Last updated at Thu, 27 Jul 2017 00:43:59 GMT
November continues a long running trend with Microsoft's products where the majority of bulletins (7) address remote code execution (RCE), closely followed by elevation of privilege (6) and security feature bypass (1). All of this month's critical bulletins are remote code execution vulnerabilities, affecting a variety of products and platforms including Edge, Internet Explorer, Exchange, Microsoft Office, Office Services and Web Apps, Sharepoint as well as Windows (client and server).
While Microsoft continues actively working on resolving these issues, as witnessed in the overwhelming number of critical RCE bulletins, there is an ongoing battle in which they are unable to permanently address these vulnerabilities, which predominantly affect the consumer applications listed above. Unfortunately, this leads to one of the single largest attack vectors, consumers. These types of vulnerabilities are difficult to distinguish as they typically lure users to visit/open an e-mail, webpage or multimedia, which makes use of specially crafted content. In the worst case, upon viewing this content, a bad actor has the ability to execute malicious code and take complete control of an affected system with the same privileges of the user known as remote code execution.
This month Microsoft resolves 77 vulnerabilities across 14 bulletins. For consumers MS16-129, MS16-130, MS16-131, MS16-141 and MS16-142 are the bulletins to watch out for, addressing 30 vulnerabilities. For server users MS16-130, MS16-132, MS16-135 and MS16-141 are the bulletins to watch out for, addressing 21 vulnerabilities. Unfortunately, at this time two vulnerabilities addressed by MS16-132 (CVE-2016-7256), and MS16-135 (CVE-2016-7255) are known to have been be exploited in the wild. Additionally four vulnerabilities addressed by MS16-129 (CVE-2016-7199, CVE-2016-7209), MS16-135 (CVE-2016-7255) and MS16-142 (CVE-2016-7199) are known to have been publicly disclosed.
Users should be wary of untrusted sources as maliciously crafted content could allow an attacker to remotely execute code in-order to gain the same rights as their user account. The best protection against these threats is to patch systems as quickly as possible. Administrators, be sure to review this month's bulletins and in accordance with your specific configuration, prioritize your deployment of this months' updates. At a minimum, ensure to patch systems affected by critical bulletins (MS16-129, MS16-130, MS16-131, MS16-132, MS16-141 and MS16-142).
- CVE-2016-7195 (MS16-129, MS16-142)
- CVE-2016-7196 (MS16-129, MS16-142)
- CVE-2016-7198 (MS16-129, MS16-142)
- CVE-2016-7199 (MS16-129, MS16-142)
- CVE-2016-7200 (MS16-129)
- CVE-2016-7201 (MS16-129)
- CVE-2016-7202 (MS16-129)
- CVE-2016-7203 (MS16-129)
- CVE-2016-7204 (MS16-129)
- CVE-2016-7208 (MS16-129)
- CVE-2016-7209 (MS16-129)
- CVE-2016-7227 (MS16-129, MS16-142)
- CVE-2016-7239 (MS16-129, MS16-142)
- CVE-2016-7240 (MS16-129)
- CVE-2016-7241 (MS16-129, MS16-142)
- CVE-2016-7242 (MS16-129)
- CVE-2016-7243 (MS16-129)
- CVE-2016-7221 (MS16-130)
- CVE-2016-7222 (MS16-130)
- CVE-2016-7212 (MS16-130)
- CVE-2016-7248 (MS16-131)
- CVE-2016-7210 (MS16-132)
- CVE-2016-7205 (MS16-132)
- CVE-2016-7217 (MS16-132)
- CVE-2016-7256 (MS16-132)
- CVE-2016-7213 (MS16-133)
- CVE-2016-7228 (MS16-133)
- CVE-2016-7229 (MS16-133)
- CVE-2016-7230 (MS16-133)
- CVE-2016-7231 (MS16-133)
- CVE-2016-7232 (MS16-133)
- CVE-2016-7233 (MS16-133)
- CVE-2016-7234 (MS16-133)
- CVE-2016-7235 (MS16-133)
- CVE-2016-7236 (MS16-133)
- CVE-2016-7244 (MS16-133)
- CVE-2016-7245 (MS16-133)
- CVE-2016-0026 (MS16-134)
- CVE-2016-3332 (MS16-134)
- CVE-2016-3333 (MS16-134)
- CVE-2016-3334 (MS16-134)
- CVE-2016-3335 (MS16-134)
- CVE-2016-3338 (MS16-134)
- CVE-2016-3340 (MS16-134)
- CVE-2016-3342 (MS16-134)
- CVE-2016-3343 (MS16-134)
- CVE-2016-7784 (MS16-134)
- CVE-2016-7184 (MS16-134)
- CVE-2016-7214 (MS16-135)
- CVE-2016-7215 (MS16-135)
- CVE-2016-7218 (MS16-135)
- CVE-2016-7246 (MS16-135)
- CVE-2016-7255 (MS16-135)
- CVE-2016-7249 (MS16-136)
- CVE-2016-7250 (MS16-136)
- CVE-2016-7254 (MS16-136)
- CVE-2016-7251 (MS16-136)
- CVE-2016-7252 (MS16-136)
- CVE-2016-7253 (MS16-136)
- CVE-2016-7220 (MS16-137)
- CVE-2016-7237 (MS16-137)
- CVE-2016-7238 (MS16-137)
- CVE-2016-7223 (MS16-138)
- CVE-2016-7224 (MS16-138)
- CVE-2016-7225 (MS16-138)
- CVE-2016-7226 (MS16-138)
- CVE-2016-7216 (MS16-139)
- CVE-2016-7247 (MS16-140)
- CVE-2016-7857 (MS16-141)
- CVE-2016-7858 (MS16-141)
- CVE-2016-7859 (MS16-141)
- CVE-2016-7860 (MS16-141)
- CVE-2016-7861 (MS16-141)
- CVE-2016-7862 (MS16-141)
- CVE-2016-7863 (MS16-141)
- CVE-2016-7864 (MS16-141)
- CVE-2016-7865 (MS16-141)