[prev in list] [next in list] [prev in thread] [next in thread] 

List:       patchmanagement
Subject:    [patchmanagement] Microsoft Security Bulletin Minor Revisions
From:       Phantom of the Mobile PhotM <phantom.of.the.mobile () live ! com>
Date:       2016-05-26 16:32:48
Message-ID: BAY175-W17F187FAD49A7EDDDE2BEB9C410 () phx ! gbl
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256



********************************************************************

Title: Microsoft Security Bulletin Minor Revisions

Issued: May 25, 2016

********************************************************************



Summary

=======

The following bulletins and/or bulletin summaries have undergone a

minor revision increment.



Please see the appropriate bulletin for more details.



   * MS15-JUL

   * MS16-MAY

   * MS15-126 - Critical

   * MS15-134 - Important

   * MS16-003 - Critical

   * MS16-054 - Critical



Bulletin Information:

=====================



MS15-JUL



 - Title: Microsoft Security Bulletin Summary for July 2015

 - https://technet.microsoft.com/library/security/ms15-jul.aspx

 - Reason for Revision: V3.1 (May 25, 2016): For MS15-076, added a

   Known Issues reference to the Executive Summaries table. For more

   information, see Microsoft Knowledge Base Article 3067505. For

   information about the solution for this Known Issue, see Microsoft

   Knowledge Base Article 3155218.

 - Originally posted: July 14, 2015

 - Updated: May 25, 2016

 - Bulletin Severity Rating: Not applicable

 - Version: 3.1



MS16-MAY



 - Title: Microsoft Security Bulletin Summary for May 2016

 - https://technet.microsoft.com/library/security/ms16-may.aspx

 - Reason for Revision: V2.1 (May 25, 2016): For MS16-065, added a

   Known Issue to the Executive Summaries table. After you install

   any of the security updates that are included in MS16-065 on a

   Front End or Standard Edition server for Lync Server 2010, Lync

   Server 2013, or Skype for Business Server 2015, several

   conferencing modalities no longer function for internal users.

   For information about the solution for this Known Issue, see

   Microsoft Knowledge Base Article 3165438.

 - Originally posted: May 10, 2016

 - Updated: May 25, 2016

 - Bulletin Severity Rating: Not applicable

 - Version: 2.1



MS15-126



 - Title: Cumulative Security Update for JScript and VBScript to

   Address Remote Code Execution (3116178)

 - https://technet.microsoft.com/library/security/ms15-126.aspx

 - Reason for Revision: V1.1 (May 25, 2016): Removed redundant

   rows from the Vulnerability Severity Rating and Maximum Security

   Impact by Affected Software table, and added the applicable

   update numbers for clarity. This is an informational change only.

 - Originally posted: December 8, 2015

 - Updated: May 25, 2016

 - Bulletin Severity Rating: Critical

 - Version: 1.1



MS15-134



 - Title: Security Update for Windows Media Center to Address

   Remote Code Execution (3108669)

 - https://technet.microsoft.com/library/security/ms15-134.aspx

 - Reason for Revision: V1.1 (May 25, 2016): Removed the mitigating

   factors for CVE-2015-6131 and CVE-2015-6127. These are

   informational changes only.

 - Originally posted: December 8, 2015

 - Updated: May 25, 2016

 - Bulletin Severity Rating: Important

 - Version: 1.1



MS16-003



 - Title: Cumulative Security Update for JScript and VBScript

   to Address Remote Code Execution (3125540)

 - https://technet.microsoft.com/library/security/ms16-003.aspx

 - Reason for Revision: V1.1 (May 25, 2016): Removed redundant

   rows from the Vulnerability Severity Rating and Maximum Security

   Impact by Affected Software table, and added the applicable

   update numbers for clarity. This is an informational change only.

 - Originally posted: January 12, 2016

 - Updated: May 25, 2016

 - Bulletin Severity Rating: Critical

 - Version: 1.1



MS16-054



 - Title: Security Update for Microsoft Office (3155544)

 - https://technet.microsoft.com/library/security/ms16-054.aspx

 - Reason for Revision: V1.1 (May 25, 2016): Corrected the updates

   replaced for Microsoft Office 2013 to 3114486 in MS16-004, and

   for CVE-2016-0183, clarified that the Preview Pane is an attack

   vector for this vulnerability. These are informational changes

   only.

 - Originally posted: May 10, 2016

 - Updated: May 25, 2016

 - Bulletin Severity Rating: Critical

 - Version: 1.1





Other Information

=================



Recognize and avoid fraudulent email to Microsoft customers:

=============================================================

If you receive an email message that claims to be distributing

a Microsoft security update, it is a hoax that may contain

malware or pointers to malicious websites. Microsoft does

not distribute security updates via email.



The Microsoft Security Response Center (MSRC) uses PGP to digitally

sign all security notifications. However, PGP is not required for

reading security notifications, reading security bulletins, or

installing security updates. You can obtain the MSRC public PGP key

at <https://technet.microsoft.com/security/dn753714>.



********************************************************************

THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS

PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT

DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING

THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR

PURPOSE.

IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE

LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,

INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL

DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN

ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY

FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING

LIMITATION MAY NOT APPLY.

********************************************************************



Microsoft respects your privacy. Please read our online Privacy

Statement at <http://go.microsoft.com/fwlink/?LinkId=81184>.



If you would prefer not to receive future technical security

notification alerts by email from Microsoft and its family of

companies please visit the following website to unsubscribe:

<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar

d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.



These settings will not affect any newsletters you’ve requested or

any mandatory service communications that are considered part of

certain Microsoft services.



For legal Information, see:

<http://www.microsoft.com/info/legalinfo/default.mspx>.



This newsletter was sent by:

Microsoft Corporation

1 Microsoft Way

Redmond, Washington, USA

98052



-----BEGIN PGP SIGNATURE-----

Version: PGP Desktop 10.2.0 (Build 1950)

Charset: utf-8



wsFVAwUBV0YmHvMcys+fLOcHAQiILg/8C8ytYprX7dHBkt8mN69r/aH1IkHjGtn9

xCusnitV//hXpd7U6rC8rzvU6jTjOW71BPfOmh/ieWugs4m80a9ynyedAbmOE+KS

0yFA+aeqkkpyug4fZIlmjMaQgC2ein39USukBCbj6ZbXrxRknFVmMJMxziMsv1lK

4AlgtkjL7MG2PHxKx3QiWzePps1+xMu8TM1NFoglqoT08WIp3zwqpsje+bhDUhR6

EcLBWsTYtjEFZObchzH4DY+uzy53X9QtqkSvObAKM1XUecfuMxC6daPgE6fyQw6g

TwajsaBcymU9lSffWwt5buKOSNcyOc6M0Ne5xApZXJReuhbyP70Ed5YbTbjJ3cnv

tI++8lkw/15iW/5nCdZEDFw3/q+hiOdS2IxIwqZydwNlpntE9+XimHOVHhb7b4ZP

X8dUSGNcl9jV3yfvDGdD9vDubLGTCeQRMMRCLP7+S+g8YMCkbXGnfZVRjpUYfTZy

XIRU+/RmSRQ9Dp++c7pSHzhtmwlnJHUNZCST92pbSQMHqYwnlhVW80itQ+Bs+9Em

LV9H4X+N7tyLa44/+i+NmCypKjzyforlXxlEGNDHyf3girDg6c1Sp8fTs7J6a4o4

IDnEzU3S6jV8+NGNuUDsZrTNAY7sv+Cpn8urOzWnNhbsuLisb99aDK6LLRjCVIQb

wI/WJQ/o0Ng=

=nieu

-----END PGP SIGNATURE-----




 		 	   		  
---
PatchManagement.org is hosted by Shavlik

The content on the email list is intended for assisting administrators.  If you would \
like to use any of this content in a blog or media publication, please contact the \
owners of the list for approval.

To unsubscribe send a blank email to leave-patchmanagement@patchmanagement.org
If you are unable to unsubscribe via this email address, please email
owner-patchmanagement@patchmanagement.org


[Attachment #3 (text/html)]

<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 12pt;
font-family:Calibri
}
--></style></head>
<body class='hmmessage'><div dir='ltr'><div><div dir="ltr"><div \
                class="ecxgmail_quote">-----BEGIN PGP SIGNED MESSAGE-----<br>
Hash: SHA256<br>
<br>
********************************************************************<br>
Title: Microsoft Security Bulletin Minor Revisions<br>
Issued: May 25, 2016<br>
********************************************************************<br>
<br>
Summary<br>
=======<br>
The following bulletins and/or bulletin summaries have undergone a<br>
minor revision increment.<br>
<br>
Please see the appropriate bulletin for more details.<br>
<br>
&nbsp; &nbsp;* MS15-JUL<br>
&nbsp; &nbsp;* MS16-MAY<br>
&nbsp; &nbsp;* MS15-126 - Critical<br>
&nbsp; &nbsp;* MS15-134 - Important<br>
&nbsp; &nbsp;* MS16-003 - Critical<br>
&nbsp; &nbsp;* MS16-054 - Critical<br>
<br>
Bulletin Information:<br>
=====================<br>
<br>
MS15-JUL<br>
<br>
&nbsp;- Title: Microsoft Security Bulletin Summary for July 2015<br>
&nbsp;- <a href="https://technet.microsoft.com/library/security/ms15-jul.aspx" \
rel="noreferrer" target="_blank">https://technet.microsoft.com/library/security/ms15-jul.aspx</a><br>
 &nbsp;- Reason for Revision: V3.1 (May 25, 2016): For MS15-076, added a<br>
&nbsp; &nbsp;Known Issues reference to the Executive Summaries table. For more<br>
&nbsp; &nbsp;information, see Microsoft Knowledge Base Article 3067505. For<br>
&nbsp; &nbsp;information about the solution for this Known Issue, see Microsoft<br>
&nbsp; &nbsp;Knowledge Base Article 3155218.<br>
&nbsp;- Originally posted: July 14, 2015<br>
&nbsp;- Updated: May 25, 2016<br>
&nbsp;- Bulletin Severity Rating: Not applicable<br>
&nbsp;- Version: 3.1<br>
<br>
MS16-MAY<br>
<br>
&nbsp;- Title: Microsoft Security Bulletin Summary for May 2016<br>
&nbsp;- <a href="https://technet.microsoft.com/library/security/ms16-may.aspx" \
rel="noreferrer" target="_blank">https://technet.microsoft.com/library/security/ms16-may.aspx</a><br>
 &nbsp;- Reason for Revision: V2.1 (May 25, 2016): For MS16-065, added a<br>
&nbsp; &nbsp;Known Issue to the Executive Summaries table. After you install<br>
&nbsp; &nbsp;any of the security updates that are included in MS16-065 on a<br>
&nbsp; &nbsp;Front End or Standard Edition server for Lync Server 2010, Lync<br>
&nbsp; &nbsp;Server 2013, or Skype for Business Server 2015, several<br>
&nbsp; &nbsp;conferencing modalities no longer function for internal users.<br>
&nbsp; &nbsp;For information about the solution for this Known Issue, see<br>
&nbsp; &nbsp;Microsoft Knowledge Base Article 3165438.<br>
&nbsp;- Originally posted: May 10, 2016<br>
&nbsp;- Updated: May 25, 2016<br>
&nbsp;- Bulletin Severity Rating: Not applicable<br>
&nbsp;- Version: 2.1<br>
<br>
MS15-126<br>
<br>
&nbsp;- Title: Cumulative Security Update for JScript and VBScript to<br>
&nbsp; &nbsp;Address Remote Code Execution (3116178)<br>
&nbsp;- <a href="https://technet.microsoft.com/library/security/ms15-126.aspx" \
rel="noreferrer" target="_blank">https://technet.microsoft.com/library/security/ms15-126.aspx</a><br>
 &nbsp;- Reason for Revision: V1.1 (May 25, 2016): Removed redundant<br>
&nbsp; &nbsp;rows from the Vulnerability Severity Rating and Maximum Security<br>
&nbsp; &nbsp;Impact by Affected Software table, and added the applicable<br>
&nbsp; &nbsp;update numbers for clarity. This is an informational change only.<br>
&nbsp;- Originally posted: December 8, 2015<br>
&nbsp;- Updated: May 25, 2016<br>
&nbsp;- Bulletin Severity Rating: Critical<br>
&nbsp;- Version: 1.1<br>
<br>
MS15-134<br>
<br>
&nbsp;- Title: Security Update for Windows Media Center to Address<br>
&nbsp; &nbsp;Remote Code Execution (3108669)<br>
&nbsp;- <a href="https://technet.microsoft.com/library/security/ms15-134.aspx" \
rel="noreferrer" target="_blank">https://technet.microsoft.com/library/security/ms15-134.aspx</a><br>
 &nbsp;- Reason for Revision: V1.1 (May 25, 2016): Removed the mitigating<br>
&nbsp; &nbsp;factors for CVE-2015-6131 and CVE-2015-6127. These are<br>
&nbsp; &nbsp;informational changes only.<br>
&nbsp;- Originally posted: December 8, 2015<br>
&nbsp;- Updated: May 25, 2016<br>
&nbsp;- Bulletin Severity Rating: Important<br>
&nbsp;- Version: 1.1<br>
<br>
MS16-003<br>
<br>
&nbsp;- Title: Cumulative Security Update for JScript and VBScript<br>
&nbsp; &nbsp;to Address Remote Code Execution (3125540)<br>
&nbsp;- <a href="https://technet.microsoft.com/library/security/ms16-003.aspx" \
rel="noreferrer" target="_blank">https://technet.microsoft.com/library/security/ms16-003.aspx</a><br>
 &nbsp;- Reason for Revision: V1.1 (May 25, 2016): Removed redundant<br>
&nbsp; &nbsp;rows from the Vulnerability Severity Rating and Maximum Security<br>
&nbsp; &nbsp;Impact by Affected Software table, and added the applicable<br>
&nbsp; &nbsp;update numbers for clarity. This is an informational change only.<br>
&nbsp;- Originally posted: January 12, 2016<br>
&nbsp;- Updated: May 25, 2016<br>
&nbsp;- Bulletin Severity Rating: Critical<br>
&nbsp;- Version: 1.1<br>
<br>
MS16-054<br>
<br>
&nbsp;- Title: Security Update for Microsoft Office (3155544)<br>
&nbsp;- <a href="https://technet.microsoft.com/library/security/ms16-054.aspx" \
rel="noreferrer" target="_blank">https://technet.microsoft.com/library/security/ms16-054.aspx</a><br>
 &nbsp;- Reason for Revision: V1.1 (May 25, 2016): Corrected the updates<br>
&nbsp; &nbsp;replaced for Microsoft Office 2013 to 3114486 in MS16-004, and<br>
&nbsp; &nbsp;for CVE-2016-0183, clarified that the Preview Pane is an attack<br>
&nbsp; &nbsp;vector for this vulnerability. These are informational changes<br>
&nbsp; &nbsp;only.<br>
&nbsp;- Originally posted: May 10, 2016<br>
&nbsp;- Updated: May 25, 2016<br>
&nbsp;- Bulletin Severity Rating: Critical<br>
&nbsp;- Version: 1.1<br>
<br>
<br>
Other Information<br>
=================<br>
<br>
Recognize and avoid fraudulent email to Microsoft customers:<br>
=============================================================<br>
If you receive an email message that claims to be distributing<br>
a Microsoft security update, it is a hoax that may contain<br>
malware or pointers to malicious websites. Microsoft does<br>
not distribute security updates via email.<br>
<br>
The Microsoft Security Response Center (MSRC) uses PGP to digitally<br>
sign all security notifications. However, PGP is not required for<br>
reading security notifications, reading security bulletins, or<br>
installing security updates. You can obtain the MSRC public PGP key<br>
at &lt;<a href="https://technet.microsoft.com/security/dn753714" rel="noreferrer" \
target="_blank">https://technet.microsoft.com/security/dn753714</a>&gt;.<br> <br>
********************************************************************<br>
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS<br>
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT<br>
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING<br>
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR<br>
PURPOSE.<br>
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE<br>
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,<br>
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL<br>
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN<br>
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.<br>
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY<br>
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING<br>
LIMITATION MAY NOT APPLY.<br>
********************************************************************<br>
<br>
Microsoft respects your privacy. Please read our online Privacy<br>
Statement at &lt;<a href="http://go.microsoft.com/fwlink/?LinkId=81184" \
rel="noreferrer" target="_blank">http://go.microsoft.com/fwlink/?LinkId=81184</a>&gt;.<br>
 <br>
If you would prefer not to receive future technical security<br>
notification alerts by email from Microsoft and its family of<br>
companies please visit the following website to unsubscribe:<br>
&lt;<a href="https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizard.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&amp;%3blcid=1033" \
rel="noreferrer" target="_blank">https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar<br>
 d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&amp;%3blcid=1033</a>&gt;.<br>
<br>
These settings will not affect any newsletters you’ve requested or<br>
any mandatory service communications that are considered part of<br>
certain Microsoft services.<br>
<br>
For legal Information, see:<br>
&lt;<a href="http://www.microsoft.com/info/legalinfo/default.mspx" rel="noreferrer" \
target="_blank">http://www.microsoft.com/info/legalinfo/default.mspx</a>&gt;.<br> \
<br> This newsletter was sent by:<br>
Microsoft Corporation<br>
1 Microsoft Way<br>
Redmond, Washington, USA<br>
98052<br>
<br>
-----BEGIN PGP SIGNATURE-----<br>
Version: PGP Desktop 10.2.0 (Build 1950)<br>
Charset: utf-8<br>
<br>
wsFVAwUBV0YmHvMcys+fLOcHAQiILg/8C8ytYprX7dHBkt8mN69r/aH1IkHjGtn9<br>
xCusnitV//hXpd7U6rC8rzvU6jTjOW71BPfOmh/ieWugs4m80a9ynyedAbmOE+KS<br>
0yFA+aeqkkpyug4fZIlmjMaQgC2ein39USukBCbj6ZbXrxRknFVmMJMxziMsv1lK<br>
4AlgtkjL7MG2PHxKx3QiWzePps1+xMu8TM1NFoglqoT08WIp3zwqpsje+bhDUhR6<br>
EcLBWsTYtjEFZObchzH4DY+uzy53X9QtqkSvObAKM1XUecfuMxC6daPgE6fyQw6g<br>
TwajsaBcymU9lSffWwt5buKOSNcyOc6M0Ne5xApZXJReuhbyP70Ed5YbTbjJ3cnv<br>
tI++8lkw/15iW/5nCdZEDFw3/q+hiOdS2IxIwqZydwNlpntE9+XimHOVHhb7b4ZP<br>
X8dUSGNcl9jV3yfvDGdD9vDubLGTCeQRMMRCLP7+S+g8YMCkbXGnfZVRjpUYfTZy<br>
XIRU+/RmSRQ9Dp++c7pSHzhtmwlnJHUNZCST92pbSQMHqYwnlhVW80itQ+Bs+9Em<br>
LV9H4X+N7tyLa44/+i+NmCypKjzyforlXxlEGNDHyf3girDg6c1Sp8fTs7J6a4o4<br>
IDnEzU3S6jV8+NGNuUDsZrTNAY7sv+Cpn8urOzWnNhbsuLisb99aDK6LLRjCVIQb<br>
wI/WJQ/o0Ng=<br>
=nieu<br>
-----END PGP SIGNATURE-----<br>
<br>
</div><br></div></div> 		 	   		  </div></body>
</html>



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic