MS Sec Notification mailing list archives

Microsoft Security Bulletin Minor Revisions


From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Tue, 09 Jul 2013 17:59:33 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: July 9, 2013
********************************************************************

Summary
=======
The following bulletins have undergone minor revision increments. 
Please see the bulletins for more details.
  
 * MS11-007
 * MS11-043
 * MS11-076
 * MS12-006
 * MS12-036
 * MS12-048
 * MS12-049
 * MS12-054
 * MS12-056
 * MS12-082
 * MS13-006
 * MS13-027
 * MS13-055
 * MS13-JUL

  
Bulletin Information:
=====================

* MS11-007 - Critical

  - https://technet.microsoft.com/security/bulletin/ms11-007
  - Reason for Revision: V2.1 (July 9, 2013): Bulletin revised
    to announce a detection change that excludes Windows 7
    language packs from the 2485376 update. This is a detection
    change only. Customers who have already successfully updated
    their systems do not need to take any action.
  - Originally posted: February 8, 2011   
  - Updated: July 9, 2013  
  - Bulletin Severity Rating: Critical
  - Version: 2.1

* MS11-043 - Critical

  - https://technet.microsoft.com/security/bulletin/ms11-043
  - Reason for Revision: V2.2 (July 9, 2013): Bulletin revised to
    announce a detection change in the Windows Vista packages for
    the 2536276 update to correct a Windows Update reoffering
    issue. This is a detection change only. Customers who have
    already successfully updated their systems do not need to
    take any action.
  - Originally posted: June 14, 2011   
  - Updated: July 9, 2013  
  - Bulletin Severity Rating: Critical
  - Version: 2.2

* MS11-076 - Important

  - https://technet.microsoft.com/security/bulletin/ms11-076
  - Reason for Revision: V1.1 (July 9, 2013): Bulletin revised
    to announce a detection change in the Windows Vista packages
    for the 2579686 update to correct a Windows Update
    reoffering issue. This is a detection change only.
    Customers who have already successfully updated their
    systems do not need to take any action.
  - Originally posted: October 11, 2011   
  - Updated: July 9, 2013  
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS12-006 - Important

  - https://technet.microsoft.com/security/bulletin/ms12-006
  - Reason for Revision: V1.2 (July 9, 2013): Bulletin revised
    to announce a detection change in the Windows Vista packages
    for the 2585542 update to correct a Windows Update
    reoffering issue. This is a detection change only.
    Customers who have already successfully updated their
    systems do not need to take any action.
  - Originally posted: January 10, 2012   
  - Updated: July 9, 2013  
  - Bulletin Severity Rating: Important
  - Version: 1.2

* MS12-036 - Critical

  - https://technet.microsoft.com/security/bulletin/ms12-036
  - Reason for Revision: V1.3 (July 9, 2013): Bulletin revised
    to announce a detection change in the Windows Vista packages
    for the 2685939 update to correct a Windows Update
    reoffering issue. This is a detection change only.
    Customers who have already successfully updated their
    systems do not need to take any action.
  - Originally posted: June 12, 2012   
  - Updated: July 9, 2013  
  - Bulletin Severity Rating: Critical
  - Version: 1.3

* MS12-048 - Important

  - https://technet.microsoft.com/security/bulletin/ms12-048
  - Reason for Revision: V1.1 (July 9, 2013): Bulletin revised
    to announce a detection change in the Windows Vista packages
    for the 2691442 update to correct a Windows Update
    reoffering issue. This is a detection change only.
    Customers who have already successfully updated their
    systems do not need to take any action.
  - Originally posted: July 10, 2012   
  - Updated: July 9, 2013  
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS12-049 - Important

  - https://technet.microsoft.com/security/bulletin/ms12-049
  - Reason for Revision: V1.1 (July 9, 2013): Bulletin revised
    to announce a detection change in the Windows Vista packages
    for the 2655992 update to correct a Windows Update
    reoffering issue. This is a detection change only.
    Customers who have already successfully updated their
    systems do not need to take any action.
  - Originally posted: July 10, 2012   
  - Updated: July 9, 2013  
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS12-054 - Critical

  - https://technet.microsoft.com/security/bulletin/ms12-054
  - Reason for Revision: V2.2 (July 9, 2013): Bulletin revised
    to announce a detection change in the Windows Vista packages
    for the 2705219 update to correct a Windows Update
    reoffering issue. This is a detection change only.
    Customers who have already successfully updated their
    systems do not need to take any action.
  - Originally posted: August 14, 2012   
  - Updated: July 9, 2013  
  - Bulletin Severity Rating: Critical
  - Version: 2.2

* MS12-056 - Important

  - https://technet.microsoft.com/security/bulletin/ms12-056
  - Reason for Revision: V1.1 (July 9, 2013): Bulletin revised
    to announce a detection change in the Windows Vista packages
    for the 2706045 update to correct a Windows Update
    reoffering issue. This is a detection change only.
    Customers who have already successfully updated their
    systems do not need to take any action.
  - Originally posted: August 14, 2012   
  - Updated: July 9, 2013  
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS12-082 - Important

  - https://technet.microsoft.com/security/bulletin/ms12-082
  - Reason for Revision: V1.2 (July 9, 2013): Bulletin revised
    to announce a detection change in the Windows Vista packages
    for the 2770660 update to correct a Windows Update
    reoffering issue. This is a detection change only.
    Customers who have already successfully updated their
    systems do not need to take any action.
  - Originally posted: December 11, 2012   
  - Updated: July 9, 2013  
  - Bulletin Severity Rating: Important
  - Version: 1.2

* MS13-006 - Important

  - https://technet.microsoft.com/security/bulletin/ms13-006
  - Reason for Revision: V1.2 (July 9, 2013): Bulletin revised
    to announce a detection change in the Windows Vista packages
    for the 2785220 update to correct a Windows Update
    reoffering issue. This is a detection change only.
    Customers who have already successfully updated their
    systems do not need to take any action.
  - Originally posted: January 8, 2013   
  - Updated: July 9, 2013  
  - Bulletin Severity Rating: Important
  - Version: 1.2

* MS13-027 - Important

  - https://technet.microsoft.com/security/bulletin/ms13-027
  - Reason for Revision: V1.2 (July 9, 2013): Bulletin revised
    to announce a detection change in the Windows Vista packages
    for the 2807986 update to correct a Windows Update
    reoffering issue. This is a detection change only.
    Customers who have already successfully updated their
    systems do not need to take any action.
  - Originally posted: March 12, 2013   
  - Updated: July 9, 2013  
  - Bulletin Severity Rating: Important
  - Version: 1.2

* MS13-055 - Critical

  - https://technet.microsoft.com/security/bulletin/ms13-055
  - Reason for Revision: V1.1 (July 9, 2013): Bulletin revised 
    to announce that Microsoft is aware of targeted attacks 
    attempting to exploit the vulnerability described in 
    CVE-2013-3163 through Internet Explorer 8. Applying this 
    security update protects customers from exploitation of this 
    vulnerability. 
  - Originally posted: July 9, 2013   
  - Updated: July 9, 2013  
  - Bulletin Severity Rating: Critical
  - Version: 1.1

* MS13-JUL

  - https://technet.microsoft.com/security/bulletin/ms13-JUL
  - Reason for Revision: V1.1 (July 9, 2013): For MS13-055, 
    revised the Exploitability Assessment in the Exploitability 
    Index for CVE-2013-3163. Microsoft is aware of targeted 
    attacks that attempt to exploit this vulnerability through 
    Internet Explorer 8. This is an informational change only.
  - Originally posted: July 9, 2013   
  - Updated: July 9, 2013  
  - Version: 1.1


Other Information
=================

Follow us on Twitter for the latest information and updates:
http://twitter.com/msftsecresponse 

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, it is not required to read
security notifications, security bulletins, security advisories, or
install security updates. You can obtain the MSRC public PGP key at
https://technet.microsoft.com/security/bulletin/pgp.

To receive automatic notifications whenever Microsoft Security 
Bulletins and Microsoft Security Advisories are issued or revised,
subscribe to Microsoft Technical Security Notifications on
http://technet.microsoft.com/security/dd252948.


********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

To manage or cancel your subscription to this newsletter,
visit the Microsoft.com Profile Center at
<http://go.microsoft.com/fwlink/?LinkId=245953> and then
click Manage Communications under My Subscriptions in the 
Quicklinks section.

For more information, see the Communications Preferences section
of the Microsoft Online Privacy Statement at:
<http://go.microsoft.com/fwlink/?LinkId=92781>.

For the complete Microsoft Online Privacy Statement, see:
<http://go.microsoft.com/fwlink/?LinkId=81184>.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8
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=FBLP
-----END PGP SIGNATURE-----


Current thread: