-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
********************************************************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: April 7, 2016
********************************************************************
Summary
=======
The following bulletins and/or bulletin summaries have undergone a minor revision increment.
Please see the appropriate bulletin for more details.
* MS13-082 - Critical
* MS15-115 - Critical
* MS15-121 - Important
* MS15-122 - Important
* MS16-027 - Critical
Bulletin Information:
=====================
MS13-082
- Title: Vulnerabilities in .NET Framework Could Allow Remote Code
Execution (2878890)
- https://technet.microsoft.com/library/security/ms13-082.aspx
- Reason for Revision: V1.2 (April 7, 2016): Corrected download
links for Microsoft .NET Framework 3.5.1 on Windows 7 and
Windows 2008 R2. This is an informational change only. Customers
who have already successfully updated their systems do not need
to take any action.
- Originally posted: October 8, 2013
- Updated: April 7, 2016
- Bulletin Severity Rating: Critical
- Version: 1.2
MS15-115
- Title: Security Update for Microsoft Windows to Address
Remote Code Execution (3105864)
- https://technet.microsoft.com/library/security/ms15-115.aspx
- Reason for Revision: V2.1 (April 7, 2016): Updated the footnotes
following the Affected Software table to further clarify
installation order for security update 3101746 in MS15-115,
3081320 in MS15-121, and 3101246 in MS15-122. This is an
informational change only. Customers who have already
successfully installed the update do not need to take any
action.
- Originally posted: November 10, 2015
- Updated: April 7, 2016
- Bulletin Severity Rating: Critical
- Version: 2.1
MS15-121
- Title: Security Update for Schannel to Address Spoofing (3081320)
- https://technet.microsoft.com/library/security/ms15-121.aspx
- Reason for Revision: V1.1 (April 7, 2016): Updated the footnotes
following the Affected Software table to further clarify
installation order for security update 3101746 in MS15-115,
3081320 in MS15-121, and 3101246 in MS15-122. This is an
informational change only. Customers who have already
successfully installed the update do not need to take any
action.
- Originally posted: November 10, 2015
- Updated: April 7, 2016
- Bulletin Severity Rating: Important
- Version: 1.1
MS15-122
- Title: Security Update for Kerberos to Address Security
Feature Bypass (3105256)
- https://technet.microsoft.com/library/security/ms15-122.aspx
- Reason for Revision: V1.2 (April 7, 2016): Updated the footnotes
following the Affected Software and Vulnerability Severity Ratings
table to further clarify installation order for security update
3101746 in MS15-115, 3081320 in MS15-121, and 3101246 in MS15-122.
This is an informational change only. Customers who have already
successfully installed the update do not need to take any action.
- Originally posted: November 10, 2015
- Updated: April 7, 2016
- Bulletin Severity Rating: Important
- Version: 1.2
MS16-027
- Title: Security Update for Windows Media to Address Remote
Code Execution (3143146)
- https://technet.microsoft.com/library/security/ms16-027.aspx
- Reason for Revision: V1.2 (April 7, 2016): Added a note to
clarify that Windows Media is only enabled on Windows server
operating systems when the Desktop Experience feature is enabled.
This is an informational change only.
- Originally posted: March 8, 2016
- Updated: April 7, 2016
- Bulletin Severity Rating: Critical
- Version: 1.2
Other Information
=================
Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email.
Daniel
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.