exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Microsoft Security Bulletin CVE Update For July, 2017

Microsoft Security Bulletin CVE Update For July, 2017
Posted Jul 12, 2017
Site microsoft.com

This Microsoft bulletin summary lists multiple CVEs that have undergone a major revision increment.

tags | advisory
advisories | CVE-2016-3305, CVE-2017-0292, CVE-2017-8543
SHA-256 | e9765dadc7ef22691f545d5d5ec8511307562284cfbd01acee88de6e21d6a058

Microsoft Security Bulletin CVE Update For July, 2017

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Title: Microsoft Security Update Releases
Issued: July 11, 2017
********************************************************************

Summary
=======

The following CVEs and Microsoft security bulletins have undergone
a major revision increment.


* CVE-2016-3305
* CVE-2017-0292
* CVE-2017-8543
* MS16-111
* MS16-SEP

CVE Revision Information:
=====================

CVE-2016-3305

- Title: CVE-2016-3305 | Windows Session Object Elevation of
Privilege Vulnerability
- https://portal.msrc.microsoft.com/en-us/security-guidance
- Reason for Revision: Revised the Affected Products table to
include 10 Version 1703 for 32-bit Systems and Windows 10 Version
1703 for x64-based Systems because they are affected by
CVE-2016-3305. Microsoft recommends that customers running Windows
10 Version 1703 should install update 4025342 to be protected from
this vulnerability.
- Originally posted: September 13, 2016
- CVE Severity Rating: Important
- Version: 2.0

CVE-2017-0292

- Title: CVE-2017-0292 | Windows PDF Remote Code Execution
Vulnerability
- https://portal.msrc.microsoft.com/en-us/security-guidance
- Reason for Revision: To address a known issue customers
may have experienced when rendering PDF files, Microsoft
has released an update with the July security and monthly
rollup updates. Microsoft recommends that customers who
have experienced this known issue should install the July
security or monthly rollup updates.
- Originally posted: June 13, 2017
- Updated: June 13, 2017
- CVE Severity Rating: Critical
- Version: 5.0

CVE-2017-8543

- CVE-2017-8543 | Windows Search Remote Code Execution
Vulnerability
- https://portal.msrc.microsoft.com/en-us/security-guidance
- Reason for Revision: To more comprehensively address
CVE-2017-8543, Microsoft is releasing security update 4025339
for affected editions of Windows 10 Version 1607 and security
update 4025342 for affected editions of Windows 10 Version 1703.
Microsoft recommends that customers running these versions of
Windows 10 install the updates to be protected from this
vulnerability.
- Originally posted: June 13, 2017
- Updated: July 11, 2017
- CVE Severity Rating: Critical
- Version: 5.0


Microsoft Becurity Bulletin Revision Information:
=====================

MS16-111

- Title: Security Update for Windows Kernel (3186973)
- https://technet.microsoft.com/library/security/ms16-111
- Reason for Revision: Revised the Windows Affected Software
and Vulnerability Severity Ratings table to include 10 Version
1703 for 32-bit Systems and Windows 10 Version 1703 for x64-based
Systems because they are affected by CVE-2016-3305. Microsoft
recommends that customers running Windows 10 Version 1703 should
install update 4025342 to be protected from this vulnerability.
- Originally posted: September 13, 2016
- CVE Severity Rating: Important
- Version: 2.0

MS16-SEP

- Title: Microsoft Security Bulletin Summary for September 2016
- https://technet.microsoft.com/library/security/ms16-SEP
- Reason for Revision: For MS16-111, added Windows 10 Version
1703 for 32-bit Systems and Windows 10 Version 1703 for
x64-based Systems to the Affected Software table because
they are affected by CVE-2016-3305. Microsoft recommends that
customers running Windows 10 Version 1703 should install
update 4025342 to be protected from this vulnerability.
- Originally posted: September 13, 2016
- CVE Severity Rating: N/A
- Version: 2.0


Other Information
=================

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, PGP is not required for
reading security notifications, reading security bulletins, or
installing security updates. You can obtain the MSRC public PGP key
at <https://technet.microsoft.com/security/dn753714>.

********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

Microsoft respects your privacy. Please read our online Privacy
Statement at <http://go.microsoft.com/fwlink/?LinkId=81184>.

If you would prefer not to receive future technical security
notification alerts by email from Microsoft and its family of
companies please visit the following website to unsubscribe:
<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar
d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.

These settings will not affect any newsletters youave requested or
any mandatory service communications that are considered part of
certain Microsoft services.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052

-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8

wsFVAwUBWWUGiPsCXwi14Wq8AQihdw/+Kffs9dWfirjPhNce0IBEOPJK3iC+PJ1n
lNTaZSOUq++F7G/p/H3S/p6Pnpdtd10XX1iSOvP30MSAWjhnfRVHJ/aA1eTOMOr1
bRVCyB9TeLu90v2WHHuXkUGBgCpi9BWPr3ti05PHCMqz6QDoNst7Oj0TIV1yLBj1
Sx3VlEIi4GfKAz+X41NsB2we43NRha3OJyt1dme3U+YolU9C4Fdu0ceLTflx7pEm
6Rm0WkB3x2eV964xjzSakAgn4L97ISY8mDDSvcfK1uVqn5DRct76w7M4noATdvor
ZLihQVkAEgrSXWKJpq16ChqAwpHnsobl6Sg47UXFd5Qmftn6r1MFuJ4RX9fIr00m
cyqtzIDvonollf0zrX0K4CEbJ3ADfm74Cq2FzNcN4hLuwupoGO2F3qM05cF5rLUA
jU7w/YsUoWWZzSAB8NoaAuLLz0V12UrSh/fJEoY3K1XTJFuyew2plGzSxFZbdH3q
9audS3Mt2Js8LAmX7a2GSG5lJcIZ6e4CFLqfzwD4eKEhE8C6p6To4V1doljPf8qM
FA0+H5iT9h/S8zrORMvQNM6FTpf3250+sTFxJ7IuHrBk/+baVlcpadqkPtqOQTqZ
B04dGLCZDSeiDKFMoTSE7ChS839y5Jj6CSNtfteV9ip/JJQttIpDsF+9OCb4i7GN
bnMwlNE2F0E=
=DfyI
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    14 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    12 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close