{"id":1819,"date":"2016-02-11T02:36:42","date_gmt":"2016-02-11T02:36:42","guid":{"rendered":"http:\/\/www.camcert.gov.kh\/?p=1819"},"modified":"2016-02-15T07:05:23","modified_gmt":"2016-02-15T07:05:23","slug":"khmer-camsa16-03-%e1%9e%80%e1%9f%92%e1%9e%9a%e1%9e%bb%e1%9e%98%e1%9e%a0%e1%9f%8a%e1%9e%bb%e1%9e%93%e1%9e%98%e1%9f%89%e1%9f%83%e1%9e%80%e1%9f%92%e1%9e%9a%e1%9e%bc%e1%9e%9f%e1%9e%bc%e1%9e%a0%e1%9f%92","status":"publish","type":"post","link":"https:\/\/www.camcert.gov.kh\/en\/khmer-camsa16-03-%e1%9e%80%e1%9f%92%e1%9e%9a%e1%9e%bb%e1%9e%98%e1%9e%a0%e1%9f%8a%e1%9e%bb%e1%9e%93%e1%9e%98%e1%9f%89%e1%9f%83%e1%9e%80%e1%9f%92%e1%9e%9a%e1%9e%bc%e1%9e%9f%e1%9e%bc%e1%9e%a0%e1%9f%92\/","title":{"rendered":"CamSA16-03: Microsoft Security Bulletin Summary for February 2016"},"content":{"rendered":"<p>1 .General Information<\/p>\n<p>Microsoft released Security Bulletin February 2016 which includes the 6 most important point (critical) and 7 points (important).<\/p>\n<p>These vulnerabilities could allow a wide-angle attachment the attacker (attacker) can code or create a denial of service or gain access to your files or system.<\/p>\n<p>2 .Affected Software<\/p>\n<p>\u2013 Microsoft Windows Operating System and Components<br \/>\n\u2013 Microsoft Office Suites and Software<br \/>\n\u2013 Microsoft Office Services and Web Apps<\/p>\n<p>\u2013 Microsoft Server Software<\/p>\n<p>3.\u00a0Executive Summaries<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717999\">MS16-009: Cumulative Security Update for Internet Explorer (3134220)\u00a0<\/a>(Critical \u2013 Remote Code Execution)<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718002\">MS16-011: Cumulative Security Update for Microsoft Edge (3134225)\u00a0<\/a>\u00a0(Critical \u2013 Remote Code Execution)<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718004\">MS16-012: Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3138938)\u00a0<\/a>\u00a0(Critical \u2013 Remote Code Execution)<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717998\">MS16-013: Security Update for Windows Journal to Address Remote Code Execution (3134811)\u00a0<\/a>\u00a0(Critical \u2013 Remote Code Execution)<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718001\">MS16-014: Security Update for Microsoft Windows to Address Remote Code Execution (3134228)<\/a>\u00a0(Important \u2013 Remote Code Execution)<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717994\">MS16-015: Security Update for Microsoft Office to Address Remote Code Execution (3134226)\u00a0<\/a>\u00a0(Critical \u2013 Remote Code Execution)<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718006\">MS16-016: Security Update for WebDAV to Address Elevation of Privilege (3136041)\u00a0<\/a>(Important Elevation of Privilege)<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=718007\">MS16-017: Security Update for Remote Desktop Display Driver to Address Elevation of Privilege (3134700)\u00a0<\/a>(Important Elevation of Privilege)<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717997\">MS16-018: Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege (3136082)\u00a0<\/a>(Important Elevation of Privilege)<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717997\">MS16-019: Security Update for .NET Framework to Address Denial of Service (3137893)\u00a0<\/a>(Important Denial of Service)<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717997\">MS16-020: Security Update for Active Directory Federation Services to Address Denial of Service (3134222)\u00a0<\/a>(Important Denial of Service)<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717997\">MS16-021: Security Update for NPS RADIUS Server to Address Denial of Service\u00a0(3133043)\u00a0<\/a>(Important Denial of Service)<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?linkid=717997\">MS16-022: Security Update for Adobe Flash Player (3135782)\u00a0<\/a>(Important Remote Code Execution)<\/p>\n<p>4 .Solutions<\/p>\n<p>Microsoft offers an update (update) for all the weak points in the\u00a0<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms16-feb\" target=\"_blank\"> February 2016 monthly security bulletin<\/a>\u00a0mentioned detail all the issues related to the update. Governor (administrator) need to pay attention to these issues and will be updated as soon as possible. While home users (home users) should use the automatic update.<\/p>\n<p>5 .Reference<\/p>\n<p>&#8211;\u00a0<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms16-feb\" target=\"_blank\">https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms16-feb<\/a><\/p>\n<p>&#8211;<a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms13-jun\">\u00a0http:\/\/technet.microsoft.com\/en-us\/wsus\/default.aspx<\/a><\/p>\n<p>&#8211;<a href=\"https:\/\/www.update.microsoft.com\/\">\u00a0https:\/\/www.update.microsoft.com\/<\/a><\/p>\n<p>&#8211;<a href=\"http:\/\/www.microsoft.com\/security\/updates\/mu.aspx\">http:\/\/www.microsoft.com\/security\/updates\/mu.aspx<\/a><\/p>\n<p>&#8211;<a href=\"http:\/\/windows.microsoft.com\/en-us\/windows-vista\/Turn-automatic-updating-on-or-off\">http:\/\/windows.microsoft.com\/en-us\/windows-vista\/Turn-automatic-updating-on-or-off<\/a><\/p>\n<p>6 .Contact Information<\/p>\n<p>Electronic Email:\u00a0<a href=\"mailto:office@camcert.gov.kh\">office@camcert.gov.kh<\/a><\/p>\n<p>Phone: (855) 23 722 391<\/p>\n<p>Responsibility:<\/p>\n<p>All information provided here is just a notification without any insurance.<\/p>"},"excerpt":{"rendered":"<p>1 .General Information Microsoft released Security Bulletin February 2016 which includes the 6 most important point (critical) and 7 points (important). These vulnerabilities could allow a wide-angle attachment the attacker (attacker) can code or create a denial of service or gain access to your files or system. 2 .Affected Software \u2013 Microsoft Windows Operating System [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[81,9],"tags":[],"class_list":["post-1819","post","type-post","status-publish","format-standard","hentry","category-81","category-security-alert"],"_links":{"self":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1819","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/comments?post=1819"}],"version-history":[{"count":3,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1819\/revisions"}],"predecessor-version":[{"id":1826,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/posts\/1819\/revisions\/1826"}],"wp:attachment":[{"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/media?parent=1819"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/categories?post=1819"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.camcert.gov.kh\/en\/wp-json\/wp\/v2\/tags?post=1819"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}