Skip to main content

Microsoft Security Bulletin Minor Revisions Issued: November 8, 2016

  • November 11, 2016
  • 3 replies
  • 484 views

RetiredTripleHelix
Gold VIP
Forum|alt.badge.img+56
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
 
********************************************************************
Title: Microsoft Security Bulletin Minor Revisions
Issued: November 8, 2016
********************************************************************
 
Summary
=======
The following bulletins and/or bulletin summaries have undergone a minor revision increment.
 
Please see the appropriate bulletin for more details.
 
 * MS16-035
 * MS16-091
 * MS16-101
 
Bulletin Information:
=====================
 
 MS16-035
 
 - Title: Security Update for .NET Framework to Address
   Security Feature Bypass (3141780)
 - https://technet.microsoft.com/library/security/ms16-035.aspx
 - Reason for Revision: Revised bulletin to
   announce that a detection change was made to account for
   .NET Framework 4.6.1 hotfix rollup customers who were not being
   properly offered security updates applicable to
   .NET Framework 4.6.1.
 - Originally posted: March 8, 2016
 - Updated: November 8, 2016
 - Bulletin Severity Rating: Important
 - Version: 2.6
 
  MS16-091
 
 - Title: Security Update for .NET Framework (3170048)
 - https://technet.microsoft.com/library/security/ms16-091.aspx
 - Reason for Revision: Revised bulletin to announce that a
   detection change was made to account for .NET Framework 4.6.1
   hotfix rollup customers who were not being properly offered
   security updates applicable to the .NET Framework 4.6.1
 - Originally posted: July 12, 2016
 - Updated: November 8, 2016
 - Bulletin Severity Rating: Important
 - Version: 1.1
 
  MS16-120
 
 - Title: Security Update for Microsoft Graphics
   Component (3192884)
 - https://technet.microsoft.com/library/security/ms16-120.aspx
 - Reason for Revision: Revise bulletin to announce a detection
   change to address an issue in supersedence, specifically in
   WSUS environments where various updates applicable to
   Windows 7 SP1 and Windows Server 2008 R2 SP1 were incorrectly
   marked as being superseded. This is a detection change only.
   There were no changes to the update files. Customers who
   have already successfully installed the update do not need
   to take any action.
 - Originally posted: October 11, 2016
 - Updated: November 8, 2016
 - Bulletin Severity Rating: Critical
 - Version: 1.1
 
 
Other Information
=================
 
Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email.
 
Daniel

3 replies

Ssherjj
Moderator
Forum|alt.badge.img+62
  • Moderator
  • 21950 replies
  • November 11, 2016
Thank you Daniel as always!:D

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54
Thank you Daniel.

Baldrick
Gold VIP
  • Gold VIP
  • 16060 replies
  • November 11, 2016
Cheers, Daniel...the heads up is much appreciated.
 
Regards, Baldrick

Reply