Microsoft pushes KB3081455 cumulative update for Win10

  

Computer store news: After a few days of pause, Microsoft today pushed a new cumulative update patch KB3081455 to Win10 official version 10240. This update includes 7 new security bug fixes and functional improvements that are only available for Build 10240 official users, and Windows 10 Preview users will not receive this update.


KB3081455 Update:

There are security issues in Microsoft software products that may affect your system. You can protect your system from infringement by installing this Microsoft update. For a complete list of the issues included in this update, see the related Microsoft Knowledge Base article. After installing this update, you may need to restart your system.

KB890830 Update (Windows Malicious Software Removal Tool):

After downloading, this tool will run once to check if your computer has been targeted to certain popular malware (including Blaster, Sasser And Mydoom) is infected and helps you to remove any infected files found. If an infected file is found, the tool will display a status report the next time you start your computer. A new version of the tool will be available every month. If you want to manually run the tool on your computer, you can download a copy from the Microsoft Download Center or run the online version from microsoft.com. This tool is not a replacement for antivirus products. To protect your computer, you should also use an antivirus product.

The 7 security fixes involved in this update are:

• Cumulative Security Update for Internet Explorer (3089548)

This security update resolves vulnerabilities in Internet Explorer . The most serious of the vulnerabilities could allow remote code execution when a user views a specially crafted web page using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers with accounts configured to have fewer system user rights are less affected than customers with administrative user rights.

• Cumulative Security Update for Microsoft Edge (3089665)

This security update resolves vulnerabilities in Microsoft Edge. The most serious of the vulnerabilities could allow remote code execution when a user views a specially crafted web page using Microsoft Edge. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers with accounts configured to have fewer system user rights are less affected than customers with administrative user rights.

• Vulnerabilities in Microsoft Graphics Components Could Allow Remote Code Execution (3089656)

This security update resolves vulnerabilities in Microsoft Windows, Microsoft Office, and Microsoft Lync. The most severe of these vulnerabilities could allow remote code execution if a user opens a specially crafted document or accesses an untrusted web page with embedded OpenType fonts.

• Vulnerabilities in Windows Journal Could Allow Remote Code Execution (3089669)

This security update resolves vulnerabilities in Microsoft Windows. A more serious vulnerability could allow remote code execution if a user opens a specially crafted Excel file. Users who are configured to have fewer system user rights are less affected than users with administrative user rights.

• Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (3089662)

This security update resolves vulnerabilities in the Microsoft .NET Framework. The most severe of the vulnerabilities could allow elevation of privilege if the user is running a specially crafted .NET application. However, in all cases, an attacker cannot force a user to run an application, and an attacker must convince the user to perform such an action.

• Vulnerability in Windows Task Management Could Allow Elevation of Privilege (3089657)

This security update resolves vulnerabilities in Microsoft Windows. These vulnerabilities allow elevated privileges when an attacker logs into the system and runs a specially crafted application.

• Vulnerabilities in Windows Hyper-V Could Allow Security Feature Bypass (3091287)

This security update resolves vulnerabilities in Microsoft Windows. The vulnerability could allow security features to be bypassed if an attacker runs an application that is specifically designed to cause Windows Hyper-V to fail to properly apply access control lists (ACLs) to configuration settings. Customers who have not enabled the Hyper-V role will not be affected.

Previously, Microsoft had indicated that they did not have a plan to release an update log for Windows 10 updates, unless the update contained important new features. This is also reflected in this cumulative update. In addition, Windows 8/8.1 and Windows 10 users can now download the September version of the Microsoft Malicious Software Removal Tool.

Copyright © Windows knowledge All Rights Reserved