-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
************************************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: June 28, 2019
************************************************************************************
Summary
=======
The following CVEs have undergone a minor revision increment:
* CVE-2019-0990
* CVE-2019-1023
Revision Information:
=====================
- Chakra Scripting Engine Memory Corruption Vulnerability
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0990
- Reason for Revision: Corrected the CVE title and description to address the
vulnerability as remote code execution. In the Affected Products table,
corrected the Impact to Remote Code Execution. This is an informational change
only.
- Originally posted: June 11, 2019
- Updated: June 28, 2019
- Aggregate CVE Severity Rating: Critical
- Version: 1.2
- Scripting Engine Information Disclosure Vulnerability
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1023
- Reason for Revision: Corrected severity entries in the Affected Products table.
This is an informational change only. Customers who have successfully installed
the update do not need to take any further action.
- Originally posted: June 11, 2019
- Updated: June 28, 2019
- Aggregate CVE Severity Rating: Important
- Version: 1.1
Other Information
=================
Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email.
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.