MS Sec Notification mailing list archives

Microsoft Security Bulletin Minor Revisions


From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Thu, 07 Apr 2016 15:05:06 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: March 25, 2016
********************************************************************

Summary
=======
The following bulletins and/or bulletin summaries have undergone a 
minor revision increment. 

Please see the appropriate bulletin for more details.

 * MS13-082 - Critical
 * MS15-115 - Critical
 * MS15-121 - Important
 * MS15-122 - Important
 * MS16-027 - Critical
 

Bulletin Information:
=====================

MS13-082

 - Title: Vulnerabilities in .NET Framework Could Allow Remote Code
   Execution (2878890)
 - https://technet.microsoft.com/library/security/ms13-082.aspx
 - Reason for Revision: V1.2 (April 7, 2016): Corrected download 
   links for Microsoft .NET Framework 3.5.1 on Windows 7 and
   Windows 2008 R2. This is an informational change only. Customers 
   who have already successfully updated their systems do not need 
   to take any action. 
 - Originally posted: October 8, 2013   
 - Updated: April 7, 2016
 - Bulletin Severity Rating: Critical
 - Version: 1.2

MS15-115

 - Title: Security Update for Microsoft Windows to Address 
   Remote Code Execution (3105864)
 - https://technet.microsoft.com/library/security/ms15-115.aspx
 - Reason for Revision: V2.1 (April 7, 2016): Updated the footnotes
   following the Affected Software table to further clarify
   installation order for security update 3101746 in MS15-115, 
   3081320 in MS15-121, and 3101246 in MS15-122. This is an 
   informational change only. Customers who have already 
   successfully installed the update do not need to take any 
   action. 
 - Originally posted: November 10, 2015   
 - Updated: April 7, 2016
 - Bulletin Severity Rating: Critical
 - Version: 2.1

MS15-121

 - Title: Security Update for Schannel to Address Spoofing (3081320)
 - https://technet.microsoft.com/library/security/ms15-121.aspx
 - Reason for Revision: V1.1 (April 7, 2016): Updated the footnotes 
   following the Affected Software table to further clarify 
   installation order for security update 3101746 in MS15-115, 
   3081320 in MS15-121, and 3101246 in MS15-122. This is an 
   informational change only. Customers who have already 
   successfully installed the update do not need to take any 
   action.
 - Originally posted: November 10, 2015   
 - Updated: April 7, 2016
 - Bulletin Severity Rating: Important
 - Version: 1.1

MS15-122

 - Title: Security Update for Kerberos to Address Security 
   Feature Bypass (3105256)
 - https://technet.microsoft.com/library/security/ms15-122.aspx
 - Reason for Revision: V1.2 (April 7, 2016): Updated the footnotes 
   following the Affected Software and Vulnerability Severity Ratings
   table to further clarify installation order for security update 
   3101746 in MS15-115, 3081320 in MS15-121, and 3101246 in MS15-122. 
   This is an informational change only. Customers who have already 
   successfully installed the update do not need to take any action.
 - Originally posted: November 10, 2015   
 - Updated: April 7, 2016
 - Bulletin Severity Rating: Important
 - Version: 1.2

MS16-027

 - Title: Security Update for Windows Media to Address Remote 
   Code Execution (3143146)
 - https://technet.microsoft.com/library/security/ms16-027.aspx
 - Reason for Revision: V1.2 (April 7, 2016): Added a note to 
   clarify that Windows Media is only enabled on Windows server 
   operating systems when the Desktop Experience feature is enabled. 
   This is an informational change only.
 - Originally posted: March 8, 2016   
 - Updated: April 7, 2016
 - Bulletin Severity Rating: Critical
 - Version: 1.2




 
Other Information
=================

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing 
a Microsoft security update, it is a hoax that may contain 
malware or pointers to malicious websites. Microsoft does 
not distribute security updates via email. 

The Microsoft Security Response Center (MSRC) uses PGP to digitally 
sign all security notifications. However, PGP is not required for 
reading security notifications, reading security bulletins, or 
installing security updates. You can obtain the MSRC public PGP key
at <https://technet.microsoft.com/security/dn753714>.

********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

Microsoft respects your privacy. Please read our online Privacy
Statement at <http://go.microsoft.com/fwlink/?LinkId=81184>.

If you would prefer not to receive future technical security
notification alerts by email from Microsoft and its family of
companies please visit the following website to unsubscribe:
<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar
d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.

These settings will not affect any newsletters you’ve requested or
any mandatory service communications that are considered part of
certain Microsoft services.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8
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=nV0e
-----END PGP SIGNATURE-----


Current thread: