MS Sec Notification mailing list archives

Microsoft Security Bulletin Releases


From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Tue, 10 Feb 2015 12:32:53 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Title: Microsoft Security Bulletin Releases
Issued: February 10, 2015
********************************************************************

Summary
=======

The following bulletins have undergone a major revision increment. 

  * MS14-083 - Important


Bulletin Information:
=====================

MS14-083 - Important

 - Title: Vulnerabilities in Microsoft Excel Could Allow Remote
   Code Execution (3017347) 
 - https://technet.microsoft.com/library/security/ms14-083
 - Reason for Revision: V2.0 (February 10, 2015): Bulletin
   rereleased to announce the availability of an additional
   update package for Microsoft Excel Viewer (2920791) that
   addresses the vulnerabilities discussed in this bulletin.
   Note that the 2920791 update also addresses a vulnerability
   discussed in MS15-012, which is being released concurrently.
   Microsoft recommends that customers running Microsoft Excel
   Viewer apply the 2920791 update at their earliest convenience.
   See the Affected Software table for the download link. 
 - Originally posted: December 9, 2014
 - Updated: February 10, 2015
 - Bulletin Severity Rating: Important
 - Version: 2.0 

 
Other Information
=================

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing 
a Microsoft security update, it is a hoax that may contain 
malware or pointers to malicious websites. Microsoft does 
not distribute security updates via email. 

The Microsoft Security Response Center (MSRC) uses PGP to digitally 
sign all security notifications. However, PGP is not required for 
reading security notifications, reading security bulletins, or 
installing security updates. You can obtain the MSRC public PGP key
at <https://technet.microsoft.com/security/dn753714>.

********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

Microsoft respects your privacy. Please read our online Privacy
Statement at <http://go.microsoft.com/fwlink/?LinkId=81184>.

If you would prefer not to receive future technical security
notification alerts by email from Microsoft and its family of
companies please visit the following website to unsubscribe:
<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar
d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.

These settings will not affect any newsletters you’ve requested or
any mandatory service communications that are considered part of
certain Microsoft services.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8

wsFVAwUBVNlaIb8Fv/Q6pUnlAQh4KA/9Fq04967NZexxqi36kOHbw1K2nS06M7sh
s5iRpPWmkaxeAQz7f5fqnw3WICGLhSx00qj1AIlFm3D04OttMgQXD/lS/mLpG+Jh
X5OEJS7BnNdQ9pqnvsRVDPpM2KSZ+qVNRqzWbcQhq3otKqrJx8Sc4Rf6l/JCxLfr
eYcTK5yi2xOsvQ29O7nTunu0Heo6BrBjJGZ6+pVVSP+ieENRjn9A1xvJtkNqmKib
C7FjePuYs6VV4SwpdXD96oGr9dIwVf/jTkyC6tnAj5Od2Mh1hD1/PtE9zbIqB4ep
5UbIUg1Lcg5pheSrOEnyN7W7jsnqDGVBbxkjx7HHihLYHTWWIMZCiCjkGeO8Wixk
Brcqe6FuOTTBIS70+SAThenb8s5abUarrDAcgp3pbQ0EcIwoBGFWR0oUuvtZ6MH4
ixmjKgBAbntGGH5ZdZLMTQ23W9TTujgu18RMYPhEfyGrN/uRGBO57S2qZDqvJven
fdxlTMTrOzuSGplN+zFk+wvixevQVF+ItM6DTkBQsfGCVjQzjSVyx01qh6csTb2O
Ax191NIr8uh/u3Mlk5NfTu7bGvzYO+mnJpNi5IM++pKxfiHjZcvYV5DsyxwD0EYO
UmSbv6W+gKx9DVhqRuQvr6BoCBNjLl7jiNX/J8Q/X/NqVVECiPAmYFFAL5yFNodO
g+Ef/YbYHuI=
=ja64
-----END PGP SIGNATURE-----


Current thread: