Threat Level: green Handler on Duty: Russell Eubanks

SANS ISC: Microsoft Patch Tuesday - SANS Internet Storm Center Microsoft Patch Tuesday


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Microsoft Patch Tuesday 2015-11-10

MS15-112
Title Cumulative Security Update for Internet Explorer
Replaces MS15-106
Affected Internet Explorer
KB KB3104517
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-2427 1
MS15-113
Title Cumulative Security Update for Microsoft Edge
Replaces MS15-107
Affected Microsoft Edge
KB KB3104519
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-6064 1
2015-6073 1
2015-6078 1
2015-6088 2
MS15-114
Title Remote Code Execution Vulnerability in Windows Journal
Replaces MS15-098
Affected Microsoft Journal
KB KB3100213
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-6088 3
MS15-115
Title Remote Code Execution Vulnerability in OpenType
Replaces MS15-073, MS15-097, MS15-111
Affected OpenType Fonts
KB KB3105864
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-6100 12
MS15-116
Title Remote Code Execution Vulnerabilties in Microsoft Office
Replaces MS12-066, MS13-035, MS14-020, MS14-048, MS15-022, MS15-046, MS15-081, MS15-110
Affected Office, Office Services and Web Apps, Skype, Lync
KB KB3104540
Known Exploits No
Microsoft Rating Important
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-2503 1
2015-6038 1
2015-6091 1
2015-6092 2
2015-6093 1
2015-6094 1
2015-6123 3
MS15-117
Title Elevation of Privilege Vulnerability in NDIS
Replaces
Affected NDIS
KB KB3101722
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2015-6098 24
MS15-118
Title Elevation of Privilege Vulnerabilities in .Net Framework
Replaces MS11-100, MS14-009, MS14-057
Affected .Net Framework
KB KB3104507
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2015-6096 1
2015-6099 2
2015-6115 2
MS15-119
Title Elevation of Privilege Vulnerabilities in Winsock
Replaces MS14-040
Affected Winsock
KB KB3104521
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2015-2478 2
MS15-120
Title Denial of Service Vulnerability in IPSec
Replaces
Affected IPSec
KB KB3102939
Known Exploits No
Microsoft Rating Important
ISC Client Rating N/A
ISC Server Rating N/A
CVE Exploitability
2015-6111 24
MS15-121
Title Spoofing Vulnerability in SChannel
Replaces MS15-055, MS15-076
Affected SChannel
KB KB3081320
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2015-6112 2
MS15-122
Title Security Feature Bypass in Kerberos
Replaces MS14-068, MS15-052, MS15-076
Affected Kerberos
KB KB3105256
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2015-6095 2
MS15-123
Title Information Disclosure Vulnerablity in Microsoft Lync and Skype for Business
Replaces MS15-097
Affected Skype for Business, Lync
KB KB3105872
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2015-6061 2
We will update issues on this page for about a week or so as they evolve. We appreciate your updates!
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
(*): ISC rating
  • We use 4 levels:
    • PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
    • Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
    • Important: Things where more testing and other measures can help.
    • Less Urgent: practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
    • The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threatatches.