Operating System:

[Win]

Published:

13 July 2016

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.1723
      MS16-094 - Important: Security Update for Secure Boot (3177404)
                               13 July 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Microsoft Windows
Publisher:         Microsoft
Operating System:  Windows 8.1
                   Windows Server 2012
                   Windows Server 2012 R2
                   Windows RT 8.1
                   Windows 10
Impact/Access:     Unauthorised Access -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-3287  

Original Bulletin: 
   https://technet.microsoft.com/en-us/library/security/MS16-094

- --------------------------BEGIN INCLUDED TEXT--------------------

Microsoft Security Bulletin MS16-094 - Important

Security Update for Secure Boot (3177404)

Published: July 12, 2016

Version: 1.0

Executive Summary

This security update resolves a vulnerability in Microsoft Windows. The 
vulnerability could allow Secure Boot security features to be bypassed if an 
attacker installs an affected policy on a target device. An attacker must have
either administrative privileges or physical access to install a policy and 
bypass Secure Boot.

This security update is rated Important for all supported editions of Windows
8.1, Windows RT 8.1, Windows Server 2012, Windows Server 2012 R2, and Windows
10.

Affected Software

Windows 8.1

Windows Server 2012

Windows Server 2012 R2

Windows RT 8.1

Windows 10

Windows Server 2012 (Server Core installation)

Windows Server 2012 R2 (Server Core installation)

Vulnerability Information 

Secure Boot Security Feature Bypass Vulnerability CVE-2016-3287

A security feature bypass vulnerability exists when Windows Secure Boot 
improperly applies an affected policy. An attacker who successfully exploited
this vulnerability could disable code integrity checks, allowing test-signed 
executables and drivers to be loaded on a target device. In addition, an 
attacker could bypass the Secure Boot Integrity Validation for BitLocker and 
the Device Encryption security features.

To exploit the vulnerability, an attacker must either gain administrative 
privileges or physical access to a target device to install an affected 
policy. The security update addresses the vulnerability by blacklisting 
affected policies.

The following table contains links to the standard entry for each 
vulnerability in the Common Vulnerabilities and Exposures list:

Vulnerability title 					CVE number	Publicly disclosed	Exploited

Secure Boot Security Feature Bypass Vulnerability	CVE-2016-3287	Yes			No

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBV4WXBIx+lLeg9Ub1AQigihAAkfrzXqesehtfiMU16Oza/+FecWnGdfiP
6EIdiJH88ULcY7dbmMSUvAB7KKTWrbRpCGTt5o6+WUjedo4aGT0h7JGGbxI7eNQl
tD+zleOQQfk8lrOCMDXrCe/Vd5miPuy97vmprELiKWRwycJfFtbR1JFlkQGgbKo9
VXPKZbNqTLx6cTXWRrskUftGUar15RUlwPu4E0LLn2CBDybf8iu7nz4xhrod+4Hp
h1G0e2m3dhjC5oliKMDbcb3uca4omKxLVaMjX6riJNIBhCf7wgveOeFcMOUtNy6F
UPc8uNWaRQ3gJ+tDMPLK2XrVuLiT3xq8ZtMpI9aGHqZllEkMYiu7deuE4qVz05Jh
0Li0BmSjkAWakxRDy0RYftJ6iHP8xdFEWZGdfjjZ5y8EyHoZEhw+FUqN5XnUkVZ0
HCGgg49igjgXGGKyVtowJ3KiucIwDwB0loUAOhfyjqVKcTlEDZ5c3l7ZJMGjgkVF
5LOg1UzoG+eqMrA8eVBZ8UX5P2Z85hNoOoeF72zcEU5ad7NGD//V1sxJitv3mwwi
aei4EAv3qcHGtZAG5Re5lsJ5IClpq27nw7lf4yKd3t5mjzP9UHbQ54lDxR58Ui2O
hTPAPz+cQeTYKSUz76B84B6FZFtK/CSMJg1KyYZyElEggy3rm9tfXwCeZP2nTd4k
a2bBJf2CM9I=
=hCHa
-----END PGP SIGNATURE-----