Vulnerabilities Weekly Summary Ending September 16

By Jerry Adams on September 15, 2016

Microsoft Security Bulletin Summary for the month of September 2016

Microsoft released their Security Bulletin Summary for the month of September 2016 patching vulnerabilities that affect the Windows operation system family of software (“Microsoft Security Bulletin Summary for September 2016“, 2016 Sept. 13). Below are a list of the most critical vulnerabilities only:

  • Internet Explorer
    • CVE-2016-3295Microsoft Internet Explorer 10 and 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Microsoft Browser Memory Corruption Vulnerability.” (CVE.MITRE.org).
    • CVE-2016-3375The OLE Automation mechanism and VBScript scripting engine in Microsoft Internet Explorer 9 through 11, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Scripting Engine Memory Corruption Vulnerability.” (CVE.MITRE.org).
  • Microsoft Edge
    • CVE-2016-3294Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Microsoft Edge Memory Corruption Vulnerability,” a different vulnerability than CVE-2016-3330. (CVE.MITRE.org).
    • CVE-2016-3295Microsoft Internet Explorer 10 and 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Microsoft Browser Memory Corruption Vulnerability.” (CVE.MITRE.org).
    • CVE-2016-3350 – The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Scripting Engine Memory Corruption Vulnerability,” a different vulnerability than CVE-2016-3377. (CVE.MITRE.org).
    • CVE-2016-3377The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Scripting Engine Memory Corruption Vulnerability,” a different vulnerability than CVE-2016-3350. (CVE.MITRE.org).
  • Microsoft Office
    • CVE-2016-3357 – Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2013 RT SP1, Office 2016, Word for Mac 2011, Word 2016 for Mac, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, SharePoint Server 2013 SP1, Excel Automation Services on SharePoint Server 2013 SP1, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, and Office Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted document, aka “Microsoft Office Memory Corruption Vulnerability.” (CVE.MITRE.org).
  • VBScript Scripting Engine
    • CVE-2016-3375 – The OLE Automation mechanism and VBScript scripting engine in Microsoft Internet Explorer 9 through 11, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka “Scripting Engine Memory Corruption Vulnerability.” (CVE.MITRE.org).

Please see Microsoft’s Security Bulletin Summary for the complete list of security and bug fixes.  Please refer to our Patches and Updates webpage for direct links to the patches.

References

  • (2016 Sept. 13). “Microsoft Security Bulletin Summary for September 2016“. Microsoft Corp. Retrieved from https://technet.microsoft.com/en-us/library/security/ms16-sep.aspx
  • (2016 Sept. 13). “Adobe Security Bulletin”. Adobe Systems. Retrieved from https://helpx.adobe.com/security/products/flash-player/apsb16-29.html
  • CVE.MITRE.org. CVE International in scope and free for public use in accordance with terms of use, CVE is a dictionary of publicly known information security vulnerabilities and exposures