MS Sec Notification mailing list archives

Microsoft Security Bulletin Minor Revisions


From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Fri, 28 Feb 2014 12:06:39 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: February 28, 2014
********************************************************************

Summary
=======
The following bulletins have undergone minor revision increments. 
Please see the bulletins for more details.
  
 * MS13-090
 * MS13-095
 * MS13-098
 * MS14-005
 * MS14-007
 * MS14-009


Bulletin Information:
=====================

* MS13-090 - Critical

  - https://technet.microsoft.com/security/bulletin/MS13-090
  - Reason for Revision: V1.1 (February 28, 2014): Bulletin revised 
    to announce a detection change in the 2900986 update for Windows 
    8.1 for 32-bit Systems, Windows 8.1 for x64-based Systems, 
    Windows RT 8.1, and Windows Server 2012 R2. This is a detection
    change only. There were no changes to the update files. Customers
    who have already successfully updated their systems do not need 
    to take any action.
  - Originally posted: November 12, 2013   
  - Updated: February 28, 2014  
  - Bulletin Severity Rating: Critical
  - Version: 1.1

* MS13-095 - Important

  - https://technet.microsoft.com/security/bulletin/MS13-095
  - Reason for Revision: V1.1 (February 28, 2014): Bulletin revised 
    to announce a detection change in the 2868626 update for Windows 
    8.1 for 32-bit Systems, Windows 8.1 for x64-based Systems, 
    Windows RT 8.1, and Windows Server 2012 R2. This is a detection
    change only. There were no changes to the update files. Customers
    who have already successfully updated their systems do not need 
    to take any action.
  - Originally posted: November 12, 2013   
  - Updated: February 28, 2014  
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS13-098 - Critical

  - https://technet.microsoft.com/security/bulletin/MS13-098
  - Reason for Revision: V1.3 (February 28, 2014): Bulletin revised 
    to announce a detection change in the 2893294 update for Windows 
    8.1 for 32-bit Systems, Windows 8.1 for x64-based Systems, 
    Windows RT 8.1, and Windows Server 2012 R2. This is a detection
    change only. There were no changes to the update files. Customers
    who have already successfully updated their systems do not need 
    to take any action.
  - Originally posted: December 10, 2013   
  - Updated: February 28, 2014  
  - Bulletin Severity Rating: Critical
  - Version: 1.3

* MS14-005 - Important

  - https://technet.microsoft.com/security/bulletin/MS14-005
  - Reason for Revision: V1.1 (February 28, 2014): Bulletin revised 
    to announce a detection change in the 2916036 update for Windows 
    8.1 for 32-bit Systems,  Windows 8.1 for x64-based Systems, 
    Windows Server 2012 R2, and Windows RT 8.1. This is a detection 
    change only. There were no changes to the update files. Customers
    who have already successfully updated their systems do not need 
    to take any action.
  - Originally posted: February 11, 2014   
  - Updated: February 28, 2014  
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS14-007 - Critical

  - https://technet.microsoft.com/security/bulletin/MS14-007
  - Reason for Revision: V1.1 (February 28, 2014): Bulletin revised 
    to announce a detection change in the 2912390 update for Windows 
    8.1 for 32-bit Systems, Windows 8.1 for x64-based Systems, 
    Windows RT 8.1, and Windows Server 2012 R2. This is a detection
    change only. There were no changes to the update files. Customers
    who have already successfully updated their systems do not need 
    to take any action.
  - Originally posted: February 11, 2014  
  - Updated: February 28, 2014  
  - Bulletin Severity Rating: Critical
  - Version: 1.1

* MS14-009 - Important

  - https://technet.microsoft.com/security/bulletin/MS14-009
  - Reason for Revision: V1.1 (February 28, 2014): Bulletin revised
    to announce a detection change in the 2901128 update for Microsoft
    .NET Framework 4.5.1 on Windows 8.1 for 32-bit Systems, Microsoft
    .NET Framework 4.5.1 on Windows 8.1 for x64-based Systems, 
    Microsoft .NET Framework 4.5.1 on Windows Server 2012 R2, and 
    Microsoft .NET Framework 4.5.1 on Windows RT 8.1. This is a 
    detection change only. There were no changes to the update files.
    Customers who have already successfully updated their systems do 
    not need to take any action.
  - Originally posted: February 11, 2014  
  - Updated: February 28, 2014  
  - Bulletin Severity Rating: Important
  - Version: 1.1

Other Information
=================

Follow us on Twitter for the latest information and updates:
http://twitter.com/msftsecresponse 

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, it is not required to read
security notifications, security bulletins, security advisories, or
install security updates. You can obtain the MSRC public PGP key at
https://technet.microsoft.com/security/bulletin/pgp.

To receive automatic notifications whenever Microsoft Security 
Bulletins and Microsoft Security Advisories are issued or revised,
subscribe to Microsoft Technical Security Notifications on
http://technet.microsoft.com/security/dd252948.


********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

To manage or cancel your subscription to this newsletter,
visit the Microsoft.com Profile Center at
<http://go.microsoft.com/fwlink/?LinkId=245953> and then
click Manage Communications under My Subscriptions in the 
Quicklinks section.

For more information, see the Communications Preferences section
of the Microsoft Online Privacy Statement at:
<http://go.microsoft.com/fwlink/?LinkId=92781>.

For the complete Microsoft Online Privacy Statement, see:
<http://go.microsoft.com/fwlink/?LinkId=81184>.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052



-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8
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=dBdx
-----END PGP SIGNATURE-----


Current thread: