For March 2016 Patch Tuesday, Microsoft released 13 security bulletins, rated five as critical even though eight resolve remote code execution vulnerabilities. For March 2016 Patch Tuesday, Microsoft released 13 security bulletins and rated five of those as critical.Critical patches for RCE flawsMS16-023 is the cumulative patch for IE to stop remote code execution flaws and correct 13 memory corruption vulnerabilities that have not been publicly disclosed.MS16-024 is the monthly fix for Microsoft Edge; it patches 10 memory corruption flaws that could lead to remote code execution and one information disclosure bug – none of which have been publicly disclosed. MS16-026 resolves two OpenType Font Parsing vulnerabilities that could allow remote code execution if not deployed.MS16-027 addresses two Windows Media Parsing RCE bugs. Qualys CTO Wolfgang Kandek ranks this one in importance to patch after MS16-029 – the Microsoft-rated “important” fix for Office. MS16-028 fixes two holes in Windows PDF Library that could lead to RCE if a user opens a maliciously crafted PDF file.Important for RCEMS16-025, as you might have noticed, is out of numerical order. It’s stuck in the middle of other critical updates and is also to patch a remote code execution flaw, but Microsoft in all its wisdom rates it only as important. If left unpatched, an attacker could exploit the way “Windows fails to properly validate input before loading certain libraries.”MS16-029 may only be rated as important but it addresses multiple problems, including RCE, in Microsoft Office. There are two Office memory corruption vulnerabilities and one security feature bypass bug; the fixes correct how Office handles objects in memory and provides a validly signed library. If you have Office, disregard the lower ranking of important and jump on this one.MS16-030 follows the trend above as rating RCE vulnerabilities as “important.” There are two Windows OLE memory RCE flaws listed that an attacker could exploit if Windows OLE fails to properly validate user input. User input, enough said, meaning unless you have 100% faith in end users then get this one done.Important for EoP MS16-031 finally steps out of the RCE vulnerability box by being the fix for elevation of privilege as “Windows fails to properly sanitize handles in memory.”MS16-032 resolves a vulnerability in Windows that could allow EoP “if the Windows Secondary Logon Service fails to properly manage request handles in memory.”MS16-033 addresses a hole in Windows that an attacker could exploit for EoP if the attacker had physical access to the machine and inserted a maliciously crafted USB. Microsoft said, “This security update resolves an elevation of privilege vulnerability in Microsoft Windows when the Windows USB Mass Storage Class driver fails to properly validate objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.”MS16-034 is the security fix for Windows kernel-mode drivers; there are four Win32k EoP vulnerabilities. Important for security feature bypassMS16-035 addresses a security feature bypass bug in .NET Framework as a component “does not properly validate certain elements of a signed XML document.” Microsoft explained, “An attacker who successfully exploited the vulnerability could modify the contents of an XML file without invalidating the signature associated with the file. If a .NET application relies on the signature to be non-malicious, the behavior of the application could become unpredictable.”As always, happy patching! Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe