Home > Cyber News > Nov 10 Patch Tuesday – from KB 3100773 to KB 3105211
CYBER NEWS

Nov 10 Patch Tuesday – from KB 3100773 to KB 3105211

microsoft-updatesYet another Patch Tuesday (November 10 2015) has rolled out, and the result is 21 new updates, 15 of which are listed as Important and 8 as Recommended. Keep in mind that if you install updates automatically, you may easily end up with patches your system doesn’t really need. Most of the updates are security-related and should be installed. The first update on the list is about fixing issues on Internet Explorer 11.

We have gathered the information about the updates for your convenience. Read it carefully. You should always have an idea of what you’re downloading to your personal computer.

As pointed out by security researchers, Microsoft is patching multiple vulnerabilities this month (some quite severe). 37 CVE listed vulnerabilities are being fixed with the four critical Bulletins. The company claims that none of the exploits you’re about to read about are being abused.

Let’s start with an important message from Microsoft regarding the security and non-security updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2: all of them require the installation of the update 2919355.

KB 3100773

The official description goes like that:

“This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see Microsoft Security Bulletin MS15-112. Additionally, this security update includes several nonsecurity-related fixes for Internet Explorer.”

KB 3103688

The update is described like an ‘Update for vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge: November 10, 2015.’

KB 3097992, KB 3097997, KB 3098779

The official description of these updates:

This update resolves vulnerabilities in the Microsoft .NET Framework. The most severe of these vulnerabilities could allow elevation of privilege if an attacker injects a client-side script into a user’s browser.

KB 3081320

This security update resolves a vulnerability in the OS. The vulnerability could allow spoofing if an attacker performs a man-in-the-middle attack between a client and a legitimate server.

KB 3092601

This patch takes care of a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privileges if an attacker logs on to a computer and runs specially crafted code that exploits the vulnerability.

KB 3097877

Another important security-driven fix for Windows. Exploiting severe vulnerabilities could allow remote code execution if an attacker tricks a user into opening a malicious document or to visit a suspicious webpage that contains embedded fonts.

KB 3101246

Official description:

This security update resolves a security feature bypass in Microsoft Windows. An attacker could bypass Kerberos authentication on a computer and decrypt drives that have BitLocker enabled. The bypass can be exploited only if the computer has BitLocker enabled without a PIN or USB key, the computer is domain joined, and the attacker has physical access to the computer.

What is Kerberos authentication?

Kerberos is a computer network authentication protocol. It functions by relying on ‘tickets’ to enable nodes communicate over a non-secure network and prove their identity to one another.

KB 3101746

The update is needed to fix vulnerabilities that could allow remote code execution.

KB 3102939

This update concerns a denial of service vulnerability in Microsoft Windows. An attacker who successfully exploited the vulnerability could cause the system to become unresponsive. Exploiting the vulnerability requires an attacker to have valid credentials.

KB 3034348

The update should fix an “Access denied” error when the user runs a Windows Store app to configure printer property settings in Windows.

KB 3095108

An update for the Transatel (France, Worldwide) network in Windows 8.1, Windows RT 8.1, Windows 8, and Windows RT.

KB 3102812

An update that contains some improvements for the Windows Update client in Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2.

KB 890830

An update concerning the Microsoft Windows Malicious Software Removal Tool designed to help remove specific, prevalent malicious software from computers running supported versions of Windows.

Users should note that MSRT will no longer be supported on Windows 2000-based systems after July 13, 2010.

And now we’re done with the important updates. We’re still waiting to see if any problems occur with any of them.

What about the Cumulative updates for Windows 10 – KB 3105213, KB 3105211?

KB 3105213 is a cumulative update for Win10. If we count correctly, this should be the 11th cumulative update for Win10 RTM. The second one is a cumulative update for Windows 10 version 1511. If we get things straight, this is the first update for Windows 10 build 1511. There’s something particularly interesting about this update and it is the fact that it was released before the product itself.

References

Microsoft
InfoWorld
SecureList

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

1 Comment
  1. Anthony Miller

    I installed KB3100773 on Windows 7 Pro as part of the full monty set and it screwed up sites that opened new windows as pop-ups (1-2 minute delays) so I uninstalled just this patch and normal service has been resumed

    Reply

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree