Microsoft Patchday 8. November 2016

Windows UpdateZum November-Patchday hat Microsoft eine Reihe an Sicherheits-Updates für Windows freigegeben. Hier eine Update-Übersicht.


Anzeige

Bei meinem Windows 7 SP1 wurde das kumulative Update KB3197868 (November, 2016 Security Monthly Quality Rollup for Windows 7 for x64-based Systems) mit einer Downloadgröße von 134,0 MB zum Download angeboten.

Updates

Eine Beschreibung, was das Update fixt, findet sich im Blog-Beitrag Rollup Updates KB3197867, KB3197868 (Windows 7) und KB3197873, KB3197874 (Windows 8.1). Hier eine Übersicht, welche Security-Bulletins Microsoft generell herausgegeben hat. Diese sind dann in den Rollup Updates für Windows 7 SP1, Windows 8.1 (und die korrespondierenden Server-Varianten) sowie in den kumulativen Updates für Windows 10 und Windows Server 2016 enthalten. Gefixt wurde auch die von Google gemeldete Sicherheitslücke CVE-2016-7255 (siehe Google Chrome schließt Sicherheitslücken (auch einen ungepatchten Windows-Zero-Day-Exploit)).

Kritische Sicherheits-Updates für Windows (November 2016)

MS16-129: Cumulative Security Update for Microsoft Edge (3199057)

This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.

This security update is rated Critical for Microsoft Edge on Windows 10 and Windows Server 2016. The update addresses the vulnerabilities by:

  • modifying how Microsoft browsers handles objects in memory
  • changing how the XSS filter in Microsoft browsers handle RegEx
  • modifying how the Chakra JavaScript scripting engine handles objects in memory
  • correcting how the Microsoft Edge parses HTTP responses

MS16-130: Security Update for Microsoft Windows (3199172)


Werbung

This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a locally authenticated attacker runs a specially crafted application.

This security update is rated Critical for all supported releases of Microsoft Windows. The security update addresses the vulnerabilities by:

  • Correcting how the Windows Input Method Editor (IME) loads DLLs.
  • Requiring hardened UNC paths be used in scheduled tasks.

MS16-131: Security Update for Microsoft Video Control (3199151)
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution when Microsoft Video Control fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. However, an attacker must first convince a user to open either a specially crafted file or a program from either a webpage or an email message.

MS16-132: Security Update for Microsoft Graphics Component (3199120)
This security update resolves vulnerabilities in Microsoft Windows. The most severe being of the vulnerabilities could allow a remote code execution vulnerability exists when the Windows Animation Manager improperly handles objects in memory if a user visits a malicious webpage. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights.

MS16-141: Security Update for Adobe Flash Player (3202790)
This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows Server 2016.

MS16-142: Cumulative Security Update for Internet Explorer (3198467)
This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Wichtige Sicherheits-Updates für Windows (November 2016)

MS16-133: Security Update for Microsoft Office (3199168)
This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

MS16-134: Security Update for Common Log File System Driver (3193706)
This security update resolves vulnerabilities in Microsoft Windows. The vulnerability could allow elevation of privilege when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. In a local attack scenario, an attacker could exploit these vulnerabilities by running a specially crafted application to take complete control over the affected system. An attacker who successfully exploits this vulnerability could run processes in an elevated context.

MS16-135: Security Update for Windows Kernel-Mode Drivers (3199135)
This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.

Nachtrag: Dies ist der Fix für die von Google gemeldete Sicherheitslücke (siehe Google Chrome schließt Sicherheitslücken (auch einen ungepatchten Windows-Zero-Day-Exploit)).

MS16-136: Security Update for SQL Server (3199641)
This security update resolves vulnerabilities in Microsoft SQL Server. The most severe vulnerabilities could allow an attacker could to gain elevated privileges that could be used to view, change, or delete data; or create new accounts. The security update addresses these most severe vulnerabilities by correcting how SQL Server handles pointer casting.

MS16-137: Security Update for Windows Authentication Methods (3199173)
This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege. To exploit this vulnerability, the attacker would first need to authenticate to the target, domain-joined system using valid user credentials. An attacker who successfully exploited this vulnerability could elevate their permissions from unprivileged user account to administrator. The attacker could then install programs; view, change or delete data; or create new accounts. The attacker could subsequently attempt to elevate by locally executing a specially crafted application designed to manipulate NTLM password change requests.

MS16-138: Security Update to Microsoft Virtual Hard Disk Driver (3199647)
This security update resolves vulnerabilities in Microsoft Windows. The Windows Virtual Hard Disk Driver improperly handles user access to certain files. An attacker could manipulate files in locations not intended to be available to the user by exploiting this vulnerability.

MS16-139: Security Update for Windows Kernel (3199720)
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker runs a specially crafted application to access sensitive information. A locally authenticated attacker could attempt to exploit this vulnerability by running a specially crafted application. An attacker can gain access to information not intended to be available to the user by using this method.

MS16-140: Security Update for Boot Manager (3193479)
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if a physically-present attacker installs an affected boot policy.

Eine Übersicht der Updates wurde von Microsoft auf der Webseite Microsoft Security Bulletin Summary for November 2016 veröffentlicht.

Ähnliche Artikel
Microsoft Patchday 11. Oktober 2016
Office-Updates für 1. November 2016
Oktober-Patchday: Einstieg in Windows 7/8.1 Rollup-Updates
Patchday-Infos: Was ab Oktober für Windows 7/8.1 kommt

Plant Microsoft die Ausweitung der Telemetriedatenerfassung in Windows 7/8.1?
Update-Strategien für Windows 7/8.1 ab November 2016
Windows 7: Die Update-Suche fixen/beschleunigen (Nov. 2016)

Windows 10: Updates KB3200970, KB3198586, KB3198585
Rollup Updates KB3197867, KB3197868 (Windows 7) und KB3197873, KB3197874 (Windows 8.1).


Anzeige
Dieser Beitrag wurde unter Update, Windows 10, Windows 7, Windows 8.1, Windows Server, Windows Vista abgelegt und mit , , , , verschlagwortet. Setze ein Lesezeichen auf den Permalink.

4 Responses to Microsoft Patchday 8. November 2016

  1. Nils sagt:

    Seit wann informiert denn Microsoft wieder in Form einen netten Übersicht über alle Sicherheitsupdates? Das ist mal wirklich eine tolle Sache und lässt sich auch super durchsuchen.

    https://portal.msrc.microsoft.com/en-us/security-guidance

  2. Olli K sagt:

    das KB3197868 November 2016 Security Monthly Quality Rollup for Windows 7 SP1
    lässt sich auch nicht installieren!!! Das Oktober Dingens ging schon nicht, jetzt das.

    Sicherheitsupdate für Windows (KB3197868)
    Installationsdatum: ‎09.‎11.‎2016 13:14
    Installationsstatus: Fehlgeschlagen
    Fehlerdetails: Code 80070005

    bekommt winzigweich eigentlich noch irgendwas auf die Kette? Was soll denn das?
    Neu aufgesetzter PC (Dell Vostro) und dann so ein Käse. Soll ich dieses update jetzt auch ausblenden und vergessen?

  3. Werbung

  4. Christian sagt:

    Hatte schon beim “Oktober, 2016 Security Monthly Quality Rollup for Windows 7 for x64-based Systems (KB 3185330)” Probleme mit der Installation (Fehler beimKonfiguration des Updates, Fehler 0x80004005) und Rückgängigmachung der Änderungen.
    Hoffte darauf, dass MS das Problem beim November Update bereingen würde, aber Pustekuchen…
    Das Nov-Security-only Update (KB 3197867) lief dagegen anstandslos durch.
    Die zickigen Updates stecken also in dem nicht sicherheitsrelevanten Teil.
    Kann man nicht doch irgendwie diese Rollup-Updates aufdröseln, so dass man an die einzelnen Teile rankommt? Und dann nur die weglässt, die Probleme verursachen?

    Es wurde ja schon vermutet, dass Interferenzen mit dem GRUB Bootmanager Ursache der Malaise sind. Ich verwende nun auch einen Bootmanager (Boot-Us), um zwischen verschiedenen installierten Versionen von Windows auswählen zu können (Win7, Win8.1 und Win10; jeweils in einer primären Partition installiert, Bootmanager ist im MBR installiert, das funktioniert bestens).
    Muss mal probieren, den Bootmanager zu entfernen. Dann bootet der PC zwar nur in die erste primäre Partition der ersten Harddisk (da ist zufällig Win7 drauf), aber ich könnte testen, ob dann KB 3197868 fehlerfrei installiert wird.
    Gruß

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht.