportantAffected Products: WindowsDescription: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application.

Impact: Elevation of Privilege Fixes 1 vulnerabilities:

CVE-2016-7188

Restart Required: Requires Restart

Page 19: October2016 patchtuesdayshavlik

MS16-126: Security Update for Microsoft Internet Messaging API (3196067)

Maximum Severity: ModerateAffected Products: Windows Description: This security update resolves a vulnerability in Microsoft Windows. An information disclosure vulnerability exists when the Microsoft Internet Messaging API improperly handles objects in memory. An attacker who successfully exploited this vulnerability could test for the presence of files on disk.

Impact: Information DisclosureFixes 1 vulnerabilities:

CVE-2016-3298 (Exploited)

Restart Required: Requires Restart

Page 20: October2016 patchtuesdayshavlik

APSB16-33: Security Updates Available for Adobe Acrobat and Reader

Maximum Severity: ImportantAffected Products: Adobe Acrobat and Reader Description: Adobe has released security updates for Adobe Acrobat and Reader for Windows and Macintosh. These updates address critical vulnerabilities that could potentially allow an attacker to take control of the affected system.

Impact: Remote Code ExecutionFixes 77 vulnerabilities:

CVE-2016-1089, CVE-2016-1091, CVE-2016-6939, CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6944, CVE-2016-6945, CVE-2016-6946, CVE-2016-6947, CVE-2016-6948, CVE-2016-6949, CVE-2016-6950, CVE-2016-6951, CVE-2016-6952, CVE-2016-6953, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6957, CVE-2016-6958, CVE-2016-6959, CVE-2016-6960, CVE-2016-6961, CVE-2016-6962, CVE-2016-6963, CVE-2016-6964, CVE-2016-6965, CVE-2016-6966, CVE-2016-6967, CVE-2016-6968, CVE-2016-6969, CVE-2016-6970, CVE-2016-6971, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6979, CVE-2016-6988, CVE-2016-6993, CVE-2016-6994, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-6999, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, CVE-2016-7019

Restart Required: May Require Restart

Page 21: October2016 patchtuesdayshavlik

Between Patch Tuesdays New Product Support: Notepad++ x64, Windows 10 LTSB 2016 x86\x64

Security Updates: Microsoft (5), Google Chrome (2), FireFox\ESR (3), Tomcat (1), Opera (3), Notepad++ (1), 7Zip (2), Shockwave (1), Filezilla (2), Thunderbird (1), Wireshark (1),

Non-Security Updates: Microsoft (33), Citrix Receiver (1), VMware Player (1), WinSCP (1), Dropbox (3), PDF-Xchange Pro (1), Slack (1), TeamViewer (2), CoreFTP (1), GoodSync (5), Libre Office (1), Splunk Universal Forwarder (1), TightVNC (1), Google Drive (1), HipChat (1),

Security Tools:

Page 22: October2016 patchtuesdayshavlik
Page 23: October2016 patchtuesdayshavlik

Resources and Webinars

Get Shavlik Content Updates

Get Social with Shavlik

Sign up for next months Patch Tuesday Webinar

Watch previous webinars and download presentation.

Page 24: October2016 patchtuesdayshavlik

Thank you