MS Sec Notification mailing list archives

Microsoft Security Bulletin Minor Revisions


From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Wed, 27 Jul 2011 16:31:22 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


********************************************************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: July 27, 2011
********************************************************************

Summary
=======
The following bulletins have undergone a minor revision increment. 
Please see the appropriate bulletin for more details.

  * MS11-027 - Critical
  * MS09-035 - Moderate

Bulletin Information:
=====================

* MS11-027 - Critical

  - http://www.microsoft.com/technet/security/bulletin/ms11-027.mspx
  - Reason for Revision: V1.1 (July 27, 2011): Added class
    identifiers for the Microsoft WMITools ActiveX Control
    described in this bulletin's vulnerability section for
    CVE-2010-3973. This is an informational change only.
    Customers who have already applied the "Prevent COM objects
    from running in Internet Explorer" workaround for this
    vulnerability should reapply this workaround with the
    additional class identifiers.  
  - Originally posted: April 12, 2011
  - Updated: July 27, 2011
  - Bulletin Severity Rating: Critical
  - Version: 1.1
    
* MS09-035 - Moderate

  - http://www.microsoft.com/technet/security/bulletin/ms09-035.mspx
  - Reason for Revision: V3.1 (July 27, 2011): Corrected the update
    verification information for Microsoft Visual C++ 2005
    Service Pack 1 Redistributable Package, Microsoft Visual C++
    2008 Redistributable Package, and Microsoft Visual C++ 2008
    Service Pack 1 Redistributable Package. Removed the registry
    key information in favor of product codes. This is an
    informational change only.  
  - Originally posted: July 28, 2009
  - Updated: July 27, 2011
  - Bulletin Severity Rating: Moderate
  - Version: 3.1
        

Other Information
=================

Follow us on Twitter for the latest information and updates:
http://twitter.com/msftsecresponse 

Recognize and avoid fraudulent e-mail to Microsoft customers:
=============================================================
If you receive an e-mail message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious Web sites. Microsoft does
not distribute security updates via e-mail.

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, it is not required to read
security notifications, security bulletins, security advisories, or
install security updates. You can obtain the MSRC public PGP key at
https://www.microsoft.com/technet/security/bulletin/pgp.mspx.

To receive automatic notifications whenever Microsoft Security 
Bulletins and Microsoft Security Advisories are issued or revised,
subscribe to Microsoft Technical Security Notifications on
http://www.microsoft.com/technet/security/bulletin/notify.mspx.


********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

To cancel your subscription to this newsletter, reply to this 
message with the word UNSUBSCRIBE in the Subject line.  

To set your contact preferences for this and other Microsoft 
communications, see the communications preferences section of the 
Microsoft Privacy Statement at:
<http://go.microsoft.com/fwlink/?LinkId=92781>.

For the complete Microsoft Online Privacy Statement, see:
<http://go.microsoft.com/fwlink/?LinkId=81184>.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 9.9.0 (Build 397)
Charset: utf-8
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=Nkv2
-----END PGP SIGNATURE-----


Current thread: