MS Sec Notification mailing list archives

Microsoft Security Bulletin Minor Revisions


From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Wed, 22 Jun 2016 17:55:32 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: June 22, 2016
********************************************************************

Summary
=======
The following bulletins and/or bulletin summaries have undergone a 
minor revision increment. 

Please see the appropriate bulletin for more details.

 * MS16-063
 * MS16-077
 * MS16-JUN
 * MS15-OCT


Bulletin Information:
=====================

MS16-063

 - Title: Cumulative Security Update for Internet Explorer (3163649)
 - https://technet.microsoft.com/library/security/ms16-063.aspx
 - Reason for Revision: V1.1 (June 22, 2016): Bulletin revised to add
   workarounds for CVE-2016-3213. This is an informational change only.
   Customers who have successfully installed the updates do not need
   to take any further action. 
 - Originally posted: June 14, 2016   
 - Updated: June 22, 2016
 - Bulletin Severity Rating: Critical
 - Version: 1.1
 
 MS16-077

 - Title: Security Update for WPAD (3165191)
 - https://technet.microsoft.com/library/security/ms16-077.aspx
 - Reason for Revision: V1.1 (June 22, 2016): Bulletin revised to add
   an Update FAQ on behavior changes to be aware of after installing
   this update. This is an informational change only. 
 - Originally posted: June 14, 2016   
 - Updated: June 22, 2016
 - Bulletin Severity Rating: Important
 - Version: 1.1
 
 MS16-JUN
 
 - Title: Microsoft Security Bulletin Summary for June 2016 
 - https://technet.microsoft.com/library/security/ms16-JUN.aspx
 - Reason for Revision: V2.1 (June 22, 2016): For MS16-075 and 
   MS16-076, added a Known Issue to the Executive Summaries table 
   for update 3161561. When you try to access a domain DFS namespace 
   (such as \\contoso.com\SYSVOL) on a computer that is configured to 
   require mutual authentication (by using the UNC Hardened Access 
   feature), you receive an "Access Denied" error message. Microsoft 
   is researching this problem and will post more information in this 
   article when it becomes available. For more information, see 
   Microsoft Knowledge Base Article 3161561. 
 - Originally posted: June 14, 2016   
 - Updated: June 22, 2016
 - Bulletin Severity Rating: Not applicable
 - Version: 2.1

 MS15-OCT
 
 - Title: Microsoft Security Bulletin Summary for October 2015 
 - https://technet.microsoft.com/library/security/ms15-OCT.aspx
 - Reason for Revision: V2.2 (June 22, 2016): For MS15-106, 
   added a Known Issue to the Executive Summaries table. After you 
   install the update, storage event is not triggered for localStorage 
   updates in an iFrame in Internet Explorer 11. For more information 
   and the solution to this known issue, see Microsoft Knowledge Base 
   Article 3168674. Previously for MS15-106, a Known Issue was added 
   that addresses an issue in which Internet Explorer 11 consumes 
   high memory and CPU cycles after you install cumulative update 
   3093983. For more information and the solution to this known issue, 
   see Microsoft Knowledge Base Article 3119070. 
 - Originally posted: October 13, 2015   
 - Updated: June 22, 2016
 - Bulletin Severity Rating: Not applicable
 - Version: 2.2
 
 
Other Information
=================

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing 
a Microsoft security update, it is a hoax that may contain 
malware or pointers to malicious websites. Microsoft does 
not distribute security updates via email. 

The Microsoft Security Response Center (MSRC) uses PGP to digitally 
sign all security notifications. However, PGP is not required for 
reading security notifications, reading security bulletins, or 
installing security updates. You can obtain the MSRC public PGP key
at <https://technet.microsoft.com/security/dn753714>.

********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

Microsoft respects your privacy. Please read our online Privacy
Statement at <http://go.microsoft.com/fwlink/?LinkId=81184>.

If you would prefer not to receive future technical security
notification alerts by email from Microsoft and its family of
companies please visit the following website to unsubscribe:
<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar
d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.

These settings will not affect any newsletters you’ve requested or
any mandatory service communications that are considered part of
certain Microsoft services.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8
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=TXiy
-----END PGP SIGNATURE-----


Current thread: