{"id":1731,"date":"2016-01-22T02:15:45","date_gmt":"2016-01-22T02:15:45","guid":{"rendered":"http:\/\/www.camcert.gov.kh\/?p=1731"},"modified":"2016-01-22T07:56:23","modified_gmt":"2016-01-22T07:56:23","slug":"camsa16-02-%e1%9e%80%e1%9f%92%e1%9e%9a%e1%9e%bb%e1%9e%98%e1%9e%a0%e1%9f%8a%e1%9e%bb%e1%9e%93%e1%9e%98%e1%9f%89%e1%9f%83%e1%9e%80%e1%9f%92%e1%9e%9a%e1%9e%bc%e1%9e%9f%e1%9e%bc%e1%9e%a0%e1%9f%92","status":"publish","type":"post","link":"https:\/\/www.camcert.gov.kh\/en\/camsa16-02-%e1%9e%80%e1%9f%92%e1%9e%9a%e1%9e%bb%e1%9e%98%e1%9e%a0%e1%9f%8a%e1%9e%bb%e1%9e%93%e1%9e%98%e1%9f%89%e1%9f%83%e1%9e%80%e1%9f%92%e1%9e%9a%e1%9e%bc%e1%9e%9f%e1%9e%bc%e1%9e%a0%e1%9f%92\/","title":{"rendered":"CamSA16-02: Microsoft Security Bulletin Summary for January 2016"},"content":{"rendered":"<p><\/p>\n<ol>\n<li>General Information<\/li>\n<\/ol>\n<p>Microsoft released Security Bulletin January 2016 which includes the 6 most important point (critical) and 3 points (important).<\/p>\n<p>These vulnerabilities could allow a wide-angle attachment the attacker (attacker) can code or create a denial of service or gain access to your files or system.<\/p>\n<ol start=\"2\">\n<li>Affected Software<\/li>\n<\/ol>\n<p>\u2013 Microsoft Windows Operating System and Components<br \/>\n\u2013 Microsoft Office Suites and Software<br \/>\n\u2013 Microsoft Developer Tools and Software<br \/>\n\u2013 Microsoft Server Software<br \/>\n\u2013 Microsoft Visual Basic Software<\/p>\n<ol start=\"3\">\n<li>Executive Summaries<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&#8211; <a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717999\">MS16-001: Cumulative Security Update for Internet Explorer (3124903)<\/a> (Critical \u2013 Remote Code Execution)<\/p>\n<p>&#8211; <a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718002\">MS16-002: Cumulative Security Update for Microsoft Edge (3124904)<\/a> (Critical \u2013 Remote Code Execution)<\/p>\n<p>&#8211; <a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718004\">MS16-003: Cumulative Security Update for JScript and VBScript to Address &#8212;&#8211;Remote Code Execution (3125540)<\/a> (Critical \u2013 Remote Code Execution)<\/p>\n<p>&#8211; <a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717998\">MS16-004: Security Update for Microsoft Office to Address Remote Code Execution (3124585)<\/a> (Critical \u2013 Remote Code Execution)<\/p>\n<p>&#8211; <a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718001\">MS16-005: Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege (3124584)<\/a> (Critical \u2013 Remote Code Execution)<\/p>\n<p>&#8211; <a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717994\">MS16-006: Security Update for Silverlight to Address Remote Code Execution (3126036)<\/a> (Critical \u2013 Remote Code Execution)<\/p>\n<p>&#8211; <a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718006\">MS16-007: Security Update for Microsoft Windows to Address Remote Code Execution (3124901)<\/a>(Important Remote Code Execution)<\/p>\n<p>&#8211; <a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718007\">MS16-008: Security Update for Windows Kernel to Address Elevation of Privilege (3124605)<\/a>(Important Elevation of Privilege)<\/p>\n<p>&#8211; <a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717997\">MS16-010: Security Update in Microsoft Exchange Server to Address Spoofing (3124557)<\/a>(Important Spoofing)<\/p>\n<ol start=\"4\">\n<li>Solutions<\/li>\n<\/ol>\n<p>Microsoft offers an update (update) for all the weak points in the <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms16-jan\" target=\"_blank\">January 2016 monthly security bulletin<\/a> mentioned detail all the issues related to the update. Governor (administrator) need to pay attention to these issues and will be updated as soon as possible.While home users (home users) should use the automatic update<\/p>\n<ol start=\"5\">\n<li>Reference<\/li>\n<\/ol>\n<p>\u2013 <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms16-jan\">https:\/\/technet.microsoft.com\/library\/security\/ms16-jan<\/a><\/p>\n<p><a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms13-jun\">\u2013 http:\/\/technet.microsoft.com\/en-us\/wsus\/default.aspx<\/a><\/p>\n<p><a href=\"https:\/\/www.update.microsoft.com\/\">\u2013 https:\/\/www.update.microsoft.com\/<\/a><\/p>\n<p><a href=\"http:\/\/www.microsoft.com\/security\/updates\/mu.aspx\">\u2013 http:\/\/www.microsoft.com\/security\/updates\/mu.aspx<\/a><\/p>\n<p><a href=\"http:\/\/windows.microsoft.com\/en-us\/windows-vista\/Turn-automatic-updating-on-or-off\">\u2013 http:\/\/windows.microsoft.com\/en-us\/windows-vista\/Turn-automatic-updating-on-or-off<\/a><\/p>\n<ol start=\"6\">\n<li>Contact Information<\/li>\n<\/ol>\n<p>Electronic Email: <a href=\"mailto:office@camcert.gov.kh\">office@camcert.gov.kh<\/a><\/p>\n<p>Phone: (855) 23 722 391<\/p>\n<p>Responsibility:<\/p>\n<p>All information provided here is just a notification without any insurance.<\/p>"},"excerpt":{"rendered":"<p>General Information Microsoft released Security Bulletin January 2016 which includes the 6 most important point (critical) and 3 points (important). These vulnerabilities could allow a wide-angle attachment the attacker (attacker) can code or create a denial of service or gain access to your files or system. Affected Software \u2013 Microsoft Windows Operating System and Components [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[81,9,1],"tags":[89,91],"class_list":["post-1731","post","type-post","status-publish","format-standard","hentry","category-81","category-security-alert","category-uncategorized","tag-89","tag-home"],"_links":{"self":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/comments?post=1731"}],"version-history":[{"count":7,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1731\/revisions"}],"predecessor-version":[{"id":1741,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1731\/revisions\/1741"}],"wp:attachment":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media?parent=1731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/categories?post=1731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/tags?post=1731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}