Microsoft Security Bulletins December 2016

Martin Brinkmann
Dec 13, 2016
Updated • Jan 4, 2018
Companies, Microsoft
|
22

Microsoft released a batch of updates for company products today as part of the company's monthly Patch Tuesday event.

The December 2016 overview of Microsoft's Bulletins provides you with detailed information on all bulletins and related information.

This includes, among other things, a list of all security bulletins and their severity rating, information about affected operating systems and other Microsoft products, update download information, and a list of non-security updates released by Microsoft since the November 2016 update.

Microsoft Security Bulletins December 2016

Executive Summary

  • Microsoft released a total of 12 bulletins on the December 2016 Patch Day.
  • 6 of those 12 bulletins received the highest severity rating of critical, the remaining 6 bulletins a rating of important, the second highest rating.
  • All Windows client and server operating systems that are supported by Microsoft are affected by at least one critical vulnerability.
  • Microsoft published updates for other companies, namely Microsoft Office, Microsoft Edge and Microsoft .Net Framework as well

Operating System Distribution

As far as bulletins are concerned, the critically rated bulletin Ms16-145 is only released for Windows 10 as it is a cumulative security update for Microsoft Edge.

Windows 10 shares the second "excess" bulletin that is rated critically with Windows RT 8.1 and Windows 8.1. This is MS16-154 that delivers security updates for Adobe Flash Player which is only part of Windows 8.1 and newer versions of Windows.

Last but not least, the two important vulnerabilities that affect only Windows 10 are MS16-150 and MS16-152. The first is a security update for secure kernel mode, the second a security update for Windows kernel.

  • Windows Vista: 3 critical, 3 important
  • Windows 7: 3 critical, 3 important
  • Windows 8.1: 4 critical, 3 important
  • Windows RT 8.1: 4 critical, 3 important
  • Windows 10: 5 critical, 5 important
  • Windows Server 2008: 2 critical, 3 important, 1 moderate
  • Windows Server 2008 R2: 2 critical, 3 important, 1 moderate
  • Windows Server 2012 and 2012 R2: 2 critical, 3 important, 2 moderate
  • Windows Server 2016: 2 critical, 5 important, 3 moderate
  • Server core: 2 critical, 5 important

Other Microsoft Products

  • Microsoft .Net Framework updates: 1 important
  • Microsoft Office 2007, 2010: 1 critical
  • Microsoft Office 2013, 2013 RT, 2016: 1 important
  • Microsoft Office for Mac 2011, Microsoft Office 2016 for Mac: 1 important
  • Microsoft Auto Updater for Mac: 1 important
  • Microsoft Office Compatibility Pack Service Pack 3: 1 critical
  • Microsoft Word Viewer, Microsoft Excel Viewer: 1 critical
  • Microsoft SharePoint Server 2007, 2010: 1 important
  • Microsoft Office Web Apps 2010: 1 important

Security Bulletins

Red = critical

MS16-144 -- Cumulative Security Update for Internet Explorer (3204059)

This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

MS16-145 -- Cumulative Security Update for Microsoft Edge (3204062)

This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than users with administrative user rights.

MS16-146 -- Security Update for Microsoft Graphics Component (3204066)

This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

MS16-147 -- Security Update for Microsoft Uniscribe (3204063)

This security update resolves a vulnerability in Windows Uniscribe. The vulnerability could allow remote code execution if a user visits a specially crafted website or opens a specially crafted document. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

MS16-148 -- Security Update for Microsoft Office (3204068)

This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

MS16-149 -- Security Update for Microsoft Windows (3205655)

This security update resolves vulnerabilities in Microsoft Windows. The more severe of the vulnerabilities could allow elevation of privilege if a locally authenticated attacker runs a specially crafted application.

MS16-150 -- Security Update for Secure Kernel Mode (3205642)

This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if a locally-authenticated attacker runs a specially crafted application on a targeted system. An attacker who successfully exploited the vulnerability could violate virtual trust levels (VTL).

MS16-151 -- Security Update for Windows Kernel-Mode Drivers (3205651)

This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application that could exploit the vulnerabilities and take control of an affected system.

MS16-152 -- Security Update for Windows Kernel (3199709)

This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure when the Windows kernel improperly handles objects in memory.

MS16-153 -- Security Update for Common Log File System Driver (3207328)

This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow information disclosure when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to bypass security measures on the affected system allowing further exploitation.

MS16-154 -- Security Update for Adobe Flash Player (3209498)

This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, Windows 10, and Windows Server 2016.

MS16-155 -- Security Update for .NET Framework (3205640)

This security update resolves a vulnerability in Microsoft .NET 4.6.2 Framework’s Data Provider for SQL Server. A security vulnerability exists in Microsoft .NET Framework 4.6.2 that could allow an attacker to access information that is defended by the Always Encrypted feature.

Security advisories and updates

None

Non-security related updates

We publish the remaining updates once Microsoft provides information on them.

KB3205400 -- December 2016 Security Only Quality Update for Windows 8.1 and Windows Server 2012 R

Security updates to the common log file system driver, Windows OS, kernel-mode driver, Microsoft Uniscribe, Internet Explorer, and the Microsoft Graphics Component

KB3205401 -- December 2016 Security Monthly Quality Rollup for Windows 8.1 and Windows Server 2012 R2

Includes all security updates described in Kb3205400, and all updates of KB3197875 for Windows 8.1 and Windows Server 2012 R2.

KB3205394 -- December 2016 Security Only Quality Update for Windows 7 SP1 and Windows Server 2008 R2 SP1

Security updates to the common log file system driver, Windows OS, kernel-mode drivers, Microsoft Graphics Component, Microsoft Uniscribe, and Internet Explorer.

KB3207752 -- December 2016 Security Monthly Quality Rollup for Windows 7 SP1 and Windows Server 2008 R2 SP1

Includes all security updates listed in KB3205394, and all updates released as KB3197869.

KB3206632 -- December 13, 2016—KB3206632 (OS Build 14393.576)

This security update includes these additional improvements and fixes. No new operating system features are being introduced in this update. Key changes include:

  • Improved reliability of Security Support Provider Interface.
  • Addressed a service crash in CDPSVC that in some situations could lead to the machine not being able to acquire an IP address.
  • Addressed issue where a Catalog-signed module installation does not work on Nano Server.
  • Addressed issue with Devices left with Hello on for an excessive amount of time will not go into power savings mode.
  • Addressed issue with gl_pointSize to not work properly when used with drawElements method in Internet Explorer 11.
  • Addressed issue where Azure Active Directory-joined machines after upgrading to Windows 10 Version 1607 cannot sync with Exchange.
  • Addressed additional issues with app compatibility, updated time zone information, Internet Explorer.
  • Security updates to Microsoft Edge, Internet Explorer, Microsoft Uniscribe, Common Log File System Driver.

KB3201845 -- Cumulative Update for Windows 10 Version 1607 and Windows Server 2016: December 9, 2016

  • Improved the reliability of mobile device management (MDM) disenrollment, Distributed Component Object Model (DCOM), Peripheral Component Interface and PowerShell.
  • Addressed issue that causes excessive battery drain if you have a Chinese Input Method Editor installed and use Windows Hello to log in.
  • Addressed issue with OLE drag and drop that prevents users from downloading a SharePoint document library as a file.
  • Addressed issue with Super Floppy-formatted fixed media devices that are not recognized by Windows 10 Anniversary Update or accessible in Windows Explorer.
  • Addressed issue that causes the System Center Configuration Manager (SCCM) client to fail installation when a device is re-imaged using the SCCM task sequence.
  • Addressed issue that causes the loss of optional component (OC) state information, including all Hyper-V virtual machines, after upgrade.
  • Addressed issue that causes Windows Explorer to display information that’s inconsistent with what’s stored on the Floppy disk.
  • Addressed issue that, after connecting a shared CD/DVD-hosted drive with no media inserted, causes some of the commands, like DIR and NET USE, to hang.
  • Addressed issue where customers cannot use directory cache sizes greater than 64 KB.
  • Addressed issue where Windows Explorer sometimes does not prompt for credentials when a user logs on using a Microsoft account.
  • Addressed additional issues with application compatibility and Internet Explorer

KB3201021 -- Update for Windows 8.1 and Windows Server 2012 R2 -- Update that enables user to set Application Pool to run as Null Virtual Account in Windows 8.1 or Windows Server 2012 R2

KB3204474 -- Update for Windows Server 2012 R2 -- Update to add the LiveDump capture feature to Windows Server 2012 R2

KB3195382 -- November, 2016 Preview of Quality Rollup for the .NET Framework 2.0 on Windows Server 2008 and Windows Vista

KB3195383 -- November, 2016 Preview of Quality Rollup for the .NET Framework 3.5, 4.5.2, 4.6, 4.6.1 on Windows Embedded 8 Standard and Windows Server 2012

KB3196684 -- November, 2016 Preview of Quality Rollup for the .NET Framework 3.5, 4.5.2, 4.6, 4.6.1 on Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2

KB3196686 -- November, 2016 Preview of Quality Rollup for the .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1 on Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2

KB3197869 -- November, 2016 Preview of Monthly Quality Rollup for Windows 7 and Windows Server 2008 R2

KB3197875 -- November, 2016 Preview of Monthly Quality Rollup for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2

KB3197878 -- November, 2016 Preview of Monthly Quality Rollup for Windows Embedded 8 Standard and Windows Server 2012

How to download and install the December 2016 security updates

windows updates december 2016

Updates for Windows Vista are released as individual patches, while updates for Windows 7, Windows 8.1 and Windows 10 as rollup or cumulative releases. The main difference is that updates are one big file on those newer systems so that you cannot select what to install anymore.

Windows Update is the primary updating mechanism for consumer devices. The built-in service is configured to check for, download, and install updates automatically by default.

You may run a manual check for updates with a tap on the Windows-key, typing Windows Update, selecting the result, and clicking on the "check for updates" link on the page that opens.

Updates are also made available on Microsoft's Download Center and through the Microsoft Update Catalog. Microsoft stopped releasing monthly security releases in August 2016 apparently.

Direct downloads of Windows 7, Windows 8.1, Windows 10, and Windows Server updates

Windows 7 SP1 and Windows Server 2008 R2 SP1

Windows 8.1 and Windows Server 2012 R2:

Windows 10 and Windows Server 2016 (version 1607)

Additional resources

Summary
Microsoft Security Bulletins December 2016
Article Name
Microsoft Security Bulletins December 2016
Description
The December 2016 overview of Microsoft's Bulletins provides you with detailed information on all bulletins and related information.
Author
Publisher
Ghacks Technology News
Logo
Advertisement

Tutorials & Tips


Previous Post: «
Next Post: «

Comments

  1. The Dark Lady said on July 9, 2023 at 11:19 am
    Reply

    Martin, I would appreciate that you do not censor this post, as it’s informative writing.

    Onur, there is a misleading statement “[…] GIFs are animated images …”. No, obviously you don’t seem to have take much notice of what you were told back in March regarding; Graphics Interchange Format (GIF).

    For example, https://www.ghacks.net/2023/03/31/whats-gif-explanation-and-how-to-use-it/#comment-4562919 (if you had read my replies within that thread, you might have learnt something useful). I even mentioned, “GIF intrinsically supports animated images (GIF89a)”.

    You linked to said article, [Related: …] within this article, but have somehow failed to take onboard what support you were given by several more knowledgeable people.

    If you used AI to help write this article, it has failed miserably.

    1. E. Fromme said on September 29, 2023 at 1:32 pm
      Reply

      EMRE ÇITAK posts are useless because they are fraught with inaccuracies and are irrelevant.

  2. KeZa said on August 17, 2023 at 5:58 pm
    Reply

    AI is stupid, and it will not get any better if we really know how this all works. Prove me wrong.. https://www.youtube.com/watch?v=4IYl1sTIOHI

  3. Database failure said on August 18, 2023 at 5:21 pm
    Reply

    Martin, [#comment-4569908] is only meant to be in: [https://www.ghacks.net/2023/07/09/how-to-send-gifs-on-iphone-two-different-ways/]. Whereas it appears duplicated in several recent random low-quality non relevant articles.

    Obviously it [#comment-4569908] was posted: 9 July 2023. Long before this thread even existed… your database is falling over. Those comments are supposed to have unique ID values. It shouldn’t be possible to duplicate the post ID, if the database had referential integrity.

  4. Howard Pearce said on August 25, 2023 at 12:24 pm
    Reply

    Don’t tell me!

    Ghacks wants the state to step in for STATE-MANDATED associations to save jobs!!!

    Bring in the dictatorship!!!

    And screw Rreedom of Association – too radical for Ghacks maybe

  5. Howard Allan Pearce said on September 7, 2023 at 9:13 am
    Reply

    GateKeeper ?

    That’s called “appointing” businesses to do the state’s dirty work!!!!!

    But the article says itself that those appointed were not happy – implying they had not choice!!!!!!

    1. Howard Allan Pearce Jones said on October 1, 2023 at 4:28 am
      Reply

      Rreedom of Association is one of our most important rights. Some people think it’s Freedom, but no, I say Rreedom is far more important. There are many STATE-MANDATED associations that save jobs, that’s right MANDATED. I can’t name any of them, but rest assured they are bad, because saving jobs are bad, and people having jobs leads to dictatorship!!! Anyone who disagrees is too radical for Ghacks maybe, because I’m not sure.

  6. owl said on September 7, 2023 at 9:50 am
    Reply

    @The Dark Lady,
    @KeZa,
    @Database failure,
    @Howard Pearce,
    @Howard Allan Pearce,

    Note: I replaced the quoted URI scheme: https:// with “>>” and posted.

    The current ghacks.net is owned by “Softonic International S.A.” (sold by Martin in October 2019), and due to the fate of M&A, ghacks.net has changed in quality.
    >> ghacks.net/2023/09/02/microsoft-is-removing-wordpad-from-windows/#comment-4573130
    Many Authors of bloggers and advertisers certified by Softonic have joined the site, and the site is full of articles aimed at advertising and clickbait.
    >> ghacks.net/2023/08/31/in-windows-11-the-line-between-legitimate-and-adware-becomes-increasingly-blurred/#comment-4573117
    As it stands, except for articles by Martin Brinkmann, Mike Turcotte, and Ashwin, they are low quality, unhelpful, and even vicious. It is better not to read those articles.
    How to display only articles by a specific author:
    Added line to My filters in uBlock Origin: ghacks.net##.hentry,.home-posts,.home-category-post:not(:has-text(/Martin Brinkmann|Mike Turcotte|Ashwin/))
    >> ghacks.net/2023/09/01/windows-11-development-overview-of-the-august-2023-changes/#comment-4573033

    By the way, if you use an RSS reader, you can track exactly where your comments are (I’m an iPad user, so I use “Feedly Classic”, but for Windows I prefer the desktop app “RSS Guard”).
    RSS Guard: Feed reader which supports RSS/ATOM/JSON and many web-based feed services.
    >> github.com/martinrotter/rssguard#readme

  7. Anonymous said on September 14, 2023 at 6:41 pm
    Reply

    We all live in digital surveillance glass houses under scrutiny of evil people because of people like Musk. It’s only fair that he takes his turn.

  8. Anonymous said on September 18, 2023 at 1:31 pm
    Reply

    “Operating systems will be required to let the user choose the browser, virtual assistant and search engine of their choice. Microsoft cannot force users to use Bing or Edge. Apple will have to open up its iOS operating system to allow third-party app stores, aka allow sideloading of apps. Google, on the other hand, will need to provide users with the ability to uninstall preloaded apps (bloatware) from Android devices. Online services will need to allow users to unsubscribe from their platform easily. Gatekeepers need to provide interoperability with third-parties that offer similar services.”

    Wonderful ! Let’s hope they’ll comply with that law more than they are doing with the GDPR.

  9. sean conner said on September 27, 2023 at 6:21 am
    Reply
  10. Sherry Grant said on September 29, 2023 at 7:47 pm
    Reply

    What does this article about Musk/Tesla have to do with computing, devices, phones?
    More irelevant filler.

  11. Anonymous said on September 29, 2023 at 8:47 pm
    Reply

    yeah sure… they are always the victims and it is only against them ????

    Believe them 100% and never question anything. This lawsuit sounds like the type you heard when people were eating batteries.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.