MS Sec Notification mailing list archives

Microsoft Security Bulletin Minor Revisions


From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Thu, 10 Oct 2013 16:06:27 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: October 10, 2013
********************************************************************

Summary
=======
The following bulletins have undergone minor revision increments. 
Please see the bulletins for more details.
  
 * MS13-080
 * MS13-082
 * MS13-oct
  
  
Bulletin Information:
=====================

* MS13-080 - Critical

  - https://technet.microsoft.com/security/bulletin/ms13-080
  - Reason for Revision: V1.3 (October 10, 2013): Bulletin 
    revised to remove CVE-2013-3871 from the vulnerabilities 
    addressed by this update. Including this CVE in the 
    original security bulletin text was a documentation error. 
    CVE-2013-3871 is scheduled to be addressed in a future 
    security update. This is an informational change only. 
    Customers who have already successfully updated their 
    systems do not need to take any action.
  - Originally posted: October 8, 2013   
  - Updated: October 10, 2013  
  - Bulletin Severity Rating: Critical
  - Version: 1.3

* MS13-082 - Critical

  - https://technet.microsoft.com/security/bulletin/ms13-082
  - Reason for Revision: V1.1 (October 10, 2013): Bulletin
    revised to indicate that Server Core installations of
    Windows Server 2012 are affected by the vulnerability
    addressed in the 2861194 update. This is an informational
    change only. There were no changes to the detection logic
    or the security update files. Customers who have already
    successfully updated their systems do not need to take
    any action.
  - Originally posted: October 8, 2013   
  - Updated: October 10, 2013  
  - Bulletin Severity Rating: Critical
  - Version: 1.1

* MS13-oct

  - https://technet.microsoft.com/security/bulletin/ms13-oct
  - Reason for Revision: V1.1 (October 10, 2013): For MS13-080,
    removed Exploitability Assessment in the Exploitability
    Index for CVE-2013-3871. Including this CVE in the original
    Exploitability Index was a documentation error. CVE-2013-
    3871 is scheduled to be addressed in a future security
    update. This is an informational change only. For MS13-082,
    revised bulletin to indicate that Server Core installations
    of Windows Server 2012 are affected by the vulnerability
    addressed in the 2861194 update. There were no changes to
    the detection logic or the security update files. Customers
    who have already successfully updated their systems do not
    need to take any action.
  - Originally posted: October 8, 2013   
  - Updated: October 10, 2013  
  - Version: 1.1


Other Information
=================

Follow us on Twitter for the latest information and updates:
http://twitter.com/msftsecresponse 

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, it is not required to read
security notifications, security bulletins, security advisories, or
install security updates. You can obtain the MSRC public PGP key at
https://technet.microsoft.com/security/bulletin/pgp.

To receive automatic notifications whenever Microsoft Security 
Bulletins and Microsoft Security Advisories are issued or revised,
subscribe to Microsoft Technical Security Notifications on
http://technet.microsoft.com/security/dd252948.


********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

To manage or cancel your subscription to this newsletter,
visit the Microsoft.com Profile Center at
<http://go.microsoft.com/fwlink/?LinkId=245953> and then
click Manage Communications under My Subscriptions in the 
Quicklinks section.

For more information, see the Communications Preferences section
of the Microsoft Online Privacy Statement at:
<http://go.microsoft.com/fwlink/?LinkId=92781>.

For the complete Microsoft Online Privacy Statement, see:
<http://go.microsoft.com/fwlink/?LinkId=81184>.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8
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=IoZJ
-----END PGP SIGNATURE-----


Current thread: