PaulDotCom mailing list archives

Re: Fwd: Microsoft Security Bulletin Minor Revisions


From: Arch Angel <arch3angel () gmail com>
Date: Wed, 13 Feb 2013 12:39:55 -0500

I'm currently in class with two personnel from Microsoft, they laughed pretty hard to this.

Thanks for sharing!

--

Thank you,

Robert Miller
http://www.armoredpackets.com

Twitter: @arch3angel

On 2/13/13 10:08 AM, David Oresky wrote:
I have been lurking on this list and thought you all would get a kick out of this. Seems someone forgot to pay the bill. I guess keeping up with software licensing is hard for everyone:
"This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950) - *not licensed for commercial use*: www.pgp.com <http://www.pgp.com/>
Charset: utf-8"
Entire message below:
---------- Forwarded message ----------
From: *Microsoft* <securitynotifications () e-mail microsoft com <mailto:securitynotifications () e-mail microsoft com>>
Date: Tue, Feb 12, 2013 at 6:29 PM
Subject: Microsoft Security Bulletin Minor Revisions
To: David () oresky net <mailto:David () oresky net>


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: February 12, 2013
********************************************************************

Summary
=======
The following bulletins have undergone a minor revision increment.
Please see the appropriate bulletin for more details.

  * MS13-004
  * MS13-005
  * MS13-006
  * MS13-009
  * MS13-010
  * MS13-016
  * MS13-017
  * MS13-018
  * MS13-feb


Bulletin Information:
=====================

* MS13-004 - Important

  - http://technet.microsoft.com/security/bulletin/ms13-004
  - Reason for Revision: V2.1 (February 12, 2013): Bulletin
    revised to announce a detection change in the .NET
    Framework 1.1 Service Pack 1 update (KB2742597) to correct
    a Windows Update reoffering issue on certain systems that
    are running supported editions of Windows Vista or Windows
    Server 2008. This is a detection change only. Customers who
    have already successfully updated their systems do not need
    to take any action.
  - Originally posted: January 8, 2013
  - Updated: February 12, 2013
  - Bulletin Severity Rating: Important
  - Version: 2.1

* MS13-005 - Important

  - http://technet.microsoft.com/security/bulletin/ms13-005
  - Reason for Revision: V1.2 (February 12, 2013): Added a
    link to Microsoft Knowledge Base Article 2778930 under
    Known Issues in the Executive Summary.
  - Originally posted: January 8, 2013
  - Updated: February 12, 2013
  - Bulletin Severity Rating: Important
  - Version: 1.2

* MS13-006 - Important

  - http://technet.microsoft.com/security/bulletin/ms13-006
  - Reason for Revision: V1.1 (February 12, 2013): Added a
    link to Microsoft Knowledge Base Article 2785220 under
    Known Issues in the Executive Summary.
  - Originally posted: January 8, 2013
  - Updated: February 12, 2013
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS13-009 - Critical

  - http://technet.microsoft.com/security/bulletin/ms13-009
  - Reason for Revision: V1.1 (February 12, 2013): Added a
    link to Microsoft Knowledge Base Article 2792100 under
    Known Issues in the Executive Summary. In addition,
    corrected the severity ratings for CVE-2013-0022. This
    is an informational change only.
  - Originally posted: February 12, 2013
  - Updated: February 12, 2013
  - Bulletin Severity Rating: Critical
  - Version: 1.1

* MS13-010 - Critical

  - http://technet.microsoft.com/security/bulletin/ms13-010
  - Reason for Revision: V1.1 (February 12, 2013): Added a
    link to Microsoft Knowledge Base Article 2797052 under
    Known Issues in the Executive Summary. In addition,
    corrected the FAQ entry for Internet Explorer 10 Release
    Preview for Windows 7 and Windows Server 2008 R2.
  - Originally posted: February 12, 2013
  - Updated: February 12, 2013
  - Bulletin Severity Rating: Critical
  - Version: 1.1

* MS13-016 - Important

  - http://technet.microsoft.com/security/bulletin/ms13-016
  - Reason for Revision: V1.1 (February 12, 2013): Added a
    link to Microsoft Knowledge Base Article 2778344 under
    Known Issues in the Executive Summary.
  - Originally posted: February 12, 2013
  - Updated: February 12, 2013
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS13-017 - Important

  - http://technet.microsoft.com/security/bulletin/ms13-017
  - Reason for Revision: V1.1 (February 12, 2013): Added a
    link to Microsoft Knowledge Base Article 2799494 under
    Known Issues in the Executive Summary.
  - Originally posted: February 12, 2013
  - Updated: February 12, 2013
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS13-018 - Important

  - http://technet.microsoft.com/security/bulletin/ms13-018
  - Reason for Revision: V1.1 (February 12, 2013): Added a
    link to Microsoft Knowledge Base Article 2790655 under
    Known Issues in the Executive Summary.
  - Originally posted: February 12, 2013
  - Updated: February 12, 2013
  - Bulletin Severity Rating: Important
  - Version: 1.1

* MS13-feb

  - http://technet.microsoft.com/security/bulletin/ms13-feb
  - Reason for Revision: V1.1 (February 12, 2013): For
    MS13-009, corrected the Exploitability Assessment for
    Latest Software Release in the Exploitability Index
    for CVE-2013-0022.
  - Originally posted: February 12, 2013
  - Updated: February 12, 2013
  - Version: 1.1




Other Information
=================

Follow us on Twitter for the latest information and updates:
http://twitter.com/msftsecresponse

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, it is not required to read
security notifications, security bulletins, security advisories, or
install security updates. You can obtain the MSRC public PGP key at
https://technet.microsoft.com/security/bulletin/pgp.

To receive automatic notifications whenever Microsoft Security
Bulletins and Microsoft Security Advisories are issued or revised,
subscribe to Microsoft Technical Security Notifications on
http://technet.microsoft.com/security/dd252948.


********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

To manage or cancel your subscription to this newsletter,
visit the Microsoft.com Profile Center at
<http://go.microsoft.com/fwlink/?LinkId=245953> and then
click Manage Communications under My Subscriptions in the
Quicklinks section.

For more information, see the Communications Preferences section
of the Microsoft Online Privacy Statement at:
<http://go.microsoft.com/fwlink/?LinkId=92781>.

For the complete Microsoft Online Privacy Statement, see:
<http://go.microsoft.com/fwlink/?LinkId=81184>.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950) - not licensed for commercial use: www.pgp.com <http://www.pgp.com/>
Charset: utf-8
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=GRI3
-----END PGP SIGNATURE-----





_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

_______________________________________________
Pauldotcom mailing list
Pauldotcom () mail pauldotcom com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Current thread: