MS Sec Notification mailing list archives

Microsoft Security Advisory Notification


From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Tue, 13 May 2014 11:32:29 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Title: Microsoft Security Advisory Notification
Issued: May 13, 2014
********************************************************************

Security Advisories Updated or Released Today
==============================================

* Microsoft Security Advisory (2871997)
  - Title: Update to Improve Credentials Protection and Management
  - https://technet.microsoft.com/library/security/2871997
  - Revision Note: V1.0 (May 13, 2014): Advisory published.

* Microsoft Security Advisory (2962824)
  - Title: Update Rollup of Revoked Non-Compliant UEFI Modules
  - https://technet.microsoft.com/library/security/2962824
  - Revision Note: V1.0 (May 13, 2014): Advisory published.

* Microsoft Security Advisory (2960358)
  - Title: Update for Disabling RC4 in .NET TLS
  - https://technet.microsoft.com/library/security/2960358
  - Revision Note: V1.0 (May 13, 2014): Advisory published.

* Microsoft Security Advisory (2755801)
  - Title: Update for Vulnerabilities in Adobe Flash Player 
    in Internet Explorer
  - https://technet.microsoft.com/library/security/2755801
  - Revision Note: V24.0 (May 13, 2014): Added the 2957151 
    update to the Current Update section.

* Microsoft Security Advisory (2269637)
  - Title: Insecure Library Loading Could Allow Remote 
    Code Execution
  - https://technet.microsoft.com/library/security/2269637
  - Revision Note: V19.0 (May 13, 2014): Added the 
    following Microsoft Security Bulletin to the Updates 
    relating to Insecure Library Loading section: MS14-023, 
    "Vulnerability in Microsoft Office Could Allow Remote 
     Code Execution."


Other Information
=================

Follow us on Twitter for the latest information and updates:
http://twitter.com/msftsecresponse 

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, it is not required to read
security notifications, security bulletins, security advisories, or
install security updates. You can obtain the MSRC public PGP key at
https://technet.microsoft.com/security/bulletin/pgp.

To receive automatic notifications whenever Microsoft Security 
Bulletins and Microsoft Security Advisories are issued or revised,
subscribe to Microsoft Technical Security Notifications on
http://technet.microsoft.com/security/dd252948.


********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

To manage or cancel your subscription to this newsletter,
visit the Microsoft.com Profile Center at
<http://go.microsoft.com/fwlink/?LinkId=245953> and then
click Manage Communications under My Subscriptions in the 
Quicklinks section.

For more information, see the Communications Preferences section
of the Microsoft Online Privacy Statement at:
<http://go.microsoft.com/fwlink/?LinkId=92781>.

For the complete Microsoft Online Privacy Statement, see:
<http://go.microsoft.com/fwlink/?LinkId=81184>.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052



-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8
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=df2Y
-----END PGP SIGNATURE-----


Current thread: