Threat Level: green Handler on Duty: Renato Marinho

SANS ISC: Microsoft Patch Tuesday - SANS Internet Storm Center Microsoft Patch Tuesday


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Microsoft Patch Tuesday 2015-12-08

MS15-124
Title Cumulative Security Update for Internet Explorer
Replaces MS15-124, KB3115677
Affected Internet Explorer
KB KB3116180
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-6083 14
MS15-125
Title Cumulative Security Update for Microsoft Edge
Replaces MS15-112
Affected Microsoft Edge
KB KB3116184
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-6139 14
MS15-126
Title Cumulative Security Update for JScript and VBScript
Replaces MS15-066
Affected JScript/VBScript (IE8,Vista and 2008 only)
KB KB3116178
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-6135 2
2015-6136 1
MS15-127
Title Remote Code Execution in Microsoft Windows DNS
Replaces MS12-017
Affected Microsoft DNS Server
KB KB3100465
Known Exploits No
Microsoft Rating Critical
ISC Client Rating N/A
ISC Server Rating N/A
CVE Exploitability
2015-6125 2
MS15-128
Title Remote Code Execution Vulnerability in Microsoft Graphics Component
Replaces MS15-115
Affected various components (.Net, Lync, Silverlight, Skype..)
KB KB3104503
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-6106 1
2015-6107 1
2015-6108 1
MS15-129
Title Remote Code Execution in Microsoft Silverlight
Replaces MS15-080
Affected Silverlight
KB KB3106614
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-6114 2
2015-6165 2
2015-6166 1
MS15-130
Title Remote Code Execution in Microsoft Uniscribe
Replaces MS14-036
Affected Uniscribe
KB KB3108670
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-6130 3
MS15-131
Title Remote Code Execution Vulnerability in Microsoft Office
Replaces MS15-116
Affected Office
KB KB3116111
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-6040 1
2015-6118 1
2015-6122 1
2015-6124 1
2015-6172 1
2015-6177 1
MS15-132
Title Remote Code Execution in Microsoft Windows
Replaces MS15-115, MS15-122
Affected Windows
KB KB3116162
Known Exploits No
Microsoft Rating Important
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-6128 2
2015-6132 2
2015-6133 2
MS15-133
Title Privilege Escalation Vulnerability in Windows PGM
Replaces
Affected Microsoft Message Queuing (MSMQ)
KB KB3116130
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2015-6126 2
MS15-134
Title Remote Code Execution in Windows Media Center
Replaces MS15-100
Affected Windows Media Center
KB KB3108669
Known Exploits No
Microsoft Rating Important
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-6127 2
2015-6131 2
MS15-135
Title Privilege Elevation Vulnerability in Windows Kernel-Mode Drivers
Replaces MS15-115, MS15-122
Affected Kernel-Mode Drivers (Library Loading)
KB KB3119075
Known Exploits Yes
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2015-6171 1
2015-6173 1
2015-6174 1
2015-6175 4
We will update issues on this page for about a week or so as they evolve. We appreciate your updates!
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
(*): ISC rating
  • We use 4 levels:
    • PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
    • Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
    • Important: Things where more testing and other measures can help.
    • Less Urgent: practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
    • The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threatatches.