Microsoft Security Bulletin Minor Revisions Issued: December 09, 2015

  • 10 December 2015
  • 1 reply
  • 1 view

Userlevel 7
Badge +56
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
********************************************************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: December 09, 2015
********************************************************************
Summary
=======
The following bulletins and/or bulletin summaries have undergone a minor revision increment.
Please see the appropriate bulletin for more details.
* MS15-058 - Important
* MS15-122 - Important
* MS15-131 - Critical
* MS15-NOV
* MS15-DEC
Bulletin Information:
=====================
MS15-058 - Important
- Title: Vulnerabilities in SQL Server Could Allow Remote Code
Execution (3065718)
- https://technet.microsoft.com/library/security/ms15-058.aspx
- Reason for Revision: V1.2 (December 9, 2015): Bulletin revised to
clarify the product version guidance in the Update FAQ section by
aligning it with the guidance provided in earlier releases. This
is an informational change only. Customers who have already
successfully installed the update do not need to take any action.
- Originally posted: July 14, 2015
- Updated: December 09, 2015
- Bulletin Severity Rating: Important
- Version: 1.2
MS15-122 - Important
- Title: Security Update for Kerberos to Address Security Feature
Bypass (3105256)
- https://technet.microsoft.com/library/security/ms15-122.aspx
- Reason for Revision: V1.1 (December 9, 2015): Revised bulletin
to remove all references to the requirement that an attacker have
physical access to the target machine to exploit CVE-2015-6095.
This is an informational change only. Customers who have already
successfully installed the update do not need to take any action.
- Originally posted: November 10, 2015
- Updated: December 09, 2015
- Bulletin Severity Rating: Important
- Version: 1.1
MS15-131 - Critical
- Title: Security Update for Microsoft Office to Address Remote
Code Execution (3116111)
- https://technet.microsoft.com/library/security/ms15-131.aspx
- Reason for Revision: V1.1 (December 9, 2015): Bulletin revised
to correct the Publicly disclosed and Exploited status of
CVE-2015-6124. This is an informational change only. Customers
who have successfully installed the update do not need to take
any further action.
- Originally posted: December 08, 2015
- Updated: December 09, 2015
- Bulletin Severity Rating: Critical
- Version: 1.1
MS15-NOV
- Title: Microsoft Security Bulletin Summary for November 2015
- https://technet.microsoft.com/library/security/ms15-nov.aspx
- Reason for Revision: V2.1 (December 9, 2015): For MS15-122,
revised the Executive Summary to remove reference to the
requirement that an attacker have physical access to the target
machine to exploit CVE-2015-6095. This is an informational
change only. Customers who have already successfully installed
the update do not need to take any action.
- Originally posted: November 10, 2015
- Updated: December 09, 2015
- Version: 2.1
MS15-DEC
- Title: Microsoft Security Bulletin Summary for December 2015
- https://technet.microsoft.com/library/security/ms15-dec.aspx
- Reason for Revision: V1.1 (December 9, 2015): Bulletin Summary
revised to correct the Exploitability Assessment for
CVE-2015-6124. This is an informational change only.
- Originally posted: December 08, 2015
- Updated: December 09, 2015
- Version: 1.1

Other Information
=================
Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email.
 

1 reply

Userlevel 7
Thanks, Daniel, eternal purveyor of glad tidings that are the MS Security Bulletins...;)

Reply