No Image

3042058 – Update to Default Cipher Suite Priority Order – Version: 1.1

2015-10-13 KENNETH 0

Revision Note: V1.1 (October 13, 2015): Advisory revised to announce that the Default Cipher Suite Prioritization update (3042058), originally released May 12, 2015 via the Microsoft Download Center (DLC) only, is now also available via Microsoft Update (MU) and Windows Server Update Services (WSUS). This is an update offering venue change only. There were no changes to the update files. Customers who have already successfully installed the update do not need to take any action.Summary: On May 12, 2015, Microsoft announced the availability of an update to cryptographic cipher suite prioritization in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2. The update added additional cipher suites to the default list on affected systems and improved cipher suite priority ordering. The improvements were in keeping with ongoing efforts to bolster the [ more… ]

No Image

MS15-SEP – Microsoft Security Bulletin Summary for September 2015 – Version: 3.0

2015-10-13 KENNETH 0

Revision Note: V3.0 (October 13, 2015): For MS15-099, revised Bulletin Summary to announce the availability of an update package for Microsoft Excel 2016. Customers running Microsoft Excel 2016 should apply update 2920693 to be protected from the vulnerabilities discussed in MS15-099. The majority of customers have automatic updating enabled and will not need to take any action because the update will be downloaded and installed automatically.Summary: This bulletin summary lists security bulletins released for September 2015. Source: ms-security

No Image

2960358 – Update for Disabling RC4 in .NET TLS – Version: 2.0

2015-10-13 KENNETH 0

Revision Note: V2.0 (October 13, 2015): Advisory revised to broaden the affected software list to include Windows 10 systems that are running .NET Framework 3.5 applications and systems with .NET Framework 4.6 installed that are running .NET Framework 4.5/4.5.1/4.5.2 applications, and to provide customers running these configurations with steps for manually disabling RC4 in TLS. See the Affected Software and Suggested Actions sections of this advisory for more information.Summary: On May 13, 2014, Microsoft announced the availability of an update for Microsoft .NET Framework that disables RC4 in Transport Layer Security (TLS) through the modification of the system registry. Use of RC4 in TLS could allow an attacker to perform man-in-the-middle attacks and recover plaintext from encrypted sessions. Source: ms-security

No Image

MS15-MAY – Microsoft Security Bulletin Summary for May 2015 – Version: 2.0

2015-10-13 KENNETH 0

Revision Note: V2.0 (October 13, 2015): For MS15-046, revised Bulletin Summary to announce the availability of a new update (3085544) for Microsoft Office 2007 that addresses issues with the previously-released update (2965282). Customers running Microsoft Office 2007 are encouraged to install update 3085544 at the earliest opportunity to be fully protected from the vulnerability discussed in this bulletin. Customers running other Microsoft Office software do not need to take any action. See Microsoft Knowledge Base Article 3085544 for more information and download links.Summary: This bulletin summary lists security bulletins released for May 2015. Source: ms-security

No Image

MS15-110 – Important: Security Updates for Microsoft Office to Address Remote Code Execution (3096440) – Version: 1.0

2015-10-13 KENNETH 0

Severity Rating: ImportantRevision Note: V1.0 (October 13, 2015): Bulletin published.Summary: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Source: ms-security