-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2017.0197
                  Microsoft Security Updates for Windows
                             15 November 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Microsoft Windows
Operating System:     Windows
Impact/Access:        Administrator Compromise       -- Existing Account            
                      Access Privileged Data         -- Existing Account            
                      Denial of Service              -- Remote/Unauthenticated      
                      Provide Misleading Information -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2017-11880 CVE-2017-11853 CVE-2017-11852
                      CVE-2017-11851 CVE-2017-11850 CVE-2017-11849
                      CVE-2017-11847 CVE-2017-11842 CVE-2017-11835
                      CVE-2017-11832 CVE-2017-11831 CVE-2017-11830
                      CVE-2017-11788 CVE-2017-11768 
Member content until: Friday, December 15 2017
Reference:            https://portal.msrc.microsoft.com/en-us/security-guidance

OVERVIEW

        Microsoft has released its monthly security patch update for the month of
        November 2017. [1]
        
        This update resolves 14 vulnerabilities across the following products: 
        
         Windows 10 Version 1511 for 32-bit Systems
         Windows 10 Version 1511 for x64-based Systems
         Windows 10 Version 1607 for 32-bit Systems
         Windows 10 Version 1607 for x64-based Systems
         Windows 10 Version 1703 for 32-bit Systems
         Windows 10 Version 1703 for x64-based Systems
         Windows 10 Version 1709 for 32-bit Systems
         Windows 10 Version 1709 for 64-based Systems
         Windows 10 for 32-bit Systems
         Windows 10 for x64-based Systems
         Windows 7 for 32-bit Systems Service Pack 1
         Windows 7 for x64-based Systems Service Pack 1
         Windows 8.1 for 32-bit systems
         Windows 8.1 for x64-based systems
         Windows RT 8.1
         Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
         Windows Server 2008 R2 for x64-based Systems Service Pack 1
         Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
         Windows Server 2008 for 32-bit Systems Service Pack 2
         Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
         Windows Server 2008 for Itanium-Based Systems Service Pack 2
         Windows Server 2008 for x64-based Systems Service Pack 2
         Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
         Windows Server 2012
         Windows Server 2012 (Server Core installation)
         Windows Server 2012 R2
         Windows Server 2012 R2 (Server Core installation)
         Windows Server 2016
         Windows Server 2016  (Server Core installation)


IMPACT

        Microsoft has given the following details regarding these vulnerabilities.
        
         Details         Impact                   Severity
         CVE-2017-11768  Information Disclosure   Important
         CVE-2017-11788  Denial of Service        Important
         CVE-2017-11830  Security Feature Bypass  Important
         CVE-2017-11831  Information Disclosure   Important
         CVE-2017-11832  Information Disclosure   Important
         CVE-2017-11835  Information Disclosure   Important
         CVE-2017-11842  Information Disclosure   Important
         CVE-2017-11847  Elevation of Privilege   Important
         CVE-2017-11849  Information Disclosure   Important
         CVE-2017-11850  Information Disclosure   Important
         CVE-2017-11851  Information Disclosure   Important
         CVE-2017-11852  Information Disclosure   Important
         CVE-2017-11853  Information Disclosure   Important
         CVE-2017-11880  Information Disclosure   Important


MITIGATION

        Microsoft recommends updating the software with the version
        made available on the Microsoft Update Cataloge for the following
        Knowledge Base articles. [1]
        
        
         KB4046184, KB4048968, KB4049164, KB4048960, KB4048961
         KB4048962, KB4048970, KB4048955, KB4048954, KB4048957
         KB4048956, KB4048953, KB4048952, KB4047211, KB4048959
         KB4048958


REFERENCES

        [1] Security Guidance
            https://portal.msrc.microsoft.com/en-us/security-guidance

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=/6bt
-----END PGP SIGNATURE-----