Microsoft發布了以下9個安全性公告,以應對多個影響個別 Microsoft 產品或元件的漏洞:
MS16-001 Internet Explorer 累積安全性更新
MS16-002 Microsoft Edge 的累積安全性更新
MS16-003 用來解決遠端執行程式碼的 JScript 和 VBScript 累積安全性更新
MS16-004 用來解決遠端執行程式碼的 Microsoft Office 安全性更新
MS16-005 用來解決遠端執行程式碼問題的 Windows 核心模式驅動程式安全性更新
MS16-006 用來解決遠端執行程式碼的 Silverlight 安全性更新
MS16-007 用來解決遠端執行程式碼的 Microsoft Windows 安全性更新
MS16-008 用來解決權限提高的 Windows 核心安全性更新
MS16-010 解決詐騙的 Microsoft Exchange Server 安全性更新
> Microsoft Edge
> Microsoft Exchange Server 2013, 2016
> Microsoft Internet Explorer 7, 8, 9, 10, 11
> Microsoft Office 2007, 2010, 2013, 2013 RT, 2016, Office for Mac 2011, 2016
> Microsoft Office Compatibility Pack Service Pack, Excel, Word Viewer
> Microsoft SharePoint Server 2013, SharePoint Foundation 2013
> Microsoft Silverlight 5, Silverlight 5 Developer Runtime
> Microsoft Visual Basic 6.0 Runtime
> Microsoft Windows Server 2008, 2008 R2, 2012, 2012 R2
> Microsoft Windows Vista, 7, 8, 8.1, RT, RT 8.1, 10
有關受影響產品的完整列表,請參閱Microsoft安全性公告摘要中的「受影響的軟體」部分:
https://technet.microsoft.com/library/security/ms16-jan
成功利用這些漏洞可以詐騙、執行程式碼或提高權限,視乎攻擊者利用哪個漏洞而定。
受影響產品的修補程式可在 Microsoft Update 網站獲取。受影響系統的用戶應遵從產品供應商的建議,立即採取行動以降低風險。
> Microsoft Update
http://update.microsoft.com/microsoftupdate
https://technet.microsoft.com/en-us/library/security/ms16-jan
https://technet.microsoft.com/library/security/MS16-001
https://technet.microsoft.com/library/security/MS16-002
https://technet.microsoft.com/library/security/MS16-003
https://technet.microsoft.com/library/security/MS16-004
https://technet.microsoft.com/library/security/MS16-005
https://technet.microsoft.com/library/security/MS16-006
https://technet.microsoft.com/library/security/MS16-007
https://technet.microsoft.com/library/security/MS16-008
https://technet.microsoft.com/library/security/MS16-010
https://blogs.msdn.microsoft.com/ie/2014/08/07/stay-up-to-date-with-internet-explorer/
https://www.hkcert.org/my_url/zh/alert/16011301 (至16011309)
https://www.us-cert.gov/ncas/current-activity/2016/01/12/Microsoft-Releases-January-2016-Security-Bulletin
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6117
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0002 (至CVE-2016-0003)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0005 (至CVE-2016-0012)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0014 (至CVE-2016-0016)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0018 (至CVE-2016-0020)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0029 (至CVE-2016-0032)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0034 (至CVE-2016-0035)