MS Sec Notification mailing list archives

Microsoft Security Bulletin Minor Revisions


From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Tue, 10 Jul 2012 17:35:50 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: July 10, 2012
********************************************************************

Summary
=======
The following bulletins have undergone a minor revision increment. 
Please see the appropriate bulletin for more details.


  * MS11-044 - Critical
  * MS11-078 - Critical
  * MS11-100 - Critical
  * MS12-016 - Critical
  * MS12-035 - Critical
  * MS12-036 - Critical
  * MS12-050 - Important
  * MS12-JUL 

  

Bulletin Information:
=====================

* MS11-044 - Critical

  - http://technet.microsoft.com/security/bulletin/ms11-044
  - Reason for Revision: V1.3 (July 10, 2012): Microsoft revised 
    this bulletin to communicate a minor detection change for 
    KB2518864 for Microsoft .NET Framework 2.0 Service Pack 2 and 
    Microsoft .NET Framework 3.5 Service Pack 1 to correct an 
    offering issue. There were no changes to the security update 
    files. Customers who have already successfully updated their 
    systems do not need to take any action.
  - Originally posted: June 14, 2011
  - Updated: July 10, 2012 
  - Bulletin Severity Rating: Critical
  - Version: 1.3

* MS11-078 - Critical

  - http://technet.microsoft.com/security/bulletin/ms11-078
  - Reason for Revision: V1.3 (July 10, 2012): Microsoft revised 
    this bulletin to communicate a minor detection change for 
    KB2572073 for Microsoft .NET Framework 2.0 Service Pack 2 to 
    correct an offering issue. There were no changes to the security 
    update files. Customers who have already successfully updated 
    their systems do not need to take any action.
  - Originally posted: October 11, 2011 
  - Updated: July 10, 2012 
  - Bulletin Severity Rating: Critical
  - Version: 1.3

* MS11-100 - Critical

  - http://technet.microsoft.com/security/bulletin/ms11-100
  - Reason for Revision: V1.6 (July 10, 2012): Microsoft revised 
    this bulletin to communicate a minor detection change for 
    KB2657424 for Microsoft .NET Framework 3.5 Service Pack 1 to 
    correct an offering issue. There were no changes to the security 
    update files. Customers who have already successfully updated 
    their systems do not need to take any action.
  - Originally posted: December 29, 2011 
  - Updated: Tuesday, July 10, 2012 
  - Bulletin Severity Rating: Critical
  - Version: 1.6

* MS12-016 - Critical

  - http://technet.microsoft.com/security/bulletin/ms12-016
  - Reason for Revision: V1.3 (July 10, 2012): Microsoft revised 
    this bulletin to communicate a minor detection change for 
    KB2633880 for Microsoft .NET Framework 2.0 Service Pack 2 to 
    correct an offering issue. There were no changes to the security 
    update files. Customers who have already successfully updated 
    their systems do not need to take any action.
  - Originally posted: February 14, 2012 
  - Updated: July 10, 2012 
  - Bulletin Severity Rating: Critical
  - Version: 1.3

* MS12-035 - Critical

  - http://technet.microsoft.com/security/bulletin/ms12-035
  - Reason for Revision: V2.2 (July 10, 2012): Microsoft revised 
    this bulletin to communicate a minor detection change for 
    KB2604111 for Microsoft .NET Framework 3.5 Service Pack 1 to 
    correct an offering issue. There were no changes to the security 
    update files. Customers who have already successfully updated 
    their systems do not need to take any action.
  - Originally posted: May 08, 2012 
  - Updated: Tuesday, July 10, 2012 
  - Bulletin Severity Rating: Critical
  - Version: 2.2

* MS12-036 - Critical

  - http://technet.microsoft.com/security/bulletin/ms12-036
  - Reason for Revision: V1.2 (July 10, 2012): Removed MS11-065 as 
    a bulletin replaced by the KB2685939 update for Windows XP 
    Service Pack 3, Windows XP Professional x64 Edition Service 
    Pack 2, Windows Server 2003 Service Pack 2, Windows Server 
    2003 x64 Edition Service Pack 2, and Windows Server 2003 
    with SP2 for Itanium-based Systems. This is an informational 
    change only. There were no changes to the detection logic or 
    the update files.
  - Originally posted: June 12, 2012 
  - Updated: July 10, 2012 
  - Bulletin Severity Rating: Critical
  - Version: 1.2

* MS12-050 - Important

  - http://technet.microsoft.com/security/bulletin/ms12-050
  - Reason for Revision: V1.1 (July 10, 2012): Downgraded the 
    severity rating for the SharePoint Search Scope Vulnerability, 
    CVE-2012-1860, from Important to Moderate for all affected 
    software. This is an informational change only.
  - Originally posted: July 10, 2012 
  - Updated: July 10, 2012 
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS12-JUL

  - http://technet.microsoft.com/security/bulletin/ms12-JUL
  - Reason for Revision: V1.1 (July 10, 2012): Removed 
    CVE-2012-1860 from the Exploitability Index because the 
    vulnerability has a Moderate severity rating. Only 
    vulnerabilities that have a severity rating of Critical or 
    Important in the bulletins are included in the 
    Exploitability Index. 
  - Originally posted: July 10, 2012 
  - Updated: July 10, 2012 
  - Version: 1.1


Other Information
=================

Follow us on Twitter for the latest information and updates:
http://twitter.com/msftsecresponse 

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, it is not required to read
security notifications, security bulletins, security advisories, or
install security updates. You can obtain the MSRC public PGP key at
https://technet.microsoft.com/security/bulletin/pgp.

To receive automatic notifications whenever Microsoft Security 
Bulletins and Microsoft Security Advisories are issued or revised,
subscribe to Microsoft Technical Security Notifications on
http://technet.microsoft.com/security/dd252948.


********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

To manage or cancel your subscription to this newsletter,
visit the Microsoft.com Profile Center at
<http://go.microsoft.com/fwlink/?LinkId=245953> and then
click Manage Communications under My Subscriptions in the 
Quicklinks section.

For more information, see the Communications Preferences section
of the Microsoft Online Privacy Statement at:
<http://go.microsoft.com/fwlink/?LinkId=92781>.

For the complete Microsoft Online Privacy Statement, see:
<http://go.microsoft.com/fwlink/?LinkId=81184>.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8
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=NtiR
-----END PGP SIGNATURE-----


Current thread: