MS Sec Notification mailing list archives
The following CVEs have been revised in the September 2017 Security Updates.
From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Tue, 03 Oct 2017 15:29:16 -0600
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ******************************************************************** Title: Microsoft Security Update Minor Revisions Issued: October 3, 2017 ******************************************************************** Summary ======= The following CVEs have been revised in the September 2017 Security Updates. * CVE-2017-8759 Revision Information: ===================== CVE-2017-8759 - Title: CVE-2017-8759 | .NET Framework Remote Code Execution Vulnerability - https://portal.msrc.microsoft.com/en-us/security-guidance - Reason for Revision: Corrected links to the Monthly Rollup KB articles for Microsoft .NET Framework 4.5.2 and Microsoft .NET Framework 4.6 installed on Windows Server 2008, and added a link to the 4041085 monthly rollup for Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7 installed on Windows RT 8.1. This is an informational change only. Customers who have successfully installed the updates do not need to take any further action. - Originally posted: September 12, 2017 - Updated: October 3, 2017 - CVE Severity Rating: Important - Version: 1.2 Other Information ================= Recognize and avoid fraudulent email to Microsoft customers: ============================================================= If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email. The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at <https://technet.microsoft.com/security/dn753714>. ******************************************************************** THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ******************************************************************** Microsoft respects your privacy. Please read our online Privacy Statement at <http://go.microsoft.com/fwlink/?LinkId=81184>. If you would prefer not to receive future technical security notification alerts by email from Microsoft and its family of companies please visit the following website to unsubscribe: <https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>. These settings will not affect any newsletters youâve requested or any mandatory service communications that are considered part of certain Microsoft services. For legal Information, see: <http://www.microsoft.com/info/legalinfo/default.mspx>. This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052 -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 10.2.0 (Build 1950) Charset: utf-8 wsFUAwUBWdP8A/sCXwi14Wq8AQjk+w/47aqMkoNfUEfVthJ5uEHkAJQvrpBI6Trk 7jbLyuKtG9ScUH0l7zEFb59TSQBOuja67ysC1QEy4Ck+udiTq/gTuXJdn8gsh9EY b++2qZVUsk2vUyHTkXxECxCiY/brc4B3XPhmqt+lLlJH+lW2Cv70uQrntS6Q2zu/ kTCgr+3IgCwyNwd32uGts6jEWhEI0OXtUnLErDkFlYhr7NQsGZpEZLlZ5sMvoRUA ilQduvQuOZJ9pENF7yrtXP2NUrkpIRQBOOLTJxNRwbeBw9/QvSJvXnTAhN/7cu0G GbKdqDobDr89VOB9iFHFUB/FHeXG1IVuOl6k/7vImmFe+QZRIA6NgxEXUB6Xq/dp A15E7jGIKx+6mjxorO8zh/Nv89qOECMHkFIB40/9nlr6c/Fp38UOLKUIhRDS+O30 nVPKKN4gF2N9+oTG86YmT9kOMzUOIa25fWkneCdGVGWNW79UAqJGUUDzi39c2U52 Bchxfg1zn+bFuqqBZ4ggWyjeV8LD7yzN4z44idr4KZ2uJXTXTGlT9UjxbbXVMw6i IhD8FN48bV5KGaMCEfECWE+mUf3zLln9OJHlbEthtVZVsyw+27cnTmsYCJmwy5p5 HgI5WMLoQFwFr4JhPJXNIwtEJVclntFBGV5+NGiuc9q2v0kt1p0hViV1/PjoJlTp J3hjp8TXNQ== =Eaoh -----END PGP SIGNATURE-----
Current thread:
- The following CVEs have been revised in the September 2017 Security Updates. Microsoft (Oct 03)