MS Sec Notification mailing list archives

Microsoft Security Bulletin Minor Revisions


From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Thu, 11 Aug 2016 19:32:28 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


********************************************************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: August 11, 2016
********************************************************************

Summary
=======
The following bulletins and/or bulletin summaries have undergone a 
minor revision increment. 

Please see the appropriate bulletin for more details.

*  MS16-035

*  MS16-99

 * MS16-102

 * MS16-AUG


Bulletin Information:
=====================

MS16-035

 - Title: Security Update for .NET Framework to Address Security 
   Feature Bypass (3141780)
 - https://technet.microsoft.com/library/security/ms16-035.aspx
 - Reason for Revision: V2.3 (August 11, 2016): Revised bulletin to 
   announce a detection change to correct an offering issue for 
   3135996. This is a detection change only. There were no changes 
   to the update files. Customers who have already successfully 
   installed the update do not need to take any action.
 - Originally posted: August 9, 2016   
 - Updated: August 11, 2016
 - Bulletin Severity Rating: Important
 - Version: 2.3


MS16-99

 - Title: Security Update for Microsoft Office (3177451)
 - https://technet.microsoft.com/library/security/ms16-099.aspx
 - Reason for Revision: V1.1 (August 11, 2016): Bulletin revised to 
   correct the updates replaced for Microsoft Word Viewer packages 
   3115480 and 3115479. This is an informational change only. Customers 
   who have already successfully updated their systems do not need to 
   take any action.
 - Originally posted: August 9, 2016   
 - Updated: August 11, 2016
 - Bulletin Severity Rating: Critical
 - Version: 1.1
 

MS16-102

 - Title: Security Update for Microsoft Windows PDF Library (3182248)
 - https://technet.microsoft.com/library/security/ms16-102.aspx
 - Reason for Revision: V1.1 (August 11, 2016): Bulletin revised to 
   remove Windows Server 2012 R2 (Server Core installation) from the 
   affected software table because the Server Core version of Windows 
   Server 2012 R2 is not affected. This is an informational change only. 
   Customers who have already successfully installed the update do not 
   need to take any action.
 - Originally posted: August 9, 2016   
 - Updated: August 11, 2016
 - Bulletin Severity Rating: Critical
 - Version: 1.1
 
 MS16-AUG
 - https://technet.microsoft.com/library/security/ms16-aug.aspx
 - Reason for Revision: V1.2 (August 11, 2016): For MS16-102, bulletin 
   revised to remove Windows Server 2012 R2 (Server Core installation) 
   from the affected software table because the Server Core version of 
   Windows Server 2012 R2 is not affected. This is an informational 
   change only. Customers who have already successfully installed the 
   update do not need to take any action. 
 - Originally posted: August 9, 2016
 - Updated: August 11, 2016
 - Bulletin Severity Rating: Not applicable
 - Version: 1.2

Other Information


=================

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing 
a Microsoft security update, it is a hoax that may contain 
malware or pointers to malicious websites. Microsoft does 
not distribute security updates via email. 

The Microsoft Security Response Center (MSRC) uses PGP to digitally 
sign all security notifications. However, PGP is not required for 
reading security notifications, reading security bulletins, or 
installing security updates. You can obtain the MSRC public PGP key
at <https://technet.microsoft.com/security/dn753714>.

********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

Microsoft respects your privacy. Please read our online Privacy
Statement at <http://go.microsoft.com/fwlink/?LinkId=81184>.

If you would prefer not to receive future technical security
notification alerts by email from Microsoft and its family of
companies please visit the following website to unsubscribe:
<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar
d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.

These settings will not affect any newsletters you’ve requested or
any mandatory service communications that are considered part of
certain Microsoft services.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950) - not licensed for commercial use: www.pgp.com
Charset: utf-8

wpUDBQFXrSGCbWkncp/QOT8BAs4BBACQtj0lHXsP+owNY2iYe+AhuQOu4COV5T0b
OCcmvrAMdfvq1qX4QsNNx9k8rAwEabono+Kj+N7r8275scj03yluUTzQNX2cXi8N
cJmv3mFNBaVfn/k9WECHl4gDxMLazEiuRJvAolho62dVA1SJYzBR2RS92nOITNg/
IgZCsZeA3Q==
=dqWI
-----END PGP SIGNATURE-----


Current thread: