News: Cexx forums, with volunteers dedicated to helping you remove malware and stay protected
 
Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
July 25, 2014, 11:57:08
Pages: [1]   Go Down
  Print  
Topic: MS Security Bulletin Summary - June 2014  (Read 238 times)
0 Members and 1 Guest are viewing this topic.
« on: June 10, 2014, 09:38:36 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8167



FYI...

- https://technet.microsoft.com/library/security/ms14-jun
June 10, 2014 - "This bulletin summary lists security bulletins released for June 2014...
(Total of -7-)

Microsoft Security Bulletin MS14-035 - Critical
Cumulative Security Update for Internet Explorer (2969262)
- https://technet.microsoft.com/library/security/ms14-035
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer
"... resolves -59- items..." *

Microsoft Security Bulletin MS14-036 - Critical
Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (2967487)
- https://technet.microsoft.com/library/security/ms14-036
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Microsoft Office, Microsoft Lync

Microsoft Security Bulletin MS14-034 - Important
Vulnerability in Microsoft Word Could Allow Remote Code Execution (2969261)
- https://technet.microsoft.com/library/security/ms14-034
Important - Remote Code Execution - May require restart - Microsoft Office

Microsoft Security Bulletin MS14-033 - Important
Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2966061)
- https://technet.microsoft.com/en-us/library/security/ms14-033
Important - Information Disclosure - May require restart - Microsoft Windows

Microsoft Security Bulletin MS14-032 - Important
Vulnerability in Microsoft Lync Server Could Allow Information Disclosure (2969258)
- https://technet.microsoft.com/library/security/ms14-032
Important - Information Disclosure - May require restart - Microsoft Lync Server

Microsoft Security Bulletin MS14-031 - Important
Vulnerability in TCP Protocol Could Allow Denial of Service (2962478)
- https://technet.microsoft.com/library/security/ms14-031
Important - Denial of Service - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS14-030 - Important
Vulnerability in Remote Desktop Could Allow Tampering (2969259)
- https://technet.microsoft.com/library/security/ms14-030
Important - Tampering - May require restart - Microsoft Windows
___

*  http://blogs.technet.com/b/msrc/archive/2014/06/10/theoretical-thinking-and-the-june-2014-bulletin-release.aspx
10 Jun 2014

Deployment Priority, Severity, and Exploit Index
- http://blogs.technet.com/cfs-file.ashx/__key/communityserver-blogs-components-weblogfiles/00-00-00-45-71/2860.Deployment.jpg
___

June 2014 Office Updates
- http://blogs.technet.com/b/office_sustained_engineering/archive/2014/06/10/june-2014-office-update-release.aspx
10 Jun 2014 - "... There are 7 security updates (2 bulletins*) and 20 non-security updates..."
* MS14-034, MS14-036
___

ISC Analysis
- https://isc.sans.edu/diary.html?storyid=18233
2014-06-10

.
« Last Edit: June 10, 2014, 12:46:05 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #1 on: June 12, 2014, 05:53:55 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8167



FYI...

June 2014 security fixes ...
- http://windowssecrets.com/patch-watch/june-brings-a-hodgepodge-of-security-fixes/
June 11, 2014

Win8.1 Update ...
- https://support.microsoft.com/kb/2919355
May 30, 2014 - Rev: 23.0
June 4, 2014  - Rev: 24.0
Last Review: June 10, 2014 - Rev: 26.0

 Exclamation
« Last Edit: June 12, 2014, 09:45:40 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #2 on: June 13, 2014, 18:28:39 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8167



FYI...

- http://blogs.technet.com/b/msrc/archive/2014/06/13/june-2014-security-bulletin-webcast-and-q-amp-a.aspx
13 Jun 2014 - "Today we published the June 2014 Security Bulletin webcast questions and answers page*..."

June 2014 Security Bulletin Webcast Q&A
* http://blogs.technet.com/b/msrc/p/july-2014-security-bulletin-q-a.aspx
June 11, 2014


.
Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #3 on: June 17, 2014, 02:44:51 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8167



FYI...

For IE 11 users, no update now means no security fixes
- http://arstechnica.com/information-technology/2014/06/internet-explorer-11s-new-update-ethos-for-security-fixes-youll-need-new-features/
June 16 2014 - "When Microsoft released the Windows 8.1 Update, IT feathers were ruffled by Microsoft's decision to make it a compulsory update: without it, Windows 8.1 systems would no longer receive security fixes. As spotted by Computerworld's Gregg Keizer*, Microsoft is applying the same rules, at least in part, to Windows 7. Windows 7 users who've installed Internet Explorer 11 are required to install the KB2929437 update. This is the Internet Explorer 11 update that corresponds to the Windows 8.1 Update; it doesn't just include security fixes for Microsoft's browser. There are also some new and improved features, including a more capable WebGL implementation and some additional high performance JavaScript features. If users don't install the update, Windows Update will not provide any more security fixes for their browser..."
* http://www.infoworld.com/d/microsoft-windows/microsoft-strips-some-windows-7-users-of-ie11-patch-privileges-244338?page=0,0
June 16, 2014

 Shocked   Questioning or Suspicious
Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
« Reply #4 on: June 27, 2014, 18:34:29 »
AplusWebMaster Offline
Global Moderator WWW

Karma: 501
Posts: 8167



FYI...

Microsoft Security Bulletin MS14-019 - Critical
Vulnerability in Windows File Handling Component Could Allow Remote Code Execution (2922229)
- https://technet.microsoft.com/en-us/library/security/MS14-019
V1.1 (June 27, 2014) Updated the Known Issues entry in the Knowledge Base Article section from "None" to "Yes".

- https://support.microsoft.com/kb/2922229
Last Review: June 24, 2014 - Rev: 2.0

- https://technet.microsoft.com/library/security/ms14-jun
V1.1 (June 17, 2014): For MS14-035, added an Exploitability Assessment in the Exploitability Index for CVE-2014-2782. This is an informational change only.

MS14-035
- https://technet.microsoft.com/library/security/ms14-035
V1.1 (June 17, 2014): Corrected the severity table and vulnerability information to add CVE-2014-2782 as a vulnerability addressed by this update. This is an informational change only...

MS14-036
- https://technet.microsoft.com/library/security/ms14-036
V1.1 (June 17, 2014): Clarified in the Update FAQ for Microsoft Office section what updates will be offered to systems that are running Microsoft Office 2010. This is an informational change only...

 Exclamation
« Last Edit: July 01, 2014, 01:28:05 by AplusWebMaster » Logged

This machine has no brain.
....... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.
 
Pages: [1]   Go Up
  Print  
 
Jump to:  

Powered by SMF 1.1.19 | SMF © 2013, Simple Machines Page created in 2.177 seconds with 19 queries.