https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2023 MSP 501 Application
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2023 MSP 501 Application
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

Security


Patch Tuesday: We Read the Security Bulletins So You Don’t Have To

  • Written by
  • July 11, 2017
Microsoft just released several different security bulletins. Do you need to panic over any of them? We've gone ahead and done the reading -- and possible panicking -- for you.

Windows 10 works on desktops, laptops, tablets, and laptops that can turn into tablets (sometimes called convertibles or laplets). But it's touchscreen interface is far from perfect, especially when you compare it to Android or iOS.

Here's something new: Microsoft's changed the way they number their bulletins. The previous model used security bulletin ID numbers; this method is being retired, and the new security bulletins will be identified by vulnerability ID numbers and KB Article ID numbers.

So we'll be changing how we present the information. We will be sorting out the security updates by application and by operating system. You can scan through for the ones that affect you, then see what you may want/need to install.

Internet Explorer 11

KB4025344 (OS Build 10586.1007) —Windows 10 Version 1511 for 32-bit Systems and x64-based Systems

What vulnerabilities does this update fix? "Addressed issue introduced by KB4032693 where Internet Explorer 11 may close unexpectedly when you visit some websites. " and "Security updates to Internet Explorer 11, Microsoft Scripting Engine, Microsoft Edge, Windows Search, Windows shell, Windows kernel-mode drivers, Microsoft Graphics Component, Windows kernel, .NET Framework, Windows Virtualization, Windows Server, Windows Storage and File Systems, Datacenter Networking, Microsoft NTFS, ASP.NET, and Microsoft PowerShell."

KB4025339 (OS Build 14393.1480) — Windows 10 Version 1607 for 32-bit Systems and x64-bit systems

What vulnerabilities does this update fix? "Security updates to the Windows shell, Microsoft Graphics Component, Windows Search, Windows kernel, Windows kernel-mode drivers, the .NET Framework, Windows Server, Windows Virtualization, Windows Storage and File Systems, Datacenter Networking, Internet Explorer 11, Microsoft PowerShell, Microsoft Edge, and the Microsoft Scripting Engine. "

KB4025338 (OS Build 10240.17488) — Windows 10 for x64-based Systems

What vulnerabilities does this update fix? "Addressed issue introduced by KB4032695 where Internet Explorer 11 may close unexpectedly when you visit some websites" and "Addressed issue that can cause cursor flicker when hovering over a popup menu option in Internet Explorer 11 and Microsoft Edge." and "Addressed issue where Internet Explorer 11 crashes when a user clicks on an empty column header and then quickly does a Shift + double-click."

KB4025338 (OS Build 10240.17488) — Windows 10 for 32-bit Systems

What vulnerabilities does this update fix? "Addressed issue introduced by KB4032693 where Internet Explorer 11 may close unexpectedly when you visit some websites. " and "Security updates to Internet Explorer 11, Microsoft Scripting Engine, Microsoft Edge, Windows Search, Windows shell, Windows kernel-mode drivers, Microsoft Graphics Component, Windows kernel, .NET Framework, Windows Virtualization, Windows Server, Windows Storage and File Systems, Datacenter Networking, Microsoft NTFS, ASP.NET, and Microsoft PowerShell." and "Addressed issue introduced by KB4032695 where Internet Explorer 11 may close unexpectedly when you visit some websites" and "Addressed issue that can cause cursor flicker when hovering over a popup menu option in Internet Explorer 11 and Microsoft Edge." and "Addressed issue where Internet Explorer 11 crashes when a user clicks on an empty column header and then quickly does a Shift + double-click."

KB4025342 (OS Build 15063.483) — Windows 10 Version 1703 for 32-bit and x64-based Systems

What vulnerabilities does this update fix? "Security updates to Internet Explorer 11, Microsoft Edge, Windows Search, Windows kernel, Windows shell, Microsoft Scripting Engine, Windows Virtualization, Datacenter Networking, Windows Server, Windows Storage and File Systems, Microsoft Graphics Component, Windows kernel-mode drivers, ASP.NET, Microsoft PowerShell, and the .NET Framework."

Microsoft Edge

KB4025344 (OS Build 10586.1007) — Windows 10 Version 1511 for 32-bit Systems and x64-based Systems

What vulnerabilities does this update fix? "Addressed issue that causes .jpx and .jbig2 images to stop rendering in PDF files."

KB4025339 (OS Build 14393.1480) — Windows 10 Version 1607 for 32-bit Systems and x64-based Systems

What vulnerabilities does this update fix? "Security updates to the Windows shell, Microsoft Graphics Component, Windows Search, Windows kernel, Windows kernel-mode drivers, the .NET Framework, Windows Server, Windows Virtualization, Windows Storage and File Systems, Datacenter Networking, Internet Explorer 11, Microsoft PowerShell, Microsoft Edge, and the Microsoft Scripting Engine."

KB4025342 (OS Build 15063.483) — Windows 10 Version 1703 for x64-based Systems for 32-bit Systems and x64-based Systems

What vulnerabilities does this update fix? "Security updates to the Windows shell, Microsoft Graphics Component, Windows Search, Windows kernel, Windows kernel-mode drivers, the .NET Framework, Windows Server, Windows Virtualization, Windows Storage and File Systems, Datacenter Networking, Internet Explorer 11, Microsoft PowerShell, Microsoft Edge, and the Microsoft Scripting Engine." and "Addressed issue that causes .jpx and .jbig2 images to stop rendering in PDF files."

KB4025338 (OS Build 10240.17488) — Windows 10 for 32-bit Systems and x64-based Systems

What vulnerabilities does this update fix? "Security updates to the Windows shell, Microsoft Graphics Component, Windows Search, Windows kernel, Windows kernel-mode drivers, the .NET Framework, Windows Server, Windows Virtualization, Windows Storage and File Systems, Datacenter Networking, Internet Explorer 11, Microsoft PowerShell, Microsoft Edge, and the Microsoft Scripting Engine."

Microsoft Office 2007 (all editions)

Microsoft Office 2007 Service Pack 3

What vulnerabilities does this update fix? "A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user. Exploitation of this vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office software." See also this security fix, which also addresses a remote code execution issue

Microsoft Office 2010 (all editions)

Microsoft Office 2010 Service Pack 2 — 32-bit and 64-bit editions

What vulnerabilities does this update fix? "A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user. Exploitation of this vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office software."

Microsoft Office 2010 Service Pack 2 — 32-bit and 64-bit editions

What vulnerabilities does this update fix? Another case of — you guessed it — "remote code execution vulnerability."

Microsoft Office 2013 (all editions)

Microsoft Office 2013 Service Pack 1

What vulnerabilities does this update fix? "A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles files in memory."

Microsoft Office 2016 (all editions)

Microsoft Office 2016 — 32 and 64-bit editions

What vulnerabilities does this update fix? "A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles files in memory."

Microsoft Office 2016 for Mac

What vulnerabilities does this update fix? "A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The security update addresses the vulnerability by correcting how Microsoft Office handles files in memory."

Adobe Flash Player

Security update for Adobe Flash Player: July 11, 2017

What vulnerabilities does this update fix? "This security update resolves vulnerabilities in Adobe Flash Player if it's installed on any supported edition of Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows 10, Windows 10 Version 1511, Windows 10 Version 1607, Windows 10 Version 1703, Windows 8.1, or Windows RT 8.1. "

Tags: Agents Cloud Service Providers MSPs VARs/SIs Security

Most Recent


  • Making Waves
    8 Channel People Making Waves This Week at Lumen, Accenture, Amazon, Canalys, More
    Cisco led a “crowded” secure access service edge (SASE) market in terms of revenue in 2022, experts said.
  • network in the cloud
    Fortinet, Huawei, Palo Alto, VMware Lauded in Gartner Peer Insights SD-WAN Study
    Thousands of customers have weighed in on how their SD-WAN vendors have performed.
  • Do AWS, Azure, Google, Oracle, Others, Have Too Much Market Power?
    The FTC, concerned about cloud vendors’ sway over customers, is seeking public comment.
  • Unemployed, layoffs
    Veeam Layoffs Impact 200 Workers, Company Remains 'Strong, Profitable'
    Veeam continues to hire for roles in R&D.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • White House
    White House Urges Companies to Take Ransomware Attacks More Seriously
  • Security shield on digital background
    VMware Security Connect Focused on Redefining Security, Increasing Threats
  • Fortune 500 2021 logo
    AT&T, Microsoft, Verizon, More Tech, Telco Companies Make Latest Fortune 500
  • SDN
    Windstream Rolls Out Enhancements for VMware-Powered SD-WAN

Upcoming Events

View all

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Channel Partners Europe

June 13, 2023 - June 14, 2023

Channel Futures Leadership Summit

October 30, 2023 - November 2, 2023

Galleries

View all

8 Channel People Making Waves This Week at Lumen, Accenture, Amazon, Canalys, More

March 24, 2023

National Women’s History Month: Channel Women Have Stories to Tell

March 24, 2023

VEC Attack Tries to Steal $36 Million, Ferrari, Dole Hit with Ransomware Attacks

March 23, 2023

Industry Perspectives

View all

Selling Your MSP: Strategic vs. Financial Buyers

March 22, 2023

10 Strategic Smart Enterprise Drivers for 2023

March 16, 2023

Does Your Company Have a Virtual Water Cooler?

March 13, 2023

Webinars

View all

Equipping the Hybrid Workforce: What It Takes to Execute

March 28, 2023

Give Customers the Power: How MSPs Can Leverage Cloud Choice

April 4, 2023

DE&I Dialogue: How the Right DE&I Initiatives Can Propel Your Business

April 5, 2023

White Papers

View all

6 UCaaS Reseller Challenges and How Real World Businesses Solved Them

February 1, 2023

Frost Radar: North American UCaaS Market, 2022

February 1, 2023

The Complete Guide to White-Label UCaaS for Reseller Success

February 1, 2023

Channel Futures TV

View all

Coffee with Craig and James Episode 121: Hewlett Packard Enterprise

Aryaka ‘Driving Value to the Channel Community’ with Throttle

March 24, 2023

Real-Life M&A: Advice for a Successful Channel Deal

March 13, 2023

Coffee with Craig and James Episode 120: Ronnell Richards

March 3, 2023

Twitter

ChannelFutures

Channel people making waves include: @jmcbain, @NetworkMoe, @ajassy, @JulieSweet, @Elvia_Valdes_M, @GovITDave… twitter.com/i/web/status/1…

March 24, 2023
ChannelFutures

We delve into AI impacting the channel, this week featuring @nvidia, @GoTo, @twilio and more.… twitter.com/i/web/status/1…

March 24, 2023
ChannelFutures

[email protected]_Inc's Peer Insights are a treasure trove for partners looking to sell #SDWAN. dlvr.it/SlRDmk https://t.co/oElLXzOIbb

March 24, 2023
ChannelFutures

#CPExpo preview: @GlobalIndirect of @AryakaChannel with a preview of the next phase of the company's channel progra… twitter.com/i/web/status/1…

March 24, 2023
ChannelFutures

U.S. competition regulators want to know if @AWSCloud, @Azure, @GoogleCloud, @OracleCloud hold too much market powe… twitter.com/i/web/status/1…

March 24, 2023
ChannelFutures

📣 Join us on April 13th to hear from the 2023 Channel Influencers and get their insights on the state of the channe… twitter.com/i/web/status/1…

March 24, 2023
ChannelFutures

#CPExpo preview: Learn about why @USWired accepted an #acquisition deal and what partners should look for in an M&A… twitter.com/i/web/status/1…

March 24, 2023
ChannelFutures

.@Veeam lays off 200 workers to increase efficiency. #backupandrecovery dlvr.it/SlQWZW https://t.co/QTJx1NX69q

March 24, 2023

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X