Microsoft Patchday für Januar mit 9 Security Bulletins

Microsoft Patchday für Januar mit 9 Security Bulletins

Microsoft hat soeben neun Security Bulletins im Rahmen des Patchday für Januar 2016 veröffentlicht und zum Download freigegeben. Sechs davon werden von Microsoft als kritisch eingestuft, die restlichen drei stuft der US-Konzern als wichtig ein. Die Security Bulletins betreffen Microsoft Windows, Internet Explorer, Microsoft Edge, Microsoft Office, Visual Basic, Silverlight sowie Exchange Server und beheben zahlreiche Sicherheitslücken, die schwerwiegendsten davon ermöglichen Remotecodeausführung. Nutzer, die das automatische Update aktiviert haben, müssen nichts tun, da die Sicherheitsupdates automatisch geladen und installiert werden. Benutzer, die das automatische Update nicht aktiviert haben, sollten auf Updates prüfen und sie manuell installieren. Weitere Infos finden sich im Security Bulletin für Januar 2016.

Microsoft Update

Download -> Microsoft Sicherheitsupdates für Januar 2016

In der folgenden Liste sind die Security Bulletins für Januar 2016 nach Schweregrad geordnet.

  • MS16-001 - Cumulative Security Update for Internet Explorer (3124903)
    This security update resolves vulnerabilities in Internet Explorer. The more severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system.
  • MS16-002 - Cumulative Security Update for Microsoft Edge (3124904)
    This security update resolves vulnerabilities in Microsoft Edge. The vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
  • MS16-003 - Cumulative Security Update for JScript and VBScript to Address Remote Code Execution (3125540)
    This security update resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
  • MS16-004 - Security Update for Microsoft Office to Address Remote Code Execution (3124585)
    This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
  • MS16-005 - Security Update for Windows Kernel-Mode Drivers to Address Remote Code Execution (3124584)
    This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow remote code execution if a user visits a malicious website.
  • MS16-006 - Security Update for Silverlight to Address Remote Code Execution (3126036)
    This security update resolves a vulnerability in Microsoft Silverlight. The vulnerability could allow remote code execution if a user visits a compromised website that contains a specially crafted Silverlight application. An attacker would have no way to force users to visit a compromised website. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email or instant message that takes users to the attacker's website.
  • MS16-007 - Security Update for Microsoft Windows to Address Remote Code Execution (3124901)
    This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker is able to log on to a target system and run a specially crafted application.
  • MS16-008 - Security Update for Windows Kernel to Address Elevation of Privilege (3124605)
    This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application.
  • MS16-010 - Security Update in Microsoft Exchange Server to Address Spoofing (3124557)
    This security update resolves vulnerabilities in Microsoft Exchange Server. The most severe of the vulnerabilities could allow spoofing if Outlook Web Access (OWA) fails to properly handle web requests, and sanitize user input and email content.

Microsoft Patch Day für Januar 2016 -> Weitere Infos

Alle Benutzer werden aufgefordert die verfügbaren Updates so schnell wie möglich zu installieren!

Kommentare sind geschlossen
it-blogger.net
Copyright © 2017 Valdet Beqiraj it-blogger.net