MS Sec Notification mailing list archives
Microsoft Security Advisory Notification
From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Fri, 28 Feb 2014 12:06:59 -0600
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ******************************************************************** Title: Microsoft Security Advisory Notification Issued: February 28, 2014 ******************************************************************** Security Advisories Updated or Released Today ============================================== * Microsoft Security Advisory (2862152) - Title: Vulnerability in DirectAccess and IPsec Could Allow Security Feature Bypass - https://technet.microsoft.com/security/advisory/2862152 - V1.1 (February 28, 2014): Advisory revised to announce a detection change in the 2862152 update for Windows 8.1 for 32-bit Systems, Windows 8.1 for x64-based Systems, Windows Server 2012 R2, and Windows RT 8.1. This is a detection change only. There were no changes to the update files. Customers who have already successfully updated their systems do not need to take any action. Other Information ================= Follow us on Twitter for the latest information and updates: http://twitter.com/msftsecresponse Recognize and avoid fraudulent email to Microsoft customers: ============================================================= If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email. The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, it is not required to read security notifications, security bulletins, security advisories, or install security updates. You can obtain the MSRC public PGP key at https://technet.microsoft.com/security/bulletin/pgp. To receive automatic notifications whenever Microsoft Security Bulletins and Microsoft Security Advisories are issued or revised, subscribe to Microsoft Technical Security Notifications on http://technet.microsoft.com/security/dd252948. ******************************************************************** THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ******************************************************************** To manage or cancel your subscription to this newsletter, visit the Microsoft.com Profile Center at <http://go.microsoft.com/fwlink/?LinkId=245953> and then click Manage Communications under My Subscriptions in the Quicklinks section. For more information, see the Communications Preferences section of the Microsoft Online Privacy Statement at: <http://go.microsoft.com/fwlink/?LinkId=92781>. For the complete Microsoft Online Privacy Statement, see: <http://go.microsoft.com/fwlink/?LinkId=81184>. For legal Information, see: <http://www.microsoft.com/info/legalinfo/default.mspx>. This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052 -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) Charset: utf-8 wsFVAwUBUw/Kcd9+6n7wt0BtAQjULRAApFNy7h+dz/4uxzkuOby4u4mI/nzDGP+V N+TZUvXRvigSud7Oa4UIIuH/vBCow5TYjp44wcRvOTOdR3q3uKxJHK7znclCQuuz DVg8gUKA9bAiYPzV9JTJVgFqUZhRP0CzOXZlGBzezTpNWOeuUGVEXtdSZ87a2l1A sk2rGiK+R841AJq1NvSWS7dT58Ob1wkJJzoQBl291dofFgQ5biOixNKAW3nwR4TZ lG2/uzN2HsKbJZBCU7j2sqntXX9ibptTMLz2IWn8gpK6diGczecfB6OGE4AVISSG SfZRots/8LUTAwQsXT2+47khUKvPQ2pkZjWQuy/rFDFRHLypSqNsy+W5rWXDTjV4 ik0thgZdeIskJlZ0Rrz3T8RN8W9+mdZxUX1lh04kXa3vSQarDJCOmW0EiXwnOwKk 3+wVPi2ZrLGpJFiYqO0Ml4v51hEjFyNUEohWzyxZTu8jF24SRPT/Zeg2Z9QQvZRA kXQnhejdrfAKjY2IW11xlRQM5oioH37ei4Sh+X7aZXND+O5PmhwjH0ECwZIPSYcA res7dNlRh7HrXGeeF1PP/xNed0usUUtyUkWOz0XuADrj1lnqFqBcL4yO2JZfOEux E4lQuuAjWVNpnyJW+OrlS8/PPo7BOZz2+9eabFB2VLTgo6/I6dPvXOgJcsrvwFem 5i3bYd4ako4= =5lT8 -----END PGP SIGNATURE-----
Current thread:
- Microsoft Security Advisory Notification Microsoft (Jan 15)
- <Possible follow-ups>
- Microsoft Security Advisory Notification Microsoft (Feb 04)
- Microsoft Security Advisory Notification Microsoft (Feb 11)
- Microsoft Security Advisory Notification Microsoft (Feb 19)
- Microsoft Security Advisory Notification Microsoft (Feb 20)
- Microsoft Security Advisory Notification Microsoft (Feb 27)
- Microsoft Security Advisory Notification Microsoft (Feb 28)
- Microsoft Security Advisory Notification Microsoft (Mar 11)
- Microsoft Security Advisory Notification Microsoft (Mar 24)
- Microsoft Security Advisory Notification Microsoft (Mar 27)