Published on: 11 February 2016
Microsoft has released 12 security bulletins listed below addressing multiple vulnerabilities which affect several Microsoft products or components:
MS16-009 Cumulative Security Update for Internet Explorer
MS16-011 Cumulative Security Update for Microsoft Edge
MS16-012 Security Update for Microsoft Windows PDF Library to Address Remote Code Execution
MS16-013 Security Update for Windows Journal to Address Remote Code Execution
MS16-014 Security Update for Microsoft Windows to Address Remote Code Execution
MS16-015 Security Update for Microsoft Office to Address Remote Code Execution
MS16-016 Security Update for WebDAV to Address Elevation of Privilege
MS16-017 Security Update for Remote Desktop Display Driver to Address Elevation of Privilege
MS16-018 Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege
MS16-019 Security Update for .NET Framework to Address Denial of Service
MS16-020 Security Update for Active Directory Federation Services to Address Denial of Service
MS16-021 Security Update for NPS RADIUS Server to Address Denial of Service
A complete list of the affected products can be found in the section "Affected Software" in the Microsoft security bulletin summary available at:
https://technet.microsoft.com/library/security/ms16-feb
Depending on the vulnerability exploited, a successful attack could lead to a denial-of-service condition, arbitrary code execution, elevation of privilege and information disclosure.
Patches for affected products are available from the Microsoft Update website. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
If any problem is encountered during the patch installation via automated methods, patches for various affected systems can also be downloaded individually from the "Affected and Non-Affected Software" section of the corresponding Microsoft Security Advisory and Bulletins which can be accessed from the URL(s) listed in the "More Information" section of this Security Alert.
https://technet.microsoft.com/en-us/library/security/ms16-feb
https://technet.microsoft.com/library/security/MS16-009
https://technet.microsoft.com/library/security/MS16-011
https://technet.microsoft.com/library/security/MS16-012
https://technet.microsoft.com/library/security/MS16-013
https://technet.microsoft.com/library/security/MS16-014
https://technet.microsoft.com/library/security/MS16-015
https://technet.microsoft.com/library/security/MS16-016
https://technet.microsoft.com/library/security/MS16-017
https://technet.microsoft.com/library/security/MS16-018
https://technet.microsoft.com/library/security/MS16-019
https://technet.microsoft.com/library/security/MS16-020
https://technet.microsoft.com/library/security/MS16-021
https://blogs.msdn.microsoft.com/ie/2014/08/07/stay-up-to-date-with-internet-explorer/
https://www.hkcert.org/my_url/en/alert/16021101 (to 16021112)
https://www.us-cert.gov/ncas/current-activity/2016/02/09/Microsoft-Releases-February-2016-Security-Bulletin
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0022
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0033
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0036 (to CVE-2016-0042)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0044
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0046 (to CVE-2016-0056)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0058 (to CVE-2016-0064)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0067 (to CVE-2016-0069)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0071
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0072
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0077
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0080
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0084