Microsoft Security Bulletin Summary for May 2016

Fabricante: Microsoft
Fecha: 10/05/2016
Microsoft Security Bulletin Summary for May 2016
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ******************************************************************** Microsoft Security Bulletin Summary for May 2016 Issued: May 10, 2016 ******************************************************************** This bulletin summary lists security bulletins released for May 2016. The full version of the Microsoft Security Bulletin Summary for May 2016 can be found at . Critical Security Bulletins ============================ MS16-051 - Affected Software: - Windows Vista Service Pack 2: - Internet Explorer 9 - Windows Vista x64 Edition Service Pack 2: - Internet Explorer 9 - Windows Server 2008 for 32-bit Systems Service Pack 2: - Internet Explorer 9 (Windows Server 2008 Server Core installation not affected) - Windows Server 2008 for x64-based Systems Service Pack 2: - Internet Explorer 9 (Windows Server 2008 Server Core installation not affected) - Windows 7 for 32-bit Systems Service Pack 1: - Internet Explorer 11 - Windows 7 for x64-based Systems Service Pack 1: - Internet Explorer 11 - Windows Server 2008 R2 for x64-based Systems Service Pack 1: - Internet Explorer 11 (Windows Server 2008 R2 Server Core installation not affected) - Windows 8.1 for 32-bit Systems: - Internet Explorer 11 - Windows 8.1 for x64-based Systems: - Internet Explorer 11 - Windows Server 2012: - Internet Explorer 10 (Windows Server 2012 Server Core installation not affected) - Windows Server 2012 R2: - Internet Explorer 11 (Windows Server 2012 R2 Server Core installation not affected) - Windows RT 8.1: - Internet Explorer 11 - Windows 10 for 32-bit Systems: - Internet Explorer 11 - Windows 10 for x64-based Systems: - Internet Explorer 11 - Windows 10 Version 1511 for 32-bit Systems: - Internet Explorer 11 - Windows 10 Version 1511 for x64-based Systems: - Internet Explorer 11 - Impact: Remote Code Execution - Version Number: 1.0 MS16-052 - Affected Software: - Windows 10 for 32-bit Systems - Microsoft Edge - Windows 10 for x64-based Systems - Microsoft Edge - Windows 10 Version 1511 for 32-bit Systems - Microsoft Edge - Windows 10 Version 1511 for x64-based Systems - Microsoft Edge - Impact: Remote Code Execution - Version Number: 1.0 MS16-053 - Affected Software: - Windows Vista Service Pack 2 - VBScript 5.7 - Windows Vista x64 Edition Service Pack 2 - VBScript 5.7 - Windows Server 2008 for 32-bit Systems Service Pack 2 - VBScript 5.7 (Windows Server 2008 Server Core installation affected) - Windows Server 2008 for x64-based Systems Service Pack 2 - VBScript 5.7 (Windows Server 2008 Server Core installation affected) - Windows Server 2008 for Itanium-based Systems Service Pack 2 - VBScript 5.7 - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation only) - JScript 5.8 and VBScript 5.8 - Impact: Remote Code Execution - Version Number: 1.0 MS16-054 - Affected Software: - Microsoft Office 2007 Service Pack 3 - Microsoft Word 2007 Service Pack 3 - Microsoft Office 2010 Service Pack 2 (32-bit editions) - Microsoft Office 2010 Service Pack 2 (64-bit editions) - Microsoft Word 2010 Service Pack 2 (32-bit editions) - Microsoft Word 2010 Service Pack 2 (64-bit editions) - Microsoft Office 2013 Service Pack 1 (32-bit editions) - Microsoft Office 2013 Service Pack 1 (64-bit editions) - Microsoft Word 2013 Service Pack 1 (32-bit editions) - Microsoft Word 2013 Service Pack 1 (64-bit editions) - Microsoft Word 2013 RT Service Pack 1 - Microsoft Office 2016 (32-bit editions) - Microsoft Office 2016 (64-bit editions) - Microsoft Word 2016 (32-bit edition) - Microsoft Word 2016 (64-bit edition) - Microsoft Word for Mac 2011 - Microsoft Word 2016 for Mac - Microsoft Office Compatibility Pack Service Pack 3 - Microsoft Word Viewer - Word Automation Services on Microsoft SharePoint Server 2010 Service Pack 2 - Microsoft Office Web Apps 2010 Service Pack 2 - Impact: Remote Code Execution - Version Number: 1.0 MS16-055 - Affected Software: - Windows Vista Service Pack 2 - Windows Vista x64 Edition Service Pack 2 - Windows Server 2008 for 32-bit Systems Service Pack 2 (Windows Server 2008 Server Core installation affected) - Windows Server 2008 for x64-based Systems Service Pack 2 (Windows Server 2008 Server Core installation affected) - Windows Server 2008 for Itanium-based Systems Service Pack 2 - Windows 7 for 32-bit Systems Service Pack 1 - Windows 7 for x64-based Systems Service Pack 1 - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Windows Server 2008 R2 Server Core installation affected) - Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 - Windows 8.1 for 32-bit Systems - Windows 8.1 for x64-based Systems - Windows Server 2012 (Windows Server 2012 Server Core installation affected) - Windows Server 2012 R2 (Windows Server 2012 R2 Server Core installation affected) - Windows RT 8.1 - Windows 10 for 32-bit Systems - Windows 10 for x64-based Systems - Windows 10 Version 1511 for 32-bit Systems - Windows 10 Version 1511 for x64-based Systems - Impact: Remote Code Execution - Version Number: 1.0 MS16-056 - Affected Software: - Windows Vista Service Pack 2 - Windows Vista x64 Edition Service Pack 2 - Windows 7 for 32-bit Systems Service Pack 1 - Windows 7 for x64-based Systems Service Pack 1 - Windows 8.1 for 32-bit Systems - Windows 8.1 for x64-based Systems - Windows RT 8.1 - Windows 10 for 32-bit Systems - Windows 10 for x64-based Systems - Windows 10 Version 1511 for 32-bit Systems - Windows 10 Version 1511 for x64-based Systems - Impact: Remote Code Execution - Version Number: 1.0 MS16-057 - Affected Software: - Windows 8.1 for 32-bit Systems - Windows 8.1 for x64-based Systems - Windows RT 8.1 - Windows Server 2012 R2 (Windows Server 2012 R2 Server Core installation not affected) - Windows 10 for 32-bit Systems - Windows 10 for x64-based Systems - Windows 10 Version 1511 for 32-bit Systems - Windows 10 Version 1511 for x64-based Systems - Impact: Remote Code Execution - Version Number: 1.0 MS16-064 - Affected Software: - Windows 8.1 for 32-bit Systems - Windows 8.1 for x64-based Systems - Windows Server 2012 (Windows Server 2012 Server Core installation not affected) - Windows Server 2012 R2 (Windows Server 2012 R2 Server Core installation not affected) - Windows RT 8.1 - Windows 10 for 32-bit Systems - Windows 10 for x64-based Systems - Windows 10 Version 1511 for 32-bit Systems - Windows 10 Version 1511 for x64-based Systems - Impact: Remote Code Execution - Version Number: 1.0 Important Security Bulletins ============================ MS16-058 - Affected Software: - Windows Vista Service Pack 2 - Windows Vista x64 Edition Service Pack 2 - Windows Server 2008 for 32-bit Systems Service Pack 2 (Windows Server 2008 Server Core installation affected) - Windows Server 2008 for x64-based Systems Service Pack 2 (Windows Server 2008 Server Core installation affected) - Windows Server 2008 for Itanium-based Systems Service Pack 2 - Impact: Remote Code Execution - Version Number: 1.0 MS16-059 - Affected Software: - Windows Vista Service Pack 2 - Windows Vista x64 Edition Service Pack 2 - Windows 7 for 32-bit Systems Service Pack 1 - Windows 7 for x64-based Systems Service Pack 1 - Windows 8.1 for 32-bit Systems - Windows 8.1 for x64-based Systems - Impact: Remote Code Execution - Version Number: 1.0 MS16-060 - Affected Software: - Windows Vista Service Pack 2 - Windows Vista x64 Edition Service Pack 2 - Windows Server 2008 for 32-bit Systems Service Pack 2 (Windows Server 2008 Server Core installation affected) - Windows Server 2008 for x64-based Systems Service Pack 2 (Windows Server 2008 Server Core installation affected) - Windows Server 2008 for Itanium-based Systems Service Pack 2 - Windows 7 for 32-bit Systems Service Pack 1 - Windows 7 for x64-based Systems Service Pack 1 - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Windows Server 2008 R2 Server Core installation affected) - Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 - Windows 8.1 for 32-bit Systems - Windows 8.1 for x64-based Systems - Windows Server 2012 (Windows Server 2012 Server Core installation affected) - Windows Server 2012 R2 (Windows Server 2012 R2 Server Core installation affected) - Windows RT 8.1 - Windows 10 for 32-bit Systems - Windows 10 for x64-based Systems - Windows 10 Version 1511 for 32-bit Systems - Windows 10 Version 1511 for x64-based Systems - Impact: Elevation of Privilege - Version Number: 1.0 MS16-061 - Affected Software: - Windows Vista Service Pack 2 - Windows Vista x64 Edition Service Pack 2 - Windows Server 2008 for 32-bit Systems Service Pack 2 (Windows Server 2008 Server Core installation affected) - Windows Server 2008 for x64-based Systems Service Pack 2 (Windows Server 2008 Server Core installation affected) - Windows Server 2008 for Itanium-based Systems Service Pack 2 - Windows 7 for 32-bit Systems Service Pack 1 - Windows 7 for x64-based Systems Service Pack 1 - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Windows Server 2008 R2 Server Core installation affected) - Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 - Windows 8.1 for 32-bit Systems - Windows 8.1 for x64-based Systems - Windows Server 2012 (Windows Server 2012 Server Core installation affected) - Windows Server 2012 R2 (Windows Server 2012 R2 Server Core installation affected) - Windows RT 8.1 - Windows 10 for 32-bit Systems - Windows 10 for x64-based Systems - Windows 10 Version 1511 for 32-bit Systems - Windows 10 Version 1511 for x64-based Systems - Impact: Elevation of Privilege - Version Number: 1.0 MS16-062 - Affected Software: - Windows Vista Service Pack 2 - Windows Vista x64 Edition Service Pack 2 - Windows Server 2008 for 32-bit Systems Service Pack 2 (Windows Server 2008 Server Core installation affected) - Windows Server 2008 for x64-based Systems Service Pack 2 (Windows Server 2008 Server Core installation affected) - Windows Server 2008 for Itanium-based Systems Service Pack 2 - Windows 7 for 32-bit Systems Service Pack 1 - Windows 7 for x64-based Systems Service Pack 1 - Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Windows Server 2008 R2 Server Core installation affected) - Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 - Windows 8.1 for 32-bit Systems - Windows 8.1 for x64-based Systems - Windows Server 2012 (Windows Server 2012 Server Core installation affected) - Windows Server 2012 R2 (Windows Server 2012 R2 Server Core installation affected) - Windows RT 8.1 - Windows 10 for 32-bit Systems - Windows 10 for x64-based Systems - Windows 10 Version 1511 for 32-bit Systems - Windows 10 Version 1511 for x64-based Systems - Impact: Elevation of Privilege - Version Number: 1.0 MS16-065 - Affected Software: - Windows Vista Service Pack 2: - Microsoft .NET Framework 2.0 Service Pack 2 - Microsoft .NET Framework 4.5.2 - Microsoft .NET Framework 4.6 - Windows Vista x64 Edition Service Pack 2: - Microsoft .NET Framework 2.0 Service Pack 2 - Microsoft .NET Framework 4.5.2 - Microsoft .NET Framework 4.6 - Windows Server 2008 for 32-bit Systems Service Pack 2: - Microsoft .NET Framework 2.0 Service Pack 2 - Microsoft .NET Framework 4.5.2 - Microsoft .NET Framework 4.6 (Windows Server 2008 Server Core installation not affected) - Windows Server 2008 for x64-based Systems Service Pack 2: - Microsoft .NET Framework 2.0 Service Pack 2 - Microsoft .NET Framework 4.5.2 - Microsoft .NET Framework 4.6 (Windows Server 2008 Server Core installation not affected) - Windows Server 2008 for Itanium-based Systems Service Pack 2: - Microsoft .NET Framework 2.0 Service Pack 2 - Windows 7 for 32-bit Systems Service Pack 1: - Microsoft .NET Framework 3.5.1 - Microsoft .NET Framework 4.5.2 - Microsoft .NET Framework 4.6/4.6.1 - Windows 7 for x64-based Systems Service Pack 1: - Microsoft .NET Framework 3.5.1 - Microsoft .NET Framework 4.5.2 - Microsoft .NET Framework 4.6/4.6.1 - Windows Server 2008 R2 for x64-based Systems Service Pack 1: - Microsoft .NET Framework 3.5.1 - Microsoft .NET Framework 4.5.2 - Microsoft .NET Framework 4.6/4.6.1 (Windows Server 2008 R2 Server Core installation affected) - Windows Server 2008 R2 for Itanium-based Systems Service Pack 1: - Microsoft .NET Framework 3.5.1 - Windows 8.1 for 32-bit Systems: - Microsoft .NET Framework 3.5 - Microsoft .NET Framework 4.5.2 - Microsoft .NET Framework 4.6/4.6.1 - Windows 8.1 for x64-based Systems: - Microsoft .NET Framework 3.5 - Microsoft .NET Framework 4.5.2 - Microsoft .NET Framework 4.6/4.6.1 - Windows Server 2012: - Microsoft .NET Framework 3.5 - Microsoft .NET Framework 4.5.2 - Microsoft .NET Framework 4.6/4.6.1 (Windows Server 2012 Server Core installation affected) - Windows Server 2012 R2: - Microsoft .NET Framework 3.5 - Microsoft .NET Framework 4.5.2 - Microsoft .NET Framework 4.6/4.6.1 (Windows Server 2012 R2 Server Core installation affected) - Windows RT 8.1: - Microsoft .NET Framework 4.5.2 - Microsoft .NET Framework 4.6/4.6.1 - Windows 10 for 32-bit Systems: - Microsoft .NET Framework 3.5 - Microsoft .NET Framework 4.6 - Windows 10 for x64-based Systems: - Microsoft .NET Framework 3.5 - Microsoft .NET Framework 4.6 - Windows 10 Version 1511 for 32-bit Systems: - Microsoft .NET Framework 3.5 - Microsoft .NET Framework 4.6.1 - Windows 10 Version 1511 for x64-based Systems: - Microsoft .NET Framework 3.5 - Microsoft .NET Framework 4.6.1 - Impact: Information Disclosure - Version Number: 1.0 MS16-066 - Affected Software: - Windows 10 for 32-bit Systems - Windows 10 for x64-based Systems - Windows 10 Version 1511 for 32-bit Systems - Windows 10 Version 1511 for x64-based Systems - Impact: Security Feature Bypass - Version Number: 1.0 MS16-067 - Affected Software: - Windows 8.1 for 32-bit Systems - Windows 8.1 for x64-based Systems - Windows Server 2012 (Windows Server 2012 Server Core installation affected) - Windows Server 2012 R2 (Windows Server 2012 R2 Server Core installation affected) - Windows RT 8.1 - Impact: Information Disclosure - Version Number: 1.0 Other Information ================= Recognize and avoid fraudulent email to Microsoft customers: ============================================================= If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email. The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at . ******************************************************************** THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ******************************************************************** Microsoft respects your privacy. Please read our online Privacy Statement at . If you would prefer not to receive future technical security notification alerts by email from Microsoft and its family of companies please visit the following website to unsubscribe: . These settings will not affect any newsletters you've requested or any mandatory service communications that are considered part of certain Microsoft services. For legal Information, see: . This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052 -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) Charset: utf-8 wsFVAwUBVzEGy/Mcys+fLOcHAQijcQ/+P7WdvuDtRACjRwf/3okwBCcnwkleJANg SM9qlqilVFqGYsa/XW7MT6GevOmsHwlaaYc5FyHFqXF0TNGLIm6yrNSI1UcvNiAy DCHO3P0wuUWeBpKy88QP2F7ONZoD0ORihIxVYduAPWq6PlqpgfKYWaweO4r6ovP4 zgtnZHVWw0B5PvMnqMnvjvbpYI8qX3Nvso/VXKk0y4+KpsUt74PHsUmY26JwM1Dc hyso4XeoJVPFOwB0glR7lvX0xj3IQMj1QrgI24qcOxG9A1EjhOUdu9RnCKdueqZL uuHarLvm+q2xJ1QjWaMYXRUAjKINmyT/W9aK3QWIG2QIEqrGrj+JvIeNrJefOPBZ Vl2UykecPFe//HZJUnuK/1y29GEJZ9kLIMDQaC0bR6q7MLWrsX8f0g0bBTa6tw3K TH3mVacWeZOAJPLVIZhoHQj+MtyAB5piaq5cLG3NeUGC8gE/xHGGRTGrF2x235Oo HXV145Qh4vBQzH055tmJYQMkQPEea1/tcXRNx2i9FnZulB2C6unQRen7Nm/Z20cs 9RNCgvOY2MGv5gVG7fWbpAMyxInnli6upxfXcvn4RwQG71HTrYg+APXpPodNm2BY Mc3x//y2KH0aOasGJhr+ktm6emllFeXKN7toW0Zi+nJOQipBmRoPYrZceETY/vhP 5vg4Ef+eaZU= =pi5w -----END PGP SIGNATURE-----