Microsoft Security Bulletin Summary for February 2017

  • 22 February 2017
  • 1 reply
  • 379 views

Userlevel 7
Badge +54
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
 
********************************************************************
Microsoft Security Bulletin Summary for February 2017
Issued: February 21, 2017
********************************************************************
 
This bulletin summary lists security bulletins released for February 2017.
 
The full version of the Microsoft Security Bulletin Summary for February 2017 can be found at <https://technet.microsoft.com/library/security/ms17-feb>.
 
Critical Security Bulletins
============================
 
MS17-005
 
- - Affected Software:
    - Windows 8.1 for 32-bit Systems:
      - Adobe Flash Player
    - Windows 8.1 for x64-based Systems:
      - Adobe Flash Player
    - Windows Server 2012:
      - Adobe Flash Player
      (Windows Server 2012 Server Core installation not affected)
    - Windows Server 2012 R2:
      - Adobe Flash Player
      (Windows Server 2012 R2 Server Core installation not affected)
    - Windows RT 8.1:
      - Adobe Flash Player
    - Windows 10 for 32-bit Systems:
      - Adobe Flash Player
    - Windows 10 for x64-based Systems:
      - Adobe Flash Player
    - Windows 10 Version 1511 for 32-bit Systems:
      - Adobe Flash Player
    - Windows 10 Version 1511 for x64-based Systems:
      - Adobe Flash Player
    - Windows 10 Version 1607 for 32-bit Systems
      - Adobe Flash Player
    - Windows 10 Version 1607 for x64-based Systems
      - Adobe Flash Player
    - Windows Server 2016 for x64-based Systems
      - Adobe Flash Player
      (Windows Server 2016 Server Core installation not affected)
  - Impact: Remote Code Execution
  - Version Number: 1.0
 
 
Other Information
=================
 
Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email.
 
The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at <https://technet.microsoft.com/security/dn753714>.
 
 
-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8
 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=wD0q
-----END PGP SIGNATURE-----
 
 

1 reply

Userlevel 7
Badge +56
Thanks Jeff!
 
Daniel

Reply