The six security bulletins released by Microsoft for October 2015 address more than 30 vulnerabilities affecting Windows, Internet Explorer, Edge, and Office.
One of the bulletins rated critical is MS15-106, which resolves a total of 14 vulnerabilities in Internet Explorer. The list of flaws includes memory corruption, privilege escalation, information disclosure, and VBScript and JScript ASLR bypass issues impacting Internet Explorer and the scripting engine.
The most serious of the security holes patched with this bulletin can be exploited by a remote attacker for arbitrary code execution by tricking the targeted user into viewing a specially crafted webpage via Internet Explorer.
Another bulletin that has been rated “critical” is MS15-108, which patches information disclosure, memory corruption, and ASLR bypass vulnerabilities in the VBScript and JScript scripting engines in Windows.
A bulletin that addresses remote code execution flaws in Windows has also been classified as having critical severity. The bugs are caused due to the way Windows Shell and the Microsoft Tablet Input Band handle objects in memory.
The bulletins rated “important” fix weaknesses in Edge, Office, and the Windows kernel. The flaws can be leveraged for information disclosure and remote code execution.
According to Microsoft, there is no evidence that any of these vulnerabilities have been exploited in the wild.
“It’s official, a record has been set for the most bulletins released by Microsoft in a single year. In 2013, we saw 106 bulletins released, this month we hit 111 for 2015 and we still have two Patch Tuesdays left,” said Tyler Reguly, manager of security research at Tripwire.
“This month’s updates are pretty ho-hum, we’ve got a list of entirely typical updates. Given that this month is so light, it’ll be interesting to see what November has in store for us. That said, sys admins shouldn’t take the light month to mean they can sit back and take a break. We still have a number of vulnerabilities that should be patched, so updates should be applied following regular schedules.” Reguly told SecurityWeek.
Microsoft, Google and Mozilla announced in September their intention to kill the RC4 cipher stream in their web browsers at the beginning of 2016. On Tuesday, Microsoft took further steps in this direction by disabling RC4 in the .NET Transport Layer Security (TLS) on Windows 10 systems running .NET 3.5 applications, and systems with .NET Framework 4.6 that are running .NET 4.5, 4.5.1 and 4.5.2 applications.
Adobe also released security updates on Tuesday to patch a total of nearly 70 vulnerabilities affecting Flash Player, Reader and Acrobat. Shortly after the release of the patches, news broke that malicious actors have been exploiting a Flash Player zero-day in their attacks.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
Latest News
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
