Microsoft Patch Tuesday Dec 2015: Latest Updates and Fixes to Secure Your System

...

Microsoft's Patch Tuesday for December 2015 brought several critical security updates for its products. The updates addressed vulnerabilities that could potentially allow attackers to take control of computers and steal sensitive data. Among the patches, one stood out as particularly important - a fix for a zero-day vulnerability that had been actively exploited in the wild. This vulnerability affected all versions of Windows and could allow attackers to remotely execute code on a victim's machine. With cyber threats becoming more sophisticated and frequent, it is crucial for businesses and individuals to stay up-to-date with the latest security patches to ensure their systems are protected.

As part of Patch Tuesday, Microsoft released a total of 12 security bulletins, including 8 rated as critical and 4 as important. The critical updates resolved issues in Windows, Internet Explorer, Edge, Office, Skype for Business, and Silverlight. The important updates addressed vulnerabilities in Windows, Exchange Server, and Active Directory Federation Services. With such a significant number of patches, it is essential for IT teams to prioritize and apply them promptly to reduce the risk of exploitation.

The zero-day vulnerability fixed by Microsoft was a remote code execution flaw in the Windows operating system. This means that an attacker could remotely execute code on a victim's machine without any user interaction, such as clicking on a malicious link or opening a file. The vulnerability was being exploited in targeted attacks, and Microsoft had received reports of it being used in conjunction with a spear-phishing campaign. The patch for this vulnerability should be considered a top priority for all Windows users.

Another critical update addressed a vulnerability in Internet Explorer that could allow for remote code execution if a user visited a specially crafted website. The flaw affected all supported versions of Internet Explorer, including the recently released version 11. This update underscores the importance of using a secure web browser and keeping it up-to-date with the latest security patches.

Microsoft also released an update for its new Edge browser, which addresses a vulnerability that could allow for information disclosure if a user visits a malicious website. While Edge has not yet gained widespread adoption, it is essential for those using it to apply this update to prevent potential attacks.

Office users should take note of the critical update that resolves four vulnerabilities in Microsoft Office. These flaws could allow remote code execution if a user opens a specially crafted Office file. Attackers often use social engineering tactics to trick users into opening these types of files, highlighting the importance of user education and awareness training.

The Skype for Business update addresses a flaw that could allow for remote code execution if a user accepts a specially crafted meeting request. This vulnerability underscores the need for caution when accepting meeting requests from unknown or suspicious sources.

The Silverlight update addresses a vulnerability that could allow attackers to bypass security restrictions and execute code on a victim's machine. While Silverlight is not as widely used as it once was, it is still important to apply this patch to any systems that have it installed.

The important updates included patches for several vulnerabilities in Windows, including a privilege escalation flaw that could allow attackers to gain elevated privileges on a compromised machine. The Exchange Server update addresses a vulnerability that could allow for denial-of-service attacks against the server. Finally, the Active Directory Federation Services update resolves a vulnerability that could allow attackers to bypass authentication and gain access to sensitive data.

Overall, Microsoft's Patch Tuesday for December 2015 highlights the importance of staying up-to-date with the latest security patches. Cyber threats are constantly evolving, and attackers are becoming more sophisticated in their tactics. By applying these security updates promptly, businesses and individuals can reduce the risk of exploitation and keep their systems secure.


Introduction

Microsoft has recently released its monthly set of security updates, also known as Patch Tuesday for December 2015. This month’s release includes a total of 12 bulletins that address 71 vulnerabilities in Microsoft products. Of the 12 bulletins, five are rated as critical and seven are rated as important. The critical bulletins address vulnerabilities in Internet Explorer, Edge, Windows graphics components, Office and Silverlight. The important bulletins address vulnerabilities in Windows kernel-mode drivers, Windows media center, Skype for Business and Exchange Server.

Critical Bulletins

MS15-124: Cumulative Security Update for Internet Explorer (3116180)

This bulletin addresses 30 vulnerabilities in Internet Explorer versions 7 through 11. These vulnerabilities could allow remote code execution if a user visits a specially crafted website using Internet Explorer. This bulletin should be given the highest priority for patching.

MS15-125: Cumulative Security Update for Microsoft Edge (3116184)

This bulletin addresses 11 vulnerabilities in Microsoft Edge. An attacker could take control of an affected system if a user visits a specially crafted website using Microsoft Edge. This bulletin should also be given the highest priority for patching.

MS15-126: Security Update for Microsoft Graphics Component (3116162)

This bulletin addresses six vulnerabilities in Microsoft Graphics Component that could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage that contains embedded TrueType or OpenType fonts. This bulletin should be prioritized for patching as soon as possible.

MS15-128: Security Update for Microsoft Windows to Address Remote Code Execution (3104503)

This bulletin addresses vulnerabilities in Windows that could allow remote code execution if a user opens a specially crafted document or visits a malicious webpage using Internet Explorer. This bulletin should be given high priority for patching as well.

MS15-130: Security Update for Microsoft Office to Address Remote Code Execution (3116162)

This bulletin addresses one vulnerability in Microsoft Office that could allow remote code execution if a user opens a specially crafted Microsoft Office file. This bulletin should also be given the highest priority for patching.

Important Bulletins

MS15-127: Security Update for Windows Media Center to Address Remote Code Execution (3108669)

This bulletin addresses a vulnerability in Windows Media Center that could allow remote code execution if a user opens a specially crafted media file. This bulletin should be prioritized for patching.

MS15-129: Security Update for Silverlight to Address Remote Code Execution (3106614)

This bulletin addresses two vulnerabilities in Microsoft Silverlight that could allow remote code execution if a user visits a specially crafted website that contains embedded Silverlight content. This bulletin should also be prioritized for patching.

MS15-131: Security Update for Microsoft Office to Address Information Disclosure (3116111)

This bulletin addresses a vulnerability in Microsoft Office that could allow information disclosure if a user opens a specially crafted Microsoft Office file. This bulletin should be prioritized for patching.

MS15-132: Security Update for Microsoft Windows to Address Denial of Service (3116130)

This bulletin addresses a vulnerability in Windows that could allow a denial of service attack if an attacker sends a specially crafted packet to an affected system. This bulletin should be prioritized for patching.

MS15-133: Security Update for Windows PGM to Address Remote Code Execution (3116131)

This bulletin addresses a vulnerability in Windows PGM that could allow remote code execution if an attacker sends a specially crafted packet to an affected system. This bulletin should also be prioritized for patching.

MS15-134: Security Update for Skype for Business and Microsoft Lync to Address Information Disclosure (3116137)

This bulletin addresses a vulnerability in Skype for Business and Microsoft Lync that could allow information disclosure if a user clicks on a specially crafted URL. This bulletin should be prioritized for patching as well.

Conclusion

As always, it is highly recommended that users and administrators apply these security updates as soon as possible to ensure the security and stability of their systems. In addition to Microsoft’s monthly security updates, it is also important to keep all third-party software up to date to avoid potential vulnerabilities.


Overview of December 2015 Patch Tuesday

Microsoft's Patch Tuesday for December 2015 included a total of 12 security bulletins, addressing 71 vulnerabilities across various Microsoft products. This is a significant decrease from November 2015, which had 16 bulletins and addressed 135 vulnerabilities. Of the 12 bulletins released in December, five were rated as critical, six were rated as important, and one was rated as moderate.

Key vulnerabilities addressed in the latest patch

The most critical vulnerabilities addressed in this month's patch include remote code execution flaws in Windows kernel-mode drivers and Internet Explorer. These flaws could allow an attacker to take control of a system remotely and execute arbitrary code. Microsoft Office also received critical updates to address remote code execution flaws. Additionally, several information disclosure vulnerabilities were patched, which could allow an attacker to gain access to sensitive data on a system.

Critical updates for Microsoft Office and Internet Explorer

One of the critical updates in this month's patch included a fix for a vulnerability in Microsoft Office that could allow an attacker to execute malicious code by tricking the user into opening a specially crafted file. Another critical update was for Internet Explorer, addressing multiple remote code execution vulnerabilities that could allow an attacker to take control of a system if the user visits a malicious website.

Fixes for Windows kernel-mode drivers and remote code execution flaws

Several critical updates were released for Windows kernel-mode drivers, addressing multiple remote code execution flaws. These flaws could allow an attacker to take control of a system remotely and execute arbitrary code. Microsoft also released a fix for a vulnerability in the Windows Graphics Device Interface (GDI), which could allow an attacker to execute arbitrary code if a user opens a specially crafted file.

Update for Microsoft Edge browser

Microsoft Edge, the new default browser in Windows 10, received a security update addressing a vulnerability that could allow an attacker to bypass the Same-Origin Policy. This policy is designed to prevent scripts from one website accessing data on another website, but this vulnerability could allow an attacker to bypass this restriction and access sensitive data.

Information disclosure vulnerability fixes

Several information disclosure vulnerabilities were addressed in the December patch, including a vulnerability in Windows Media Center that could allow an attacker to read files on a system with elevated privileges. Another information disclosure vulnerability was patched in Microsoft Exchange Server, which could allow an attacker to gain access to sensitive data.

Steps to install December Patch Tuesday updates

To install the December Patch Tuesday updates, users should follow these steps:1. Open the Control Panel and select Windows Update.2. Click on Check for Updates.3. Select all available updates and click Install.4. Follow the prompts to complete the installation process.5. Restart the system if prompted to do so.

Organization-wide impact of Patch Tuesday updates

Patching vulnerabilities addressed in Patch Tuesday updates is critical to maintaining the security of an organization's systems. Failure to install these updates could lead to exploitation of unaddressed vulnerabilities, potentially resulting in data breaches and other security incidents. Organizations should prioritize testing and implementing these updates as soon as possible to minimize their exposure to known vulnerabilities.

Importance of maintaining regular patching schedules

Regular patching of systems is essential to maintain the security of an organization's infrastructure. The release of Patch Tuesday updates by Microsoft provides a regular schedule for organizations to follow, making it easier to manage the patching process. Failure to keep systems up-to-date with the latest security patches can leave organizations vulnerable to known vulnerabilities, making them an easy target for attackers.

Future implications of unaddressed vulnerabilities and the need for continuous vigilance

Unaddressed vulnerabilities in an organization's systems can have significant future implications, potentially leading to data breaches and other security incidents. Continuous vigilance is necessary to ensure that systems are up-to-date with the latest security patches. Organizations should prioritize testing and implementing Patch Tuesday updates on a regular basis to minimize their exposure to known vulnerabilities. Additionally, organizations should consider implementing a vulnerability management program to ensure that their systems remain secure over time.

Microsoft Patch Tuesday Dec 2015: A Story of Security Updates

It was a typical Tuesday morning at Microsoft headquarters when the security team received word of a potential vulnerability in their software. As they investigated, they discovered several other vulnerabilities that could be exploited by hackers, putting millions of users at risk. This was a serious matter that required immediate attention.

The Solution

Microsoft sprang into action and developed patches to fix the vulnerabilities. On December 8th, 2015, they released a slew of updates for Windows and Office products in what has become known as Patch Tuesday.

What is Patch Tuesday?

Patch Tuesday is a term used to describe the second Tuesday of every month when Microsoft releases security updates for its products. These updates are designed to fix vulnerabilities and improve the overall security of Microsoft software.

The Importance of Patching

It is crucial for users to install these updates as soon as possible. Hackers are always on the lookout for vulnerabilities they can exploit, and failure to patch leaves users vulnerable to attack. In fact, many high-profile attacks in recent years have been the result of unpatched systems.

Microsoft takes security very seriously and works tirelessly to identify and fix vulnerabilities. However, it is up to users to do their part and install patches promptly to ensure their systems are protected.

Key Takeaways:

  • Microsoft released security updates for Windows and Office products on December 8th, 2015
  • This release is referred to as Patch Tuesday
  • Users should install security updates promptly to protect their systems from potential vulnerabilities

By staying vigilant and keeping their systems up-to-date, users can help ensure the security of their data and protect themselves from malicious attacks.


Closing Message for Blog Visitors about Microsoft Patch Tuesday Dec 2015

As we come to the end of this blog post on the Microsoft Patch Tuesday Dec 2015, we hope that you found the information shared here helpful. The release of the patches this month was significant, with 12 bulletins addressing various vulnerabilities across Microsoft products.

We started by highlighting the importance of patching and keeping your systems up to date to avoid cybersecurity risks. We discussed the different types of vulnerabilities addressed by the patches, including remote code execution, elevation of privilege, denial of service, and information disclosure.

Our discussion then delved into each of the bulletins released, highlighting the affected products, the severity of the vulnerabilities, and the recommended actions. We also provided links to the relevant Microsoft Security Bulletins for more detailed information.

We emphasized the critical nature of some of the vulnerabilities addressed, such as the MS15-128 bulletin, which fixed a vulnerability that could allow remote code execution if a user opens specially crafted media content hosted on a website. We also highlighted the need for caution when downloading and installing patches and the importance of testing them in a controlled environment before deployment to production systems.

Throughout the post, we used transition words to guide you through the different sections, making it easy to follow and understand. We also used a professional tone and language, ensuring that the information provided was clear and concise.

Finally, we want to reiterate the importance of patching and keeping your systems up to date. Cybersecurity threats are constantly evolving, and attackers are always looking for new ways to exploit vulnerabilities. By staying vigilant and applying patches promptly, you can reduce your risk of falling victim to cyber-attacks.

Thank you for taking the time to read this blog post. We hope that you found it informative and useful. Please let us know if you have any questions or feedback by leaving a comment below.


People Also Ask About Microsoft Patch Tuesday Dec 2015

What Is Microsoft Patch Tuesday?

Microsoft Patch Tuesday is an event that takes place on the second Tuesday of every month. During this event, Microsoft releases patches and updates for its software products to fix security vulnerabilities and improve overall performance.

What Was Included in the December 2015 Patch Tuesday Release?

The December 2015 Patch Tuesday release included 12 security bulletins that addressed a total of 71 vulnerabilities. These vulnerabilities affected various Microsoft products, including Windows, Internet Explorer, Edge, Office, and Exchange Server.

What Are the Risks of Not Installing the December 2015 Patches?

Failure to install the December 2015 patches could leave your computer vulnerable to attacks from hackers and cybercriminals. These patches address critical security vulnerabilities that could be exploited by attackers to gain unauthorized access to your system or steal sensitive data.

How Can I Install the December 2015 Patches?

You can install the December 2015 patches through the Windows Update feature on your computer. Simply go to Settings > Update & Security > Windows Update and click on Check for Updates. Alternatively, you can download the patches from the Microsoft Download Center and install them manually.

Is It Important to Keep My System Up-to-Date with the Latest Patches?

Yes, it is crucial to keep your system up-to-date with the latest patches and updates released by Microsoft. These patches address critical security vulnerabilities and improve the overall performance and stability of your system. Failure to install these updates could leave your system vulnerable to attacks from cybercriminals and compromise your personal and sensitive information.

  • Ensure that your Windows Update settings are configured to automatically download and install updates.
  • Regularly check for updates and install them promptly.
  • Keep all your software, including third-party applications, up-to-date to ensure maximum security.