Microsoft Security Bulletin Minor Revisions

Fabricante: Microsoft
Fecha: 26/05/2016
Microsoft Security Bulletin Minor Revisions
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ******************************************************************** Title: Microsoft Security Bulletin Minor Revisions Issued: May 25, 2016 ******************************************************************** Summary ======= The following bulletins and/or bulletin summaries have undergone a minor revision increment. Please see the appropriate bulletin for more details. * MS15-JUL * MS16-MAY * MS15-126 - Critical * MS15-134 - Important * MS16-003 - Critical * MS16-054 - Critical Bulletin Information: ===================== MS15-JUL - Title: Microsoft Security Bulletin Summary for July 2015 - https://technet.microsoft.com/library/security/ms15-jul.aspx - Reason for Revision: V3.1 (May 25, 2016): For MS15-076, added a Known Issues reference to the Executive Summaries table. For more information, see Microsoft Knowledge Base Article 3067505. For information about the solution for this Known Issue, see Microsoft Knowledge Base Article 3155218. - Originally posted: July 14, 2015 - Updated: May 25, 2016 - Bulletin Severity Rating: Not applicable - Version: 3.1 MS16-MAY - Title: Microsoft Security Bulletin Summary for May 2016 - https://technet.microsoft.com/library/security/ms16-may.aspx - Reason for Revision: V2.1 (May 25, 2016): For MS16-065, added a Known Issue to the Executive Summaries table. After you install any of the security updates that are included in MS16-065 on a Front End or Standard Edition server for Lync Server 2010, Lync Server 2013, or Skype for Business Server 2015, several conferencing modalities no longer function for internal users. For information about the solution for this Known Issue, see Microsoft Knowledge Base Article 3165438. - Originally posted: May 10, 2016 - Updated: May 25, 2016 - Bulletin Severity Rating: Not applicable - Version: 2.1 MS15-126 - Title: Cumulative Security Update for JScript and VBScript to Address Remote Code Execution (3116178) - https://technet.microsoft.com/library/security/ms15-126.aspx - Reason for Revision: V1.1 (May 25, 2016): Removed redundant rows from the Vulnerability Severity Rating and Maximum Security Impact by Affected Software table, and added the applicable update numbers for clarity. This is an informational change only. - Originally posted: December 8, 2015 - Updated: May 25, 2016 - Bulletin Severity Rating: Critical - Version: 1.1 MS15-134 - Title: Security Update for Windows Media Center to Address Remote Code Execution (3108669) - https://technet.microsoft.com/library/security/ms15-134.aspx - Reason for Revision: V1.1 (May 25, 2016): Removed the mitigating factors for CVE-2015-6131 and CVE-2015-6127. These are informational changes only. - Originally posted: December 8, 2015 - Updated: May 25, 2016 - Bulletin Severity Rating: Important - Version: 1.1 MS16-003 - Title: Cumulative Security Update for JScript and VBScript to Address Remote Code Execution (3125540) - https://technet.microsoft.com/library/security/ms16-003.aspx - Reason for Revision: V1.1 (May 25, 2016): Removed redundant rows from the Vulnerability Severity Rating and Maximum Security Impact by Affected Software table, and added the applicable update numbers for clarity. This is an informational change only. - Originally posted: January 12, 2016 - Updated: May 25, 2016 - Bulletin Severity Rating: Critical - Version: 1.1 MS16-054 - Title: Security Update for Microsoft Office (3155544) - https://technet.microsoft.com/library/security/ms16-054.aspx - Reason for Revision: V1.1 (May 25, 2016): Corrected the updates replaced for Microsoft Office 2013 to 3114486 in MS16-004, and for CVE-2016-0183, clarified that the Preview Pane is an attack vector for this vulnerability. These are informational changes only. - Originally posted: May 10, 2016 - Updated: May 25, 2016 - Bulletin Severity Rating: Critical - Version: 1.1 Other Information ================= Recognize and avoid fraudulent email to Microsoft customers: ============================================================= If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email. The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at . ******************************************************************** THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ******************************************************************** Microsoft respects your privacy. Please read our online Privacy Statement at . If you would prefer not to receive future technical security notification alerts by email from Microsoft and its family of companies please visit the following website to unsubscribe: . These settings will not affect any newsletters you’ve requested or any mandatory service communications that are considered part of certain Microsoft services. For legal Information, see: . This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052 -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) Charset: utf-8 wsFVAwUBV0YmHvMcys+fLOcHAQiILg/8C8ytYprX7dHBkt8mN69r/aH1IkHjGtn9 xCusnitV//hXpd7U6rC8rzvU6jTjOW71BPfOmh/ieWugs4m80a9ynyedAbmOE+KS 0yFA+aeqkkpyug4fZIlmjMaQgC2ein39USukBCbj6ZbXrxRknFVmMJMxziMsv1lK 4AlgtkjL7MG2PHxKx3QiWzePps1+xMu8TM1NFoglqoT08WIp3zwqpsje+bhDUhR6 EcLBWsTYtjEFZObchzH4DY+uzy53X9QtqkSvObAKM1XUecfuMxC6daPgE6fyQw6g TwajsaBcymU9lSffWwt5buKOSNcyOc6M0Ne5xApZXJReuhbyP70Ed5YbTbjJ3cnv tI++8lkw/15iW/5nCdZEDFw3/q+hiOdS2IxIwqZydwNlpntE9+XimHOVHhb7b4ZP X8dUSGNcl9jV3yfvDGdD9vDubLGTCeQRMMRCLP7+S+g8YMCkbXGnfZVRjpUYfTZy XIRU+/RmSRQ9Dp++c7pSHzhtmwlnJHUNZCST92pbSQMHqYwnlhVW80itQ+Bs+9Em LV9H4X+N7tyLa44/+i+NmCypKjzyforlXxlEGNDHyf3girDg6c1Sp8fTs7J6a4o4 IDnEzU3S6jV8+NGNuUDsZrTNAY7sv+Cpn8urOzWnNhbsuLisb99aDK6LLRjCVIQb wI/WJQ/o0Ng= =nieu -----END PGP SIGNATURE-----