News Stay informed about the latest enterprise technology news and product updates.

May Patch Tuesday brings critical updates for browsers, Microsoft Office

Microsoft issued 16 security bulletins for May's Patch Tuesday, including critical updates for its Internet Explorer and Edge browsers, as well as Microsoft Office.

Microsoft released 16 bulletins, with eight tagged as critical, for May's Patch Tuesday.

Internet Explorer (IE) and Microsoft Edge received critical cumulative security updates addressing remote code execution (RCE) vulnerabilities that could give an attacker the same user rights as the current user. If the current user has administrative rights, the attacker could control the affected machine and install programs, or create new accounts with full user rights.

MS16-051, which resolved five vulnerabilities in IE, is rated critical for IE 9 and IE 11 on affected Windows clients. One of the critical vulnerabilities, CVE-2016-0189, is currently under attack in the wild.

"That's the one you want to install quickly. That's a no-brainer," said Wolfgang Kandek, CTO for Qualys Inc., in Redwood City, Calif.

The flaw -- which is also addressed in MS16-053 -- is in the JavaScript engine, which is packaged separately from IE in Windows Vista and Windows 2008. James Rowney, service manager at Verismic Software Inc., in Aliso Viejo, Calif., said even if a user is not using IE, it still needs to be patched because it runs in the background and can get attacked by hackers. 

MS016-052 resolved four critical vulnerabilities in Microsoft Edge, none of which are being exploited in the wild. The update addresses the vulnerabilities by modifying how the browser handles objects in memory.

MS16-054 resolved four vulnerabilities in Microsoft Office. An attacker who exploits the vulnerabilities could run arbitrary code in the context of the current user. However, users whose accounts have fewer rights could be affected less than users with administrative rights. There are two vulnerabilities that are in the Rich Text Format (RTF), which can be triggered through the Outlook preview pane without users actually having to open at attachment.

"[RTF] is a little bit difficult to defend because there are a lot of permutations and combinations you have to go through to thoroughly test it," said Amol Sarwate, director of engineering at Qualys. "RTF vulnerabilities have been attacked 10 years now. It's a little bit difficult to comprehend that we still see it."

Sarwate said RTF is vulnerable due to the combination of legacy features that have to be supported and new features that have been added. There is also a prevalence of Windows and RTF files on the Internet that make it a high target for attackers.

Remaining critical bulletins

MS16-055 resolved RCE vulnerabilities in Microsoft Graphics Component. The update is rated critical for all supported releases of Microsoft Windows. The update addresses the vulnerabilities by correcting how the Windows GDI and Imaging components handle objects in memory.

MS16-056 resolved RCE vulnerabilities in Windows Journal by modifying how it parses Journal files.

MS16-057 resolved RCE vulnerabilities in Windows Shell that target Windows Server 2012. An attacker can gain access to the system if a user opens a specially crafted website that accepts user-provided online content, or if the attacker can convince a user to open specially crafted content.

The final critical bulletin, MS16-064, resolved an RCE vulnerability in Adobe Flash Player. An attacker could host a specially crafted webpage designed to exploit the vulnerabilities through IE and convince a user to visit the page. Adobe said it is holding back its update because there is another vulnerability that is currently under attack that it wants to fix before rolling out that update.

Hole plugged in Internet Information Services

Of the important bulletins, MS16-058 caught the attention of security researchers due to its prevalence in many Windows environments. The patch for this update closes a hole in Windows Internet Information Services (IIS) for Windows Vista, Windows Server 2008 and Windows Server 2008 Server Core installations. IIS is the platform a number of organizations will use to host an intranet or to share documents with users across the Internet.

"I haven't seen an update for IIS for a while. This looks like a local vulnerability, where the attacker has to be on the system already. These systems tend to be well-managed, so I don't think it's a highly important bulletin, but just by being there, it stands out to us," Kandek said.

The remaining important bulletins

Bulletin MS16-059 targeted an RCE exploit in Windows Media Center on Windows Vista, Windows 7 or Windows 8.1, which allows a hacker to gain control of a workstation if a user opens a Media Center link (.mcl) file containing the harmful code.

The patch for the Windows Media Center file highlights the industriousness of a hacker who will concentrate on finding an opening in a less widely known component to in the Windows operating system.

"The hackers don't care if it's a Windows Journal file or some other weird format no one uses. They just need one person out of a thousand who will click on the document to run the exploit," Sarwate said.

Bulletin MS16-060 affects all supported releases of Microsoft Windows -- from Windows Vista to Windows Server 2016 Technical Preview 5 -- that could let an intruder perform an elevation of privilege on a system through a symbolic-link parsing flaw in the Windows kernel. After exploiting this vulnerability and granting higher-level access, the attacker could then delete, view or change data, install programs and create accounts with full user rights.

Bulletin MS16-061 closed the elevation-of-privilege vulnerability by adjusting how a Windows system handles Remote Procedure Call (RPC) requests. A hacker could overtake a system and create an account with full rights by passing a specially constructed RPC request to an unpatched system. This bulletin concerns all supported releases of Microsoft Windows, including Windows Server 2016 Technical Preview 5.

Bulletin MS16-062 corrected several memory-handling issues with Windows kernel-mode drivers that could allow an attacker to run an application to perform an elevation of privilege. This vulnerability affects all supported releases of Windows, including Windows Server 2016 Technical Preview 5.

Microsoft closed a man-in-the-middle vulnerability in the Microsoft .NET Framework on affected Microsoft Windows systems by changing how .NET handles encrypted network packets with bulletin MS16-065.

Bulletin MS16-066 issued a correction for the virtual secure mode feature in all supported versions of Windows 10 that could let an attacker avoid code-integrity protections by executing a specially crafted application.

The final important bulletin MS16-067 fixed a hole with the Volume Manager Driver in all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2 and Windows RT 8.1. On an unpatched system, an attacker could access files and folder information on a user's USB disk that was mounted over Remote Desktop Protocol via Microsoft RemoteFX.

Administrators are strongly advised to restart Windows systems after applying patches to complete the patch process.

Changes with Windows updates

In April, Microsoft sent an email informing customers that a security update for Microsoft Graphics Component that was released as bulletin MS16-039 had been revised.

The email also said, as of May's security bulletins, all Windows updates would be available only through the Microsoft Update Catalog, not through the Download Center. Sarwate said the change is not something that would affect either home users or corporate users, but it's a different way of getting updates.

For more information about the May Patch Tuesday security bulletins, visit Microsoft's Security TechCenter site.

Next Steps

Microsoft releases zero-day update for Adobe in April Patch Tuesday

IE 9 re-emerges in March Patch Tuesday

Adobe Flash update elevated in February Patch Tuesday

Dig Deeper on Windows Server and Network Security

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

4 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Which of the May Patch Tuesday updates will have the greatest effect on your organization?
Cancel
I'm so glad MS didn't install the locks on the doors of my office. Oh wait, to a great extent that's exactly what they did. Metaphorical doors and locks. We simply can not trust a company that delivers such poorly constructed programs. Even when the sea of endless patches arrive, we often have to shift our efforts to roll back the latest round of so-called updates so our machines can function. It's hard to believe this is the way things are supposed to work....
Cancel
If my code was that bad I'd be out of a job. Who runs the Microsoft QA department? When has there been a patch that was not critical? Even when some are applied they break others. There have been a few I have had to uninstall because other features stopped working in Office or Outlook.
Cancel
We've heard the increased number of security bulletins may be a result of a more concerted effort by Microsoft to reduce vulnerabilities in Windows systems.
But we were wondering why we continue to see exploits in areas that have been patched, such as RTF files, that can often be triggered when a user views a message.
Cancel

-ADS BY GOOGLE

SearchServerVirtualization

SearchCloudComputing

SearchExchange

SearchSQLServer

SearchEnterpriseDesktop

SearchVirtualDesktop

Close