Published on: 13 July 2016
Microsoft has released 11 security bulletins listed below addressing multiple vulnerabilities which affect several Microsoft products or components:
MS16-084 Cumulative Security Update for Internet Explorer
MS16-085 Cumulative Security Update for Microsoft Edge
MS16-086 Cumulative Security Update for JScript and VBScript
MS16-087 Security Update for Windows Print Spooler Components
MS16-088 Security Update for Microsoft Office
MS16-089 Security Update for Windows Secure Kernel Mode
MS16-090 Security Update for Windows Kernel-Mode Drivers
MS16-091 Security Update for .NET Framework
MS16-092 Security Update for Windows Kernel
MS16-093 Security Update for Adobe Flash Player
MS16-094 Security Update for Secure Boot
A complete list of the affected products can be found in the section "Affected Software" in the Microsoft security bulletin summary available at:
https://technet.microsoft.com/library/security/ms16-jul
Depending on the vulnerability exploited, a successful attack could lead to arbitrary code execution, denial-of-service condition, elevation of privilege, security restrictions bypass and information disclosure.
Patches for affected products are available from the Microsoft Update website. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
If any problem is encountered during the patch installation via automated methods, patches for various affected systems can also be downloaded individually from the "Affected and Non-Affected Software" section of the corresponding Microsoft Security Advisory and Bulletins which can be accessed from the URL(s) listed in the "More Information" section of this Security Alert.
https://technet.microsoft.com/en-us/library/security/ms16-jul
https://technet.microsoft.com/library/security/MS16-084
https://technet.microsoft.com/library/security/MS16-085
https://technet.microsoft.com/library/security/MS16-086
https://technet.microsoft.com/library/security/MS16-087
https://technet.microsoft.com/library/security/MS16-088
https://technet.microsoft.com/library/security/MS16-089
https://technet.microsoft.com/library/security/MS16-090
https://technet.microsoft.com/library/security/MS16-091
https://technet.microsoft.com/library/security/MS16-092
https://technet.microsoft.com/library/security/MS16-093
https://technet.microsoft.com/library/security/MS16-094
https://www.us-cert.gov/ncas/current-activity/2016/07/12/Microsoft-Releases-Security-Updates
https://www.hkcert.org/my_url/en/alert/16071301
https://www.hkcert.org/my_url/en/alert/16071302
https://www.hkcert.org/my_url/en/alert/16071303
https://www.hkcert.org/my_url/en/alert/16071304
https://www.hkcert.org/my_url/en/alert/16071305
https://www.hkcert.org/my_url/en/alert/16071306
https://www.hkcert.org/my_url/en/alert/16071307
https://www.hkcert.org/my_url/en/alert/16071308
https://www.hkcert.org/my_url/en/alert/16071309
https://www.hkcert.org/my_url/en/alert/16071310
http://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2016-3204
http://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2016-3238 (to CVE-2016-3246)
http://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2016-3248 (to CVE-2016-3252)
http://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2016-3254 (to CVE-2016-3256)
http://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2016-3258 (to CVE-2016-3261)
http://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2016-3264 (to CVE-2016-3265)
http://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2016-3269
http://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2016-3271 (to CVE-2016-3274)
http://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2016-3276 (to CVE-2016-3284)
http://cve.mitre.org/cgi-bin/cvename.cgi?name= CVE-2016-3286 (to CVE-2016-3287)