[prev in list] [next in list] [prev in thread] [next in thread]
List: patchmanagement
Subject: [patchmanagement] Microsoft Security Bulletin Minor Revisions
From: Phantom of the Mobile PhotM <phantom.of.the.mobile () live ! com>
Date: 2016-05-26 16:32:48
Message-ID: BAY175-W17F187FAD49A7EDDDE2BEB9C410 () phx ! gbl
[Download RAW message or body]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
********************************************************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: May 25, 2016
********************************************************************
Summary
=======
The following bulletins and/or bulletin summaries have undergone a
minor revision increment.
Please see the appropriate bulletin for more details.
* MS15-JUL
* MS16-MAY
* MS15-126 - Critical
* MS15-134 - Important
* MS16-003 - Critical
* MS16-054 - Critical
Bulletin Information:
=====================
MS15-JUL
- Title: Microsoft Security Bulletin Summary for July 2015
- https://technet.microsoft.com/library/security/ms15-jul.aspx
- Reason for Revision: V3.1 (May 25, 2016): For MS15-076, added a
Known Issues reference to the Executive Summaries table. For more
information, see Microsoft Knowledge Base Article 3067505. For
information about the solution for this Known Issue, see Microsoft
Knowledge Base Article 3155218.
- Originally posted: July 14, 2015
- Updated: May 25, 2016
- Bulletin Severity Rating: Not applicable
- Version: 3.1
MS16-MAY
- Title: Microsoft Security Bulletin Summary for May 2016
- https://technet.microsoft.com/library/security/ms16-may.aspx
- Reason for Revision: V2.1 (May 25, 2016): For MS16-065, added a
Known Issue to the Executive Summaries table. After you install
any of the security updates that are included in MS16-065 on a
Front End or Standard Edition server for Lync Server 2010, Lync
Server 2013, or Skype for Business Server 2015, several
conferencing modalities no longer function for internal users.
For information about the solution for this Known Issue, see
Microsoft Knowledge Base Article 3165438.
- Originally posted: May 10, 2016
- Updated: May 25, 2016
- Bulletin Severity Rating: Not applicable
- Version: 2.1
MS15-126
- Title: Cumulative Security Update for JScript and VBScript to
Address Remote Code Execution (3116178)
- https://technet.microsoft.com/library/security/ms15-126.aspx
- Reason for Revision: V1.1 (May 25, 2016): Removed redundant
rows from the Vulnerability Severity Rating and Maximum Security
Impact by Affected Software table, and added the applicable
update numbers for clarity. This is an informational change only.
- Originally posted: December 8, 2015
- Updated: May 25, 2016
- Bulletin Severity Rating: Critical
- Version: 1.1
MS15-134
- Title: Security Update for Windows Media Center to Address
Remote Code Execution (3108669)
- https://technet.microsoft.com/library/security/ms15-134.aspx
- Reason for Revision: V1.1 (May 25, 2016): Removed the mitigating
factors for CVE-2015-6131 and CVE-2015-6127. These are
informational changes only.
- Originally posted: December 8, 2015
- Updated: May 25, 2016
- Bulletin Severity Rating: Important
- Version: 1.1
MS16-003
- Title: Cumulative Security Update for JScript and VBScript
to Address Remote Code Execution (3125540)
- https://technet.microsoft.com/library/security/ms16-003.aspx
- Reason for Revision: V1.1 (May 25, 2016): Removed redundant
rows from the Vulnerability Severity Rating and Maximum Security
Impact by Affected Software table, and added the applicable
update numbers for clarity. This is an informational change only.
- Originally posted: January 12, 2016
- Updated: May 25, 2016
- Bulletin Severity Rating: Critical
- Version: 1.1
MS16-054
- Title: Security Update for Microsoft Office (3155544)
- https://technet.microsoft.com/library/security/ms16-054.aspx
- Reason for Revision: V1.1 (May 25, 2016): Corrected the updates
replaced for Microsoft Office 2013 to 3114486 in MS16-004, and
for CVE-2016-0183, clarified that the Preview Pane is an attack
vector for this vulnerability. These are informational changes
only.
- Originally posted: May 10, 2016
- Updated: May 25, 2016
- Bulletin Severity Rating: Critical
- Version: 1.1
Other Information
=================
Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.
The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, PGP is not required for
reading security notifications, reading security bulletins, or
installing security updates. You can obtain the MSRC public PGP key
at <https://technet.microsoft.com/security/dn753714>.
********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************
Microsoft respects your privacy. Please read our online Privacy
Statement at <http://go.microsoft.com/fwlink/?LinkId=81184>.
If you would prefer not to receive future technical security
notification alerts by email from Microsoft and its family of
companies please visit the following website to unsubscribe:
<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar
d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.
These settings will not affect any newsletters you’ve requested or
any mandatory service communications that are considered part of
certain Microsoft services.
For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.
This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8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=nieu
-----END PGP SIGNATURE-----
---
PatchManagement.org is hosted by Shavlik
The content on the email list is intended for assisting administrators. If you would \
like to use any of this content in a blog or media publication, please contact the \
owners of the list for approval.
To unsubscribe send a blank email to leave-patchmanagement@patchmanagement.org
If you are unable to unsubscribe via this email address, please email
owner-patchmanagement@patchmanagement.org
[Attachment #3 (text/html)]
<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 12pt;
font-family:Calibri
}
--></style></head>
<body class='hmmessage'><div dir='ltr'><div><div dir="ltr"><div \
class="ecxgmail_quote">-----BEGIN PGP SIGNED MESSAGE-----<br>
Hash: SHA256<br>
<br>
********************************************************************<br>
Title: Microsoft Security Bulletin Minor Revisions<br>
Issued: May 25, 2016<br>
********************************************************************<br>
<br>
Summary<br>
=======<br>
The following bulletins and/or bulletin summaries have undergone a<br>
minor revision increment.<br>
<br>
Please see the appropriate bulletin for more details.<br>
<br>
* MS15-JUL<br>
* MS16-MAY<br>
* MS15-126 - Critical<br>
* MS15-134 - Important<br>
* MS16-003 - Critical<br>
* MS16-054 - Critical<br>
<br>
Bulletin Information:<br>
=====================<br>
<br>
MS15-JUL<br>
<br>
- Title: Microsoft Security Bulletin Summary for July 2015<br>
- <a href="https://technet.microsoft.com/library/security/ms15-jul.aspx" \
rel="noreferrer" target="_blank">https://technet.microsoft.com/library/security/ms15-jul.aspx</a><br>
- Reason for Revision: V3.1 (May 25, 2016): For MS15-076, added a<br>
Known Issues reference to the Executive Summaries table. For more<br>
information, see Microsoft Knowledge Base Article 3067505. For<br>
information about the solution for this Known Issue, see Microsoft<br>
Knowledge Base Article 3155218.<br>
- Originally posted: July 14, 2015<br>
- Updated: May 25, 2016<br>
- Bulletin Severity Rating: Not applicable<br>
- Version: 3.1<br>
<br>
MS16-MAY<br>
<br>
- Title: Microsoft Security Bulletin Summary for May 2016<br>
- <a href="https://technet.microsoft.com/library/security/ms16-may.aspx" \
rel="noreferrer" target="_blank">https://technet.microsoft.com/library/security/ms16-may.aspx</a><br>
- Reason for Revision: V2.1 (May 25, 2016): For MS16-065, added a<br>
Known Issue to the Executive Summaries table. After you install<br>
any of the security updates that are included in MS16-065 on a<br>
Front End or Standard Edition server for Lync Server 2010, Lync<br>
Server 2013, or Skype for Business Server 2015, several<br>
conferencing modalities no longer function for internal users.<br>
For information about the solution for this Known Issue, see<br>
Microsoft Knowledge Base Article 3165438.<br>
- Originally posted: May 10, 2016<br>
- Updated: May 25, 2016<br>
- Bulletin Severity Rating: Not applicable<br>
- Version: 2.1<br>
<br>
MS15-126<br>
<br>
- Title: Cumulative Security Update for JScript and VBScript to<br>
Address Remote Code Execution (3116178)<br>
- <a href="https://technet.microsoft.com/library/security/ms15-126.aspx" \
rel="noreferrer" target="_blank">https://technet.microsoft.com/library/security/ms15-126.aspx</a><br>
- Reason for Revision: V1.1 (May 25, 2016): Removed redundant<br>
rows from the Vulnerability Severity Rating and Maximum Security<br>
Impact by Affected Software table, and added the applicable<br>
update numbers for clarity. This is an informational change only.<br>
- Originally posted: December 8, 2015<br>
- Updated: May 25, 2016<br>
- Bulletin Severity Rating: Critical<br>
- Version: 1.1<br>
<br>
MS15-134<br>
<br>
- Title: Security Update for Windows Media Center to Address<br>
Remote Code Execution (3108669)<br>
- <a href="https://technet.microsoft.com/library/security/ms15-134.aspx" \
rel="noreferrer" target="_blank">https://technet.microsoft.com/library/security/ms15-134.aspx</a><br>
- Reason for Revision: V1.1 (May 25, 2016): Removed the mitigating<br>
factors for CVE-2015-6131 and CVE-2015-6127. These are<br>
informational changes only.<br>
- Originally posted: December 8, 2015<br>
- Updated: May 25, 2016<br>
- Bulletin Severity Rating: Important<br>
- Version: 1.1<br>
<br>
MS16-003<br>
<br>
- Title: Cumulative Security Update for JScript and VBScript<br>
to Address Remote Code Execution (3125540)<br>
- <a href="https://technet.microsoft.com/library/security/ms16-003.aspx" \
rel="noreferrer" target="_blank">https://technet.microsoft.com/library/security/ms16-003.aspx</a><br>
- Reason for Revision: V1.1 (May 25, 2016): Removed redundant<br>
rows from the Vulnerability Severity Rating and Maximum Security<br>
Impact by Affected Software table, and added the applicable<br>
update numbers for clarity. This is an informational change only.<br>
- Originally posted: January 12, 2016<br>
- Updated: May 25, 2016<br>
- Bulletin Severity Rating: Critical<br>
- Version: 1.1<br>
<br>
MS16-054<br>
<br>
- Title: Security Update for Microsoft Office (3155544)<br>
- <a href="https://technet.microsoft.com/library/security/ms16-054.aspx" \
rel="noreferrer" target="_blank">https://technet.microsoft.com/library/security/ms16-054.aspx</a><br>
- Reason for Revision: V1.1 (May 25, 2016): Corrected the updates<br>
replaced for Microsoft Office 2013 to 3114486 in MS16-004, and<br>
for CVE-2016-0183, clarified that the Preview Pane is an attack<br>
vector for this vulnerability. These are informational changes<br>
only.<br>
- Originally posted: May 10, 2016<br>
- Updated: May 25, 2016<br>
- Bulletin Severity Rating: Critical<br>
- Version: 1.1<br>
<br>
<br>
Other Information<br>
=================<br>
<br>
Recognize and avoid fraudulent email to Microsoft customers:<br>
=============================================================<br>
If you receive an email message that claims to be distributing<br>
a Microsoft security update, it is a hoax that may contain<br>
malware or pointers to malicious websites. Microsoft does<br>
not distribute security updates via email.<br>
<br>
The Microsoft Security Response Center (MSRC) uses PGP to digitally<br>
sign all security notifications. However, PGP is not required for<br>
reading security notifications, reading security bulletins, or<br>
installing security updates. You can obtain the MSRC public PGP key<br>
at <<a href="https://technet.microsoft.com/security/dn753714" rel="noreferrer" \
target="_blank">https://technet.microsoft.com/security/dn753714</a>>.<br> <br>
********************************************************************<br>
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS<br>
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT<br>
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING<br>
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR<br>
PURPOSE.<br>
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE<br>
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,<br>
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL<br>
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN<br>
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.<br>
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY<br>
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING<br>
LIMITATION MAY NOT APPLY.<br>
********************************************************************<br>
<br>
Microsoft respects your privacy. Please read our online Privacy<br>
Statement at <<a href="http://go.microsoft.com/fwlink/?LinkId=81184" \
rel="noreferrer" target="_blank">http://go.microsoft.com/fwlink/?LinkId=81184</a>>.<br>
<br>
If you would prefer not to receive future technical security<br>
notification alerts by email from Microsoft and its family of<br>
companies please visit the following website to unsubscribe:<br>
<<a href="https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizard.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033" \
rel="noreferrer" target="_blank">https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar<br>
d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033</a>>.<br>
<br>
These settings will not affect any newsletters you’ve requested or<br>
any mandatory service communications that are considered part of<br>
certain Microsoft services.<br>
<br>
For legal Information, see:<br>
<<a href="http://www.microsoft.com/info/legalinfo/default.mspx" rel="noreferrer" \
target="_blank">http://www.microsoft.com/info/legalinfo/default.mspx</a>>.<br> \
<br> This newsletter was sent by:<br>
Microsoft Corporation<br>
1 Microsoft Way<br>
Redmond, Washington, USA<br>
98052<br>
<br>
-----BEGIN PGP SIGNATURE-----<br>
Version: PGP Desktop 10.2.0 (Build 1950)<br>
Charset: utf-8<br>
<br>
wsFVAwUBV0YmHvMcys+fLOcHAQiILg/8C8ytYprX7dHBkt8mN69r/aH1IkHjGtn9<br>
xCusnitV//hXpd7U6rC8rzvU6jTjOW71BPfOmh/ieWugs4m80a9ynyedAbmOE+KS<br>
0yFA+aeqkkpyug4fZIlmjMaQgC2ein39USukBCbj6ZbXrxRknFVmMJMxziMsv1lK<br>
4AlgtkjL7MG2PHxKx3QiWzePps1+xMu8TM1NFoglqoT08WIp3zwqpsje+bhDUhR6<br>
EcLBWsTYtjEFZObchzH4DY+uzy53X9QtqkSvObAKM1XUecfuMxC6daPgE6fyQw6g<br>
TwajsaBcymU9lSffWwt5buKOSNcyOc6M0Ne5xApZXJReuhbyP70Ed5YbTbjJ3cnv<br>
tI++8lkw/15iW/5nCdZEDFw3/q+hiOdS2IxIwqZydwNlpntE9+XimHOVHhb7b4ZP<br>
X8dUSGNcl9jV3yfvDGdD9vDubLGTCeQRMMRCLP7+S+g8YMCkbXGnfZVRjpUYfTZy<br>
XIRU+/RmSRQ9Dp++c7pSHzhtmwlnJHUNZCST92pbSQMHqYwnlhVW80itQ+Bs+9Em<br>
LV9H4X+N7tyLa44/+i+NmCypKjzyforlXxlEGNDHyf3girDg6c1Sp8fTs7J6a4o4<br>
IDnEzU3S6jV8+NGNuUDsZrTNAY7sv+Cpn8urOzWnNhbsuLisb99aDK6LLRjCVIQb<br>
wI/WJQ/o0Ng=<br>
=nieu<br>
-----END PGP SIGNATURE-----<br>
<br>
</div><br></div></div> </div></body>
</html>
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic