Microsoft Security Bulletin Minor Revisions

Fabricante: Microsoft
Fecha: 07/04/2016
Microsoft Security Bulletin Minor Revisions
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ******************************************************************** Title: Microsoft Security Bulletin Minor Revisions Issued: March 25, 2016 ******************************************************************** Summary ======= The following bulletins and/or bulletin summaries have undergone a minor revision increment. Please see the appropriate bulletin for more details. * MS13-082 - Critical * MS15-115 - Critical * MS15-121 - Important * MS15-122 - Important * MS16-027 - Critical Bulletin Information: ===================== MS13-082 - Title: Vulnerabilities in .NET Framework Could Allow Remote Code Execution (2878890) - https://technet.microsoft.com/library/security/ms13-082.aspx - Reason for Revision: V1.2 (April 7, 2016): Corrected download links for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows 2008 R2. This is an informational change only. Customers who have already successfully updated their systems do not need to take any action. - Originally posted: October 8, 2013 - Updated: April 7, 2016 - Bulletin Severity Rating: Critical - Version: 1.2 MS15-115 - Title: Security Update for Microsoft Windows to Address Remote Code Execution (3105864) - https://technet.microsoft.com/library/security/ms15-115.aspx - Reason for Revision: V2.1 (April 7, 2016): Updated the footnotes following the Affected Software table to further clarify installation order for security update 3101746 in MS15-115, 3081320 in MS15-121, and 3101246 in MS15-122. This is an informational change only. Customers who have already successfully installed the update do not need to take any action. - Originally posted: November 10, 2015 - Updated: April 7, 2016 - Bulletin Severity Rating: Critical - Version: 2.1 MS15-121 - Title: Security Update for Schannel to Address Spoofing (3081320) - https://technet.microsoft.com/library/security/ms15-121.aspx - Reason for Revision: V1.1 (April 7, 2016): Updated the footnotes following the Affected Software table to further clarify installation order for security update 3101746 in MS15-115, 3081320 in MS15-121, and 3101246 in MS15-122. This is an informational change only. Customers who have already successfully installed the update do not need to take any action. - Originally posted: November 10, 2015 - Updated: April 7, 2016 - Bulletin Severity Rating: Important - Version: 1.1 MS15-122 - Title: Security Update for Kerberos to Address Security Feature Bypass (3105256) - https://technet.microsoft.com/library/security/ms15-122.aspx - Reason for Revision: V1.2 (April 7, 2016): Updated the footnotes following the Affected Software and Vulnerability Severity Ratings table to further clarify installation order for security update 3101746 in MS15-115, 3081320 in MS15-121, and 3101246 in MS15-122. This is an informational change only. Customers who have already successfully installed the update do not need to take any action. - Originally posted: November 10, 2015 - Updated: April 7, 2016 - Bulletin Severity Rating: Important - Version: 1.2 MS16-027 - Title: Security Update for Windows Media to Address Remote Code Execution (3143146) - https://technet.microsoft.com/library/security/ms16-027.aspx - Reason for Revision: V1.2 (April 7, 2016): Added a note to clarify that Windows Media is only enabled on Windows server operating systems when the Desktop Experience feature is enabled. This is an informational change only. - Originally posted: March 8, 2016 - Updated: April 7, 2016 - Bulletin Severity Rating: Critical - Version: 1.2 Other Information ================= Recognize and avoid fraudulent email to Microsoft customers: ============================================================= If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email. The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at . ******************************************************************** THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ******************************************************************** Microsoft respects your privacy. Please read our online Privacy Statement at . If you would prefer not to receive future technical security notification alerts by email from Microsoft and its family of companies please visit the following website to unsubscribe: . These settings will not affect any newsletters you’ve requested or any mandatory service communications that are considered part of certain Microsoft services. For legal Information, see: . This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052 -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) Charset: utf-8 wsFVAwUBVwa5zPMcys+fLOcHAQgaKhAAmvZY5IcMjZUjFEiA9670qUmkTdAdAXFs FCKl7og0ywzBhwkc+ywnaUPGVRVN+ZCjsKMyHp8OUdblrkD4J8Lmr0wTpwrNdKKB Z3VGaP8Bcazif98B5SxGf1sAWJddHcL7ZPDr3A1CiC0kyqNPdD7mo5ca4/SCSeAf EpcmdXy1SOebCVGafixds0bx4CyF8NJ7grWvpHP+D7ZzHHdFW2jX7/91m0bf2tgr qiZrUB8JWAuyc/UsNzPpXAWCsYLICfwmjoKEKtOqgk85R1U4y3WKrbTdQRhyXae5 urZCS7sD7S9vMAXm26/1+HRz6rt9CdEZwqwJiZ85hVIy3Oa9zmE1ZPUojQMRkJIk d8776fq+vLaUBC/XORoUVsA36y9xzmkyVwEIB8IknIwlGYyQxM9i926mqi+WORiZ AmrIw91bXUfjYTcjDbnLFC7Idk6MXetmtCTD6LYMMUKZGXR0KuYx6Ram8kC/yL7c v+Z8xMkZsvhQzZWN6do7etPgXuCHn4b8ikdfAdUx/v3LbNlVi9IzWwLzy7tVnD9b bhEdOK4uO49kNOPzvpsVTfiCoYkklg0dbVTq45nGNNRgPLPcOcKyROuR+9vU4K77 Cmvt8byxd+zH1xN3rS858eImbTQIlUW6gzu2xkyn53CvsAAOi0GCq/wz8zs4Tct+ ZEh5GiONOZg= =nV0e -----END PGP SIGNATURE-----