-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ******************************************************************** Title: Microsoft Security Update Releases Issued: November 28, 2017 ******************************************************************** Summary ======= The following CVE and security advisory have been revised in the November 2017 Security Updates. * CVE-2017-11882 * ADV170020 Revision Information: ===================== CVE-2017-11882 - Title: CVE-2017-11882 | Microsoft Office Memory Corruption Vulnerability - https://portal.msrc.microsoft.com/en-us/security-guidance - Reason for Revision: To comprehensively address CVE-2017-11882 Microsoft is releasing security updates 4011604 for affected editions of Microsoft Office 2007 and 4011618 for affected editions of Microsoft Office 2010. Microsoft recommends that customers running these versions of Office install the updates to be protected from this vulnerability. Customers who have already installed the previously-released updates (4011276 or 2553204) do not need to take any further action. - Originally posted: November 11, 2017 - Updated: November 28, 2017 - CVE Severity Rating: Important - Version: 2.0 ADV170020 - Title: ADV170020 | Microsoft Office Defense-in-Depth Update - https://portal.msrc.microsoft.com/en-us/security-guidance - Reason for Revision: Revised the Affected Products table to include Microsoft Office Online Server 2016 because the update also provides enhanced security as a defense-in-depth measure. Microsoft recommends that customers running Office Online Server 2016 install update 4011020 for these enhanced security measures. - Originally posted: November 11, 2017 - Updated: November 28, 2017 - CVE Severity Rating: None - Version: 2.0 Other Information ================= Recognize and avoid fraudulent email to Microsoft customers: ============================================================= If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email. The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates. You can obtain the MSRC public PGP key at . ******************************************************************** THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. ******************************************************************** Microsoft respects your privacy. Please read our online Privacy Statement at . If you would prefer not to receive future technical security notification alerts by email from Microsoft and its family of companies please visit the following website to unsubscribe: . These settings will not affect any newsletters youave requested or any mandatory service communications that are considered part of certain Microsoft services. For legal Information, see: . This newsletter was sent by: Microsoft Corporation 1 Microsoft Way Redmond, Washington, USA 98052 -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEELe29pj1Ogz+2MnKbEEiO2re18ugFAlocq8kACgkQEEiO2re1 8uhgohAA3OfkflhcllOMtWQejD7I5mt+F0lC0NZlnz5gSwfAqndU2VHZPy0Cucb3 mFMMHA2U0NalITej0Qbxoxzf7sH7RrhP73kPD2KjBPzWS2FSKhI8o/wo84dM7FX5 C6LHm62+LElhfPMFzjuF9kzjdieuX3pFL4wHnzl1/06G1k/uj0ix3WEuI7WYFrl1 XKJZ4c0h+Nxi5ZUXuWDJYqG7lgYo6P0GSlssiC9lZothNZjzq3YfddFpEF25frYx hIyh3ElSk701gTrPTAjpPnRw6fESvIbGIgab4HayrIMX0qmceWDy6ZMO8wPvHAw+ kA5PfkaUI6Y+NdJc0JbOVsNr28zIlWLoKzC5wX9CYm2WTtg8zTWwLNjwoRrhvhxf 8Logy08leUbqwmk7y5I/hXYUDkECxJY5vrC4cDNZm8LR10EIgDZhw3msNujPven9 W6HpMESgwMpDTxLDxedfcmXCigMnwc4m5HIkeMIhflLRX3t34x4HrfUrGoAfPJfc LDum4q9UkWxg8emNFUScYC+AnTRka66cxhdLjo/XEK7xL5AIcJtOpJ1JPPzm0mBS UyNUUB6lrakfwpqAiGijsKRlf68Mi8JXr6vHUUoip7gKRltPTb6vou0pH5nivGxd GY2uQRP7l9MysjcgHMxuCSXtVAYRWnm0LO4ehb/f8YT6gAAYLSs= =cLyb -----END PGP SIGNATURE-----