MS Sec Notification mailing list archives

Microsoft Security Bulletin Minor Revisions


From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Tue, 12 Feb 2013 17:29:57 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: February 12, 2013
********************************************************************

Summary
=======
The following bulletins have undergone a minor revision increment. 
Please see the appropriate bulletin for more details.

  * MS13-004
  * MS13-005
  * MS13-006
  * MS13-009
  * MS13-010
  * MS13-016
  * MS13-017
  * MS13-018
  * MS13-feb

  
Bulletin Information:
=====================

* MS13-004 - Important

  - http://technet.microsoft.com/security/bulletin/ms13-004
  - Reason for Revision: V2.1 (February 12, 2013): Bulletin 
    revised to announce a detection change in the .NET 
    Framework 1.1 Service Pack 1 update (KB2742597) to correct 
    a Windows Update reoffering issue on certain systems that 
    are running supported editions of Windows Vista or Windows 
    Server 2008. This is a detection change only. Customers who 
    have already successfully updated their systems do not need 
    to take any action.
  - Originally posted: January 8, 2013 
  - Updated: February 12, 2013  
  - Bulletin Severity Rating: Important
  - Version: 2.1

* MS13-005 - Important

  - http://technet.microsoft.com/security/bulletin/ms13-005
  - Reason for Revision: V1.2 (February 12, 2013): Added a 
    link to Microsoft Knowledge Base Article 2778930 under 
    Known Issues in the Executive Summary.
  - Originally posted: January 8, 2013 
  - Updated: February 12, 2013  
  - Bulletin Severity Rating: Important
  - Version: 1.2

* MS13-006 - Important

  - http://technet.microsoft.com/security/bulletin/ms13-006
  - Reason for Revision: V1.1 (February 12, 2013): Added a 
    link to Microsoft Knowledge Base Article 2785220 under 
    Known Issues in the Executive Summary.
  - Originally posted: January 8, 2013 
  - Updated: February 12, 2013  
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS13-009 - Critical

  - http://technet.microsoft.com/security/bulletin/ms13-009
  - Reason for Revision: V1.1 (February 12, 2013): Added a 
    link to Microsoft Knowledge Base Article 2792100 under 
    Known Issues in the Executive Summary. In addition, 
    corrected the severity ratings for CVE-2013-0022. This
    is an informational change only. 
  - Originally posted: February 12, 2013 
  - Updated: February 12, 2013  
  - Bulletin Severity Rating: Critical
  - Version: 1.1

* MS13-010 - Critical

  - http://technet.microsoft.com/security/bulletin/ms13-010
  - Reason for Revision: V1.1 (February 12, 2013): Added a 
    link to Microsoft Knowledge Base Article 2797052 under 
    Known Issues in the Executive Summary. In addition, 
    corrected the FAQ entry for Internet Explorer 10 Release 
    Preview for Windows 7 and Windows Server 2008 R2. 
  - Originally posted: February 12, 2013 
  - Updated: February 12, 2013  
  - Bulletin Severity Rating: Critical
  - Version: 1.1

* MS13-016 - Important

  - http://technet.microsoft.com/security/bulletin/ms13-016
  - Reason for Revision: V1.1 (February 12, 2013): Added a 
    link to Microsoft Knowledge Base Article 2778344 under 
    Known Issues in the Executive Summary.
  - Originally posted: February 12, 2013 
  - Updated: February 12, 2013  
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS13-017 - Important

  - http://technet.microsoft.com/security/bulletin/ms13-017
  - Reason for Revision: V1.1 (February 12, 2013): Added a 
    link to Microsoft Knowledge Base Article 2799494 under 
    Known Issues in the Executive Summary.
  - Originally posted: February 12, 2013 
  - Updated: February 12, 2013  
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS13-018 - Important

  - http://technet.microsoft.com/security/bulletin/ms13-018
  - Reason for Revision: V1.1 (February 12, 2013): Added a 
    link to Microsoft Knowledge Base Article 2790655 under 
    Known Issues in the Executive Summary.
  - Originally posted: February 12, 2013 
  - Updated: February 12, 2013  
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS13-feb

  - http://technet.microsoft.com/security/bulletin/ms13-feb
  - Reason for Revision: V1.1 (February 12, 2013): For 
    MS13-009, corrected the Exploitability Assessment for 
    Latest Software Release in the Exploitability Index 
    for CVE-2013-0022.
  - Originally posted: February 12, 2013 
  - Updated: February 12, 2013  
  - Version: 1.1




Other Information
=================

Follow us on Twitter for the latest information and updates:
http://twitter.com/msftsecresponse 

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, it is not required to read
security notifications, security bulletins, security advisories, or
install security updates. You can obtain the MSRC public PGP key at
https://technet.microsoft.com/security/bulletin/pgp.

To receive automatic notifications whenever Microsoft Security 
Bulletins and Microsoft Security Advisories are issued or revised,
subscribe to Microsoft Technical Security Notifications on
http://technet.microsoft.com/security/dd252948.


********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

To manage or cancel your subscription to this newsletter,
visit the Microsoft.com Profile Center at
<http://go.microsoft.com/fwlink/?LinkId=245953> and then
click Manage Communications under My Subscriptions in the 
Quicklinks section.

For more information, see the Communications Preferences section
of the Microsoft Online Privacy Statement at:
<http://go.microsoft.com/fwlink/?LinkId=92781>.

For the complete Microsoft Online Privacy Statement, see:
<http://go.microsoft.com/fwlink/?LinkId=81184>.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950) - not licensed for commercial use: www.pgp.com
Charset: utf-8
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=GRI3
-----END PGP SIGNATURE-----



Current thread: