MS Sec Notification mailing list archives

The following CVEs have been revised in the June 2017 Security Updates.


From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Tue, 01 Aug 2017 15:54:49 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: August 1, 2017
********************************************************************

Summary
=======

The following CVEs have been revised in the June 2017 Security Updates. 

* CVE-2017-0260
* CVE-2017-8501
* CVE-2017-8582
* CVE-2017-8606
* CVE-2017-8663

Revision Information:
=====================

CVE-2017-0260

 - Title: CVE-2017-0260 | Microsoft Office Remote Code Execution
 - https://portal.msrc.microsoft.com/en-us/security-guidance
 - Reason for Revision: Added Article and Download information for
   Microsoft Office 2016 Click-to-Run (C2R) for 32-bit editions and
   Microsoft Office 2016 Click-to-Run (C2R) for 64-bit editions to
   the Affected Products table. This is an informational change only.
 - Originally posted: June 13, 2017  
 - CVE Severity Rating: Important
 - Version: 1.1

CVE-2017-8501

 - Title: CVE-2017-8501 | Microsoft Office Memory Corruption
   Vulnerability
 - https://portal.msrc.microsoft.com/en-us/security-guidance
 - Reason for Revision: Corrected KB article entry for Microsoft Word
   for Mac 2016. This is an informational change only.
 - Originally posted: July 11, 2017  
 - CVE Severity Rating: Important
 - Version: 1.1

CVE-2017-8582

 - Title: CVE-2017-8582 | Http.sys Information Disclosure 
   Vulnerability
 - https://portal.msrc.microsoft.com/en-us/security-guidance
 - Reason for Revision: Corrected CVE title. This is an informational
   change only.
 - Originally posted: July 11, 2017  
 - CVE Severity Rating: Important
 - Version: 1.1

CVE-2017-8606

 - Title: CVE-2017-8606 | Scripting Engine Memory Corruption
   Vulnerability
 - https://portal.msrc.microsoft.com/en-us/security-guidance
 - Reason for Revision: Added Monthly Rollup KB4025336 for Internet
   Explorer 11 on Windows Server 2012 R2 to the Affected Products table.
   This is an informational change only.
 - Originally posted: July 11, 2017  
 - CVE Severity Rating: Critical
 - Version: 1.1

CVE-2017-8663

 - Title: CVE-2017-8663 | Microsoft Office Outlook Memory Corruption
   Vulnerability
 - https://portal.msrc.microsoft.com/en-us/security-guidance
 - Reason for Revision: Updated acknowledgment. This is an 
   informational change only.
 - Originally posted: July 27, 2017  
 - CVE Severity Rating: Important
 - Version: 1.1

Other Information
=================

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing 
a Microsoft security update, it is a hoax that may contain 
malware or pointers to malicious websites. Microsoft does 
not distribute security updates via email. 

The Microsoft Security Response Center (MSRC) uses PGP to digitally 
sign all security notifications. However, PGP is not required for 
reading security notifications, reading security bulletins, or 
installing security updates. You can obtain the MSRC public PGP key
at <https://technet.microsoft.com/security/dn753714>.

********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

Microsoft respects your privacy. Please read our online Privacy
Statement at <http://go.microsoft.com/fwlink/?LinkId=81184>.

If you would prefer not to receive future technical security
notification alerts by email from Microsoft and its family of
companies please visit the following website to unsubscribe:
<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar
d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.

These settings will not affect any newsletters you’ve requested or
any mandatory service communications that are considered part of
certain Microsoft services.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8
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=tJNp
-----END PGP SIGNATURE-----


Current thread: