PaulDotCom mailing list archives
Re: Fwd: Microsoft Security Bulletin Minor Revisions
From: Lester Nichols <ln61775 () gmail com>
Date: Wed, 13 Feb 2013 11:53:23 -0500
Well at least they remember to pay their domain registration this yearŠ ;) From: David Oresky <david () oresky net> Reply-To: PaulDotCom Security Weekly Mailing List <pauldotcom () mail pauldotcom com> Date: Wednesday, February 13, 2013 10:08 AM To: PaulDotCom Security Weekly Mailing List <pauldotcom () mail pauldotcom com> Subject: [Pauldotcom] Fwd: Microsoft Security Bulletin Minor Revisions I have been lurking on this list and thought you all would get a kick out of this. Seems someone forgot to pay the bill. I guess keeping up with software licensing is hard for everyone: "This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052 -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) - not licensed for commercial use: www.pgp.com <http://www.pgp.com/> Charset: utf-8" Entire message below: ---------- Forwarded message ---------- From: Microsoft <securitynotifications () e-mail microsoft com> Date: Tue, Feb 12, 2013 at 6:29 PM Subject: Microsoft Security Bulletin Minor Revisions To: David () oresky net -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ******************************************************************** Title: Microsoft Security Bulletin Minor Revisions Issued: February 12, 2013 ******************************************************************** Summary ======= The following bulletins have undergone a minor revision increment. Please see the appropriate bulletin for more details. * MS13-004 * MS13-005 * MS13-006 * MS13-009 * MS13-010 * MS13-016 * MS13-017 * MS13-018 * MS13-feb Bulletin Information: ===================== * MS13-004 - Important - http://technet.microsoft.com/security/bulletin/ms13-004 - Reason for Revision: V2.1 (February 12, 2013): Bulletin revised to announce a detection change in the .NET Framework 1.1 Service Pack 1 update (KB2742597) to correct a Windows Update reoffering issue on certain systems that are running supported editions of Windows Vista or Windows Server 2008. This is a detection change only. Customers who have already successfully updated their systems do not need to take any action. - Originally posted: January 8, 2013 - Updated: February 12, 2013 - Bulletin Severity Rating: Important - Version: 2.1 * MS13-005 - Important - http://technet.microsoft.com/security/bulletin/ms13-005 - Reason for Revision: V1.2 (February 12, 2013): Added a link to Microsoft Knowledge Base Article 2778930 under Known Issues in the Executive Summary. - Originally posted: January 8, 2013 - Updated: February 12, 2013 - Bulletin Severity Rating: Important - Version: 1.2 * MS13-006 - Important - http://technet.microsoft.com/security/bulletin/ms13-006 - Reason for Revision: V1.1 (February 12, 2013): Added a link to Microsoft Knowledge Base Article 2785220 under Known Issues in the Executive Summary. - Originally posted: January 8, 2013 - Updated: February 12, 2013 - Bulletin Severity Rating: Important - Version: 1.1 * MS13-009 - Critical - http://technet.microsoft.com/security/bulletin/ms13-009 - Reason for Revision: V1.1 (February 12, 2013): Added a link to Microsoft Knowledge Base Article 2792100 under Known Issues in the Executive Summary. In addition, corrected the severity ratings for CVE-2013-0022. This is an informational change only. - Originally posted: February 12, 2013 - Updated: February 12, 2013 - Bulletin Severity Rating: Critical - Version: 1.1 * MS13-010 - Critical - http://technet.microsoft.com/security/bulletin/ms13-010 - Reason for Revision: V1.1 (February 12, 2013): Added a link to Microsoft Knowledge Base Article 2797052 under Known Issues in the Executive Summary. In addition, corrected the FAQ entry for Internet Explorer 10 Release Preview for Windows 7 and Windows Server 2008 R2. - Originally posted: February 12, 2013 - Updated: February 12, 2013 - Bulletin Severity Rating: Critical - Version: 1.1 * MS13-016 - Important - http://technet.microsoft.com/security/bulletin/ms13-016 - Reason for Revision: V1.1 (February 12, 2013): Added a link to Microsoft Knowledge Base Article 2778344 under Known Issues in the Executive Summary. - Originally posted: February 12, 2013 - Updated: February 12, 2013 - Bulletin Severity Rating: Important - Version: 1.1 * MS13-017 - Important - http://technet.microsoft.com/security/bulletin/ms13-017 - Reason for Revision: V1.1 (February 12, 2013): Added a link to Microsoft Knowledge Base Article 2799494 under Known Issues in the Executive Summary. - Originally posted: February 12, 2013 - Updated: February 12, 2013 - Bulletin Severity Rating: Important - Version: 1.1 * MS13-018 - Important - http://technet.microsoft.com/security/bulletin/ms13-018 - Reason for Revision: V1.1 (February 12, 2013): Added a link to Microsoft Knowledge Base Article 2790655 under Known Issues in the Executive Summary. - Originally posted: February 12, 2013 - Updated: February 12, 2013 - Bulletin Severity Rating: Important - Version: 1.1 * MS13-feb - http://technet.microsoft.com/security/bulletin/ms13-feb - Reason for Revision: V1.1 (February 12, 2013): For MS13-009, corrected the Exploitability Assessment for Latest Software Release in the Exploitability Index for CVE-2013-0022. - Originally posted: February 12, 2013 - Updated: February 12, 2013 - Version: 1.1 Other Information ================= Follow us on Twitter for the latest information and updates: http://twitter.com/msftsecresponse Recognize and avoid fraudulent email to Microsoft customers: ============================================================= If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email. The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, it is not required to read security notifications, security bulletins, security advisories, or install security updates. You can obtain the MSRC public PGP key at https://technet.microsoft.com/security/bulletin/pgp. To receive automatic notifications whenever Microsoft Security Bulletins and Microsoft Security Advisories are issued or revised, subscribe to Microsoft Technical Security Notifications on http://technet.microsoft.com/security/dd252948. ******************************************************************** THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ******************************************************************** To manage or cancel your subscription to this newsletter, visit the Microsoft.com Profile Center at <http://go.microsoft.com/fwlink/?LinkId=245953> and then click Manage Communications under My Subscriptions in the Quicklinks section. For more information, see the Communications Preferences section of the Microsoft Online Privacy Statement at: <http://go.microsoft.com/fwlink/?LinkId=92781>. For the complete Microsoft Online Privacy Statement, see: <http://go.microsoft.com/fwlink/?LinkId=81184>. For legal Information, see: <http://www.microsoft.com/info/legalinfo/default.mspx>. This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052 -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) - not licensed for commercial use: www.pgp.com <http://www.pgp.com/> Charset: utf-8 wsFVAwUBURrJjhWqSyu+jsPhAQg7oBAA1Ozg7bdb89MSSBvnYC3Wn0RxlsbqWm9I IfW+oLei+yg6KflL2zVO6L2g78d6jat8wKumec8MM/34PEx67ZtnjIzI28fvZwWP m+tucL+xJMXM9f/JLxU2nckIQ/7qCkf5hlnVgS1vWJPbyHLAKikx7/d4QemAiXGG tOWrHcMjQB4Hjl7V/2KQGrKea44X3zdqAtB9ls+9rxuG8YD2Rsw2yPeCG5sHeCyo xA44nMSultPxXikqJbWeHWmN0a7GEoXGsxgdkX52d3Bfe/y6YFJq+qbdyxleo8RT YYDieTu7oELpyri7+Eufz2x0e3UtRlewq9/vRdvx5CD0ij20j3T8oPzFaC0sp04E oVx0xw9KG7U1gWNZ1MB+Y4QhDCAW2OVbysQk6y06GDmskE5Ci+KZ4j2YTzmzf7Xd GZjoWlD0n9tgyD7r8cEv5I17gJ/uejc05OnqQYQQjAdjsEnYleDWpHK2WYVBcFZG be856flPjta+e5f9lWBN4sZFTCHwxEuKCYgqF3QAnlLmMfglzNo3KxOwY1Z5h4H/ Cr8D1En4KdxdJelymI6eOdswAs0yaU8ErKZ9YPcmyMRiYp6zpM+35gzH0rzMF8it RNes6MEhlHoRH3UdyvmIACT5apYPcgS7cp5v5Av18YtjBetsi3Xb4eCTd/KF5QPO 6o+7DuYg8oY= =GRI3 -----END PGP SIGNATURE----- _______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
_______________________________________________ Pauldotcom mailing list Pauldotcom () mail pauldotcom com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
Current thread:
- Fwd: Microsoft Security Bulletin Minor Revisions David Oresky (Feb 13)
- Re: Fwd: Microsoft Security Bulletin Minor Revisions Lester Nichols (Feb 13)
- Re: Fwd: Microsoft Security Bulletin Minor Revisions Arch Angel (Feb 13)
- Re: Fwd: Microsoft Security Bulletin Minor Revisions Alex Kornilov (Feb 13)
- Re: Fwd: Microsoft Security Bulletin Minor Revisions Steven Perez (Feb 14)