MS Sec Notification mailing list archives
The following CVEs have been revised in the June 2017 Security Updates.
From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Tue, 01 Aug 2017 15:54:49 -0600
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ******************************************************************** Title: Microsoft Security Update Minor Revisions Issued: August 1, 2017 ******************************************************************** Summary ======= The following CVEs have been revised in the June 2017 Security Updates. * CVE-2017-0260 * CVE-2017-8501 * CVE-2017-8582 * CVE-2017-8606 * CVE-2017-8663 Revision Information: ===================== CVE-2017-0260 - Title: CVE-2017-0260 | Microsoft Office Remote Code Execution - https://portal.msrc.microsoft.com/en-us/security-guidance - Reason for Revision: Added Article and Download information for Microsoft Office 2016 Click-to-Run (C2R) for 32-bit editions and Microsoft Office 2016 Click-to-Run (C2R) for 64-bit editions to the Affected Products table. This is an informational change only. - Originally posted: June 13, 2017 - CVE Severity Rating: Important - Version: 1.1 CVE-2017-8501 - Title: CVE-2017-8501 | Microsoft Office Memory Corruption Vulnerability - https://portal.msrc.microsoft.com/en-us/security-guidance - Reason for Revision: Corrected KB article entry for Microsoft Word for Mac 2016. This is an informational change only. - Originally posted: July 11, 2017 - CVE Severity Rating: Important - Version: 1.1 CVE-2017-8582 - Title: CVE-2017-8582 | Http.sys Information Disclosure Vulnerability - https://portal.msrc.microsoft.com/en-us/security-guidance - Reason for Revision: Corrected CVE title. This is an informational change only. - Originally posted: July 11, 2017 - CVE Severity Rating: Important - Version: 1.1 CVE-2017-8606 - Title: CVE-2017-8606 | Scripting Engine Memory Corruption Vulnerability - https://portal.msrc.microsoft.com/en-us/security-guidance - Reason for Revision: Added Monthly Rollup KB4025336 for Internet Explorer 11 on Windows Server 2012 R2 to the Affected Products table. This is an informational change only. - Originally posted: July 11, 2017 - CVE Severity Rating: Critical - Version: 1.1 CVE-2017-8663 - Title: CVE-2017-8663 | Microsoft Office Outlook Memory Corruption Vulnerability - https://portal.msrc.microsoft.com/en-us/security-guidance - Reason for Revision: Updated acknowledgment. This is an informational change only. - Originally posted: July 27, 2017 - CVE Severity Rating: Important - Version: 1.1 Other Information ================= Recognize and avoid fraudulent email to Microsoft customers: ============================================================= If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email. The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at <https://technet.microsoft.com/security/dn753714>. ******************************************************************** THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ******************************************************************** Microsoft respects your privacy. Please read our online Privacy Statement at <http://go.microsoft.com/fwlink/?LinkId=81184>. If you would prefer not to receive future technical security notification alerts by email from Microsoft and its family of companies please visit the following website to unsubscribe: <https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>. These settings will not affect any newsletters youâve requested or any mandatory service communications that are considered part of certain Microsoft services. For legal Information, see: <http://www.microsoft.com/info/legalinfo/default.mspx>. This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052 -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) Charset: utf-8 wsFVAwUBWYD2uvsCXwi14Wq8AQgXww/+Ow1jaY45ygw5uc3hLKE9QfM6/kA/bSZ5 KtqVIAjcCCmVe1Kof7RNUNXuQ4J0JXUZ+IZmsyuyQTF75cBY6m+aXhFYLDCnNbZK 1kZ0isFfqGBzoKo67ZQjmuIfOXAhk6g0nzd7GfGkYPyG7bBQL7her3pAX3ewdWX5 UP3nAv+rwBQFP0JZG5SlEEWcU/mJof9nwNNIrdXC9WFYQR/zYASMZJx/DrLyfQ0I p16x1L3MsDnF+84NEsdXCdD02vQPKzV+MzUM/shEDOTCUKP96e4itdp0y+KfF3M3 eUiz7+Z8x06XJ8aHHANEzYVM7bakivTXhKvIn71FWU0U9BRM21rq/eSyHFvd8G01 O7hSjT6+3xN9ZiY10WrcdZSK/OEp7ngxlsxfwxkU2mHGmVFN08xXv2yExkxuSYxb WsmHklk8J3dXBdiNppKn4H5k/xnUNapursQz96TZ86hn51qioMwvkYCL+5DaEk9a S+yRIlKIyx3jpe0KprnmNymRbNZ2vt7q+5sQzV1JdxDkypvwCQaIMCNQF5XkThSv 3mkrE8XvvhvHU3g6zWvfK9wspVssBky1E6IrLHgI8H7ok56c7nUwfC1i2y7aB2z0 ntzyqYu/KgAx9X4iGv0Hhv1tputfGNvCEfGOIW1YI+rGDDPkgOFiKJGuXGKzJ1gL LZ5LTp7GyrY= =tJNp -----END PGP SIGNATURE-----
Current thread:
- The following CVEs have been revised in the June 2017 Security Updates. Microsoft (Aug 01)