FYI...
> https://technet.micr...curity/ms15-jun
June 9, 2015 - "This bulletin summary lists security bulletins released for June 2015...
(Total of -8-)
Microsoft Security Bulletin MS15-056 - Critical
Cumulative Security Update for Internet Explorer (3058515)
- https://technet.micr...curity/MS15-056
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer
Microsoft Security Bulletin MS15-057 - Critical
Vulnerability in Windows Media Player Could Allow Remote Code Execution (3033890)
- https://technet.micr...curity/MS15-057
Critical - Remote Code Execution - May require restart - Microsoft Windows
Microsoft Security Bulletin MS15-059 - Important
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3064949)
- https://technet.micr...curity/MS15-059
Important - Remote Code Execution - May require restart - Microsoft Office
Microsoft Security Bulletin MS15-060 - Important
Vulnerability in Microsoft Common Controls Could Allow Remote Code Execution (3059317)
- https://technet.micr...curity/MS15-060
Important - Remote Code Execution - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS15-061 - Important
Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057839)
- https://technet.micr...curity/MS15-061
Important - Elevation of Privilege - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS15-062 - Important
Vulnerability in Active Directory Federation Services Could Allow Elevation of Privilege (3062577)
- https://technet.micr...curity/MS15-062
Important - Elevation of Privilege - Does not require restart - Microsoft Windows
Microsoft Security Bulletin MS15-063 - Important
Vulnerability in Windows Kernel Could Allow Elevation of Privilege (3063858)
- https://technet.micr...curity/MS15-063
Important - Elevation of Privilege - Requires restart - Microsoft Windows
Microsoft Security Bulletin MS15-064 - Important
Vulnerabilities in Microsoft Exchange Server Could Allow Elevation of Privilege (3062157)
- https://technet.micr...curity/MS15-064
Important - Elevation of Privilege - Does not require restart - Microsoft Exchange Server
___
MS15-056: http://www.securityt....com/id/1032521
MS15-057: http://www.securityt....com/id/1032522
MS15-059: http://www.securityt....com/id/1032523
MS15-060: http://www.securityt....com/id/1032524
MS15-061: http://www.securityt....com/id/1032525
MS15-062: http://www.securityt....com/id/1032526
MS15-063: http://www.securityt....com/id/1032527
MS15-064: http://www.securityt....com/id/1032528
___
- http://blogs.technet...15-updates.aspx
9 Jun 2015 - "... we released 8 security bulletins...
We released one new Security Advisory:
Update for Juniper Network Windows In-Box Junos Pulse Client (2962393)
- https://technet.micr...ty/2962393.aspx
One Security Advisory has been revised:
Update for Adobe Flash Player in Internet Explorer (2755801)
- https://technet.micr...ty/2755801.aspx
___
June 2015 Office Update Release
- http://blogs.technet...te-release.aspx
9 Jun 2015 - "... There are 16 security updates (2 bulletins) and 45 non-security updates..."
MS15-059: http://technet.micro...curity/ms15-059
MS15-046 :https://technet.micr...curity/ms15-046
"... To address issues with the security updates for all affected Microsoft Office 2010 software, Microsoft re-released MS15-046...
V1.0 (May 12, 2015): Bulletin published.
V2.0 (May 19, 2015): Bulletin revised...
V3.0 (June 9, 2015): To address issues with the security updates for all affected Microsoft Office 2010 software, Microsoft re-released MS15-046 to comprehensively address CVE-2015-1682. Microsoft recommends that customers running affected Office 2010 software should install the security updates released with this bulletin revision to be fully protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See Microsoft Knowledge Base Article 3057181* for more information and download links."
* https://support.micr...n-us/kb/3057181
Last Review: June 9, 2015 - Rev: 2.0
- https://web.nvd.nist...d=CVE-2015-1682/ 9.3 (HIGH)
___
HTTP Strict Transport Security comes to Internet Explorer 11 on Windows 8.1 and Windows 7
- http://blogs.windows...-and-windows-7/
June 9, 2015 - "In February, we released the first preview of HTTP Strict Transport Security in Internet Explorer 11 in the Windows 10 Insider Preview. The HTTP Strict Transport Security (HSTS) policy protects against variants of man-in-the-middle attacks that can strip TLS out of communications with a server, leaving the user vulnerable. With today’s monthly security updates (KB 3058515), we’re bringing the protections offered by HSTS to Internet Explorer 11 on Windows 8.1 and Windows 7. HSTS is also available in both Internet Explorer 11 and Microsoft Edge on Windows 10. Site developers can use HSTS policies to secure connections by opting in to an HSTS preload list, which registers websites to be hardcoded by Microsoft Edge, Internet Explorer, and other browsers to redirect HTTP traffic to HTTPS. Communications with these websites from the initial connection are automatically upgraded to be secure..."
MS15-056: https://support.micr...n-us/kb/3058515
Last Review: June 9, 2015 - Rev: 1.0
___
ISC Analysis
- https://isc.sans.edu...l?storyid=19781
2015-06-09
___
- http://www.theinquir...ystery-omission
Jun 10 2015 - "... There's no MS15-058. We don't know why this is. Perhaps something was pulled at the last minute, or perhaps there's an out-of-band coming up..."
.
Edited by AplusWebMaster, 10 June 2015 - 11:43 AM.