For information regarding the likelihood, within 30 days of this security bulletin’s release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the May bulletin summary. The severity ratings indicated for each affected software assume the potential maximum impact of the vulnerability.
To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle. Versions or editions that are not listed are either past their support life cycle or are not affected. The following software versions or editions are affected. Affected Software and Vulnerability Severity Ratings For more information about the vulnerability, see the Vulnerability Information section.įor more information about this update, see Microsoft Knowledge Base Article 3156761.
The update addresses the vulnerability by modifying how Windows Journal parses Journal files. For more information, see the Affected Software section. This security update is rated Critical for all supported editions of Windows Vista, Windows 7, Windows 8.1, Windows RT 8.1, and Windows 10.
Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. This security update resolves a vulnerability in Microsoft Windows. In this article Security Update for Windows Journal (3156761)
Microsoft Security Bulletin MS16-056 - Critical