Jump to content

Build Theme!
  •  
  • Infected?

WE'RE SURE THAT YOU'LL LOVE US!

Hey there! :wub: Looks like you're enjoying the discussion, but you're not signed up for an account. When you create an account, we remember exactly what you've read, so you always come right back where you left off. You also get notifications, here and via email, whenever new posts are made. You can like posts to share the love. :D Join 93098 other members! Anybody can ask, anybody can answer. Consistently helpful members may be invited to become staff. Here's how it works. Virus cleanup? Start here -> Malware Removal Forum.

Try What the Tech -- It's free!


Photo

MS Security Bulletin Summary - July 2015


  • Please log in to reply
7 replies to this topic

#1 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 14 July 2015 - 11:40 AM

FYI...

- https://technet.micr...curity/ms15-jul
July 14, 2015 - "This bulletin summary lists security bulletins released for July 2015...
(Total of -14-)

Microsoft Security Bulletin MS15-058 - Important
Vulnerabilities in SQL Server Could Allow Remote Code Execution (3065718)
- https://technet.micr...curity/MS15-058
Important - Remote Code Execution - May require restart - Microsoft SQL Server

Microsoft Security Bulletin MS15-065 - Critical
Security Update for Internet Explorer (3076321)
- https://technet.micr...curity/MS15-065
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer

Microsoft Security Bulletin MS15-066 - Critical
Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3072604)
- https://technet.micr...curity/MS15-066
Critical - Remote Code Execution - May require restart - Microsoft Windows

Microsoft Security Bulletin MS15-067 - Critical
Vulnerability in RDP Could Allow Remote Code Execution (3073094)
- https://technet.micr...curity/MS15-067
Critical - Remote Code Execution - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS15-068 - Critical
Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution (3072000)
- https://technet.micr...curity/MS15-068
Critical - Remote Code Execution - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS15-069 - Important
Vulnerabilities in Windows Could Allow Remote Code Execution (3072631)
- https://technet.micr...curity/MS15-069
Important - Remote Code Execution - May require restart - Microsoft Windows

Microsoft Security Bulletin MS15-070 - Important
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3072620)
- https://technet.micr...curity/MS15-070
Important - Remote Code Execution - May require restart - Microsoft Office

Microsoft Security Bulletin MS15-071 - Important
Vulnerability in Netlogon Could Allow Elevation of Privilege (3068457)
- https://technet.micr...curity/MS15-071
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS15-072 - Important
Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege (3069392)
- https://technet.micr...curity/MS15-072
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS15-073 - Important
Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (3070102)
- https://technet.micr...curity/MS15-073
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS15-074 - Important
Vulnerability in Windows Installer Service Could Allow Elevation of Privilege (3072630)
- https://technet.micr...curity/MS15-074
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS15-075 - Important
Vulnerabilities in OLE Could Allow Elevation of Privilege (3072633)
- https://technet.micr...curity/MS15-075
Important - Elevation of Privilege - May require restart - Microsoft Windows

Microsoft Security Bulletin MS15-076 - Important
Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege (3067505)
- https://technet.micr...curity/MS15-076
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS15-077 - Important
Vulnerability in ATM Font Driver Could Allow Elevation of Privilege
- https://technet.micr...curity/MS15-077
Important - Elevation of Privilege - Requires restart - Microsoft Windows
___

- http://blogs.technet...ty-updates.aspx
14 Jul 2015 - "... we released security updates for Microsoft Windows, Microsoft Office, Microsoft SQL Server, and Internet Explorer..."

Security Advisories released - 3

Microsoft Security Advisory 2974294
Vulnerability in MSRT Could Allow Elevation of privilege
- https://technet.micr...ecurity/2974294

Microsoft Security Advisory 3057154
Update to Harden Use of DES Encryption
- https://technet.micr...ecurity/3057154

Microsoft Security Advisory 3074162
Vulnerability in MSRT Could Allow Elevation of privilege
- https://technet.micr...ecurity/3074162
___

July 2015 Office Updates
- http://blogs.technet...te-release.aspx
14 Jul 2015 - "... There are 16 security updates (1 bulletin) and 41 non-security updates...
Security Bulletin MS15-070: http://technet.micro...curity/ms15-070
___

MS15-058: http://www.securityt....com/id/1032893
MS15-065: http://www.securityt....com/id/1032894
MS15-066: http://www.securityt....com/id/1032895
MS15-067: http://www.securityt....com/id/1032896
MS15-068: http://www.securityt....com/id/1032897
MS15-069: http://www.securityt....com/id/1032898
MS15-070: http://www.securityt....com/id/1032899
MS15-071: http://www.securityt....com/id/1032900
MS15-072: http://www.securityt....com/id/1032902
MS15-073: http://www.securityt....com/id/1032904
MS15-074: http://www.securityt....com/id/1032905
MS15-075: http://www.securityt....com/id/1032906
MS15-076: http://www.securityt....com/id/1032907
MS15-077: http://www.securityt....com/id/1032908
___

ISC Analysis
- https://isc.sans.edu...l?storyid=19919
2015-07-14

.


Edited by AplusWebMaster, 15 July 2015 - 05:35 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

    Advertisements

Register to Remove


#2 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 15 July 2015 - 07:53 PM

FYI...

MS Security Advisory 2755801
Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
- https://technet.micr...ecurity/2755801
July 15, 2015 V44.0 - "... Microsoft released an update (3079777) for Internet Explorer 10 on Windows 8, Windows Server 2012, Windows RT, and for Internet Explorer 11 on Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1. The update addresses the vulnerabilities described in Adobe Security bulletin APSB15-18*. For more information about this update, including download links, see Microsoft Knowledge Base Article 3079777**..."
* http://helpx.adobe.c.../apsb15-18.html

** https://support.micr...n-us/kb/3079777
Last Review: 07/15/2015 - Rev: 1.0
 

:ph34r:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#3 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 27 July 2015 - 05:25 AM

FYI...

Microsoft Security Bulletin MS15-078 - Critical
Vulnerability in Microsoft Font Driver Could Allow Remote Code Execution (3079904*)
- https://technet.micr...curity/MS15-078
July 20, 2015

* https://support.micr...n-us/kb/3079904
Last Review: 07/20/2015 - Rev: 1.0

> Microsoft issues emergency patch for critical vulnerability in Windows
Technical details are public, making it likely bug will be actively exploited.
- http://arstechnica.c...ity-in-windows/
Jul 20, 2015 5:30pm EDT - "... critical vulnerability, which is present in all supported version of Windows... no indications at the moment that the vulnerability is being actively exploited in the wild. Still, the unscheduled issuance on Monday is an indication that the chances of exploitation are high enough to merit installation as soon as possible... The easiest way to close the security hole is to use Windows Update to install the patch..."

- https://web.nvd.nist...d=CVE-2015-2426
Last revised: 07/22/2015
9.3 (HIGH)

___

MS patches - fewer problems over past 3 months ...
- http://www.infoworld...t-3-months.html
July 23, 2015 - "... it now appears that there are very few errors in Microsoft patches that were released in May, June and July 2015... list of problematic patches took a nose dive at the end of April, and hasn't bobbed back up... There's one big problem patch this month - the MS 15-058/KB 3065718 SQL Server patch has a nasty habit of installing on SQL Server 2005, even though it's -designed- for SQL Server 2008 - but the problems are well documented in the KB article*, and the relatively easy fix - remove the update - is detailed in KB 3045303**... one small problem: MS 15-072/KB 3069392 runs afoul of Cisco WebEx's ability to share screens. Cisco has already released a fix:
> https://tools.cisco..../bug/CSCuv36151
In her monthly patch spreadsheet[4], PatchManagement.org moderator Susan Bradley also notes some reports of problems with print spoolers after installing the MS 15-072/KB 3069392 patch***, but the reports are scattered and most (but not all) seem to clear up, particularly when switching to the HP Universal driver 6.0. There's also this note from Microsoft about the re-issuing of the January patch MS 15-006/KB 3004365:
'Bulletin revised to inform customers of the July 14, 2015 reoffering of the 3004365 update for Windows 8.1 and Windows Server 2012 R2 systems. The update provides defense-in-depth measures beyond what was provided in the original update issued on January 13, 2015. Customers running these operating systems who have already successfully applied the update should -reinstall- the update to be best protected from the vulnerability discussed in this bulletin'[5] ..."

* https://support.micr...n-us/kb/3065718

** https://support.micr...n-us/kb/3045303

*** https://support.micr...n-us/kb/3069392

4] https://onedrive.liv...edby&app=Excel

5] https://technet.micr...curity/ms15-006
Updated: July 22, 2015
 

:ph34r: :ph34r:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#4 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 28 July 2015 - 10:55 AM

FYI...

Win10 patch KB 3074683 fixes Explorer crash caused by KB 3074681
- http://www.infoworld...kb-3074681.html
Jul 28, 2015 - "Overnight, Microsoft released a patch, dubbed KB 3074683*, which appears to fix the problems caused by a Windows 10 Technical Preview build 10240 update; the KB 3074681 patch triggered Explorer crashes in certain circumstances. If you're using build 10240, your machine probably rebooted and the fix is installed..."
(More detail at the infoworld URL above.)
* https://support.micr...n-us/kb/3074683
Last Review: 07/27/2015 - Rev: 1.0
Applies to:
    Windows 10 Home, released in July 2015
    Windows 10 Enterprise, released in July 2015
    Windows 10 Education, released in July 2015
    Windows 10 Pro, released in July 2015
___

How to temporarily prevent a Windows or driver update from reinstalling in Windows 10
- https://support.micr...n-us/kb/3073930
"Symptoms: In Windows 10, your device is always kept up to date with the latest features and fixes. Updates and drivers are installed automatically, with no need to select which updates are needed or not needed. In rare cases, a specific driver or update might temporarily cause issues with your device, and in this case you will need a way to prevent the problematic driver or update from reinstalling automatically the next time Windows Updates are installed..."
Last Review: 07/28/2015 - Rev: 5.0
Applies to:
    Windows 10
    Windows 10 Insider Preview
 

:ph34r: :ph34r:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#5 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 30 July 2015 - 07:36 AM

FYI...

Patching collides with Win10...
- http://windowssecret...-win10-release/
July 29, 2015 - "... Microsoft made good on its promise to release a free Win10 upgrade for consumer Win7 SP1 and Win8.1 systems. I assume that those who like living dangerously have already started the upgrade process on a production machine -without- first ensuring they have complete and functional backups stored on external drives. I wish them the best of luck. But wiser Windows users will put off installing the new OS on their main systems for at least a month or two, giving Microsoft time to work out the inevitable kinks in the system..."
(More detail at the URL above.)
___

Updating to Win10: Definitely a mixed experience
- http://windowssecret...xed-experience/
July 29, 2015
___

Microsoft Security Advisory 2755801
Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
- https://technet.micr...ecurity/2755801
V45.0 (July 29, 2015): Added the 3074683 update for Windows 10 systems to the Current Update section.
___

Windows 10 Shares Your Wi-Fi With Contacts
- http://krebsonsecuri...-with-contacts/
July 29, 2015
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 30 July 2015 - 08:05 AM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#6 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 01 August 2015 - 05:26 AM

FYI...

No wireless networks are available after you upgrade from Windows 8.1 to Windows 10
- https://support.micr...n-us/kb/3084164
Last Review: 08/05/2015 - Rev: 12.0
"Note: Multiple issues may cause this problem. This article lists the known issues and the appropriate resolutions..."
___

Specifications: an overview of requirements, editions, and languages available for Windows 10.
- https://www.microsof...cations#upgrade
___

MS rolls out first official Windows 10 patches: KB 3081424, KB 3081427
The first post-July 29 updates include little documentation, but know that one of them clocks in at more than 300MB
- http://www.infoworld...kb-3081427.html
Aug 5, 2015 - "Microsoft is rolling out a cumulative update for Windows 10, identified as KB 3081424*, which replaces the earlier cumulative update KB 3074683**, which, in turn, fixed a Windows Explorer crash caused by KB 3074681. To install KB 3081424, you must already have KB 3074683 on your machine. This should be a given, since updates are forced onto Win10 Home and Win10 Pro machines that aren’t attached to an update server. As best I can tell, this is the first post-July 29 cumulative update for Windows 10. It’s huge, with many hundreds of changed files in the manifest..."

* https://support.micr...n-us/kb/3081424
Last Review: 08/05/2015 - Rev: 3.1
Applies to:
    Windows 10

** https://support.micr...n-us/kb/3074683
Last Review: 08/04/2015 - Rev: 5.0
Applies to:
    Windows 10 Home, released in July 2015
    Windows 10 Enterprise, released in July 2015
    Windows 10 Education, released in July 2015
    Windows 10 Pro, released in July 2015

- https://support.micr...n-us/kb/3074681
Last Review: 07/31/2015 - Rev: 3.0
Applies to:
    Windows 10
___

Win10 - How to Restore or Choose Your Default Browser
- https://blog.mozilla...efault-browser/

> https://blog.mozilla.org/
 

:ph34r: :ph34r:


Edited by AplusWebMaster, 06 August 2015 - 04:16 PM.

.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#7 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 07 August 2015 - 06:47 AM

FYI...

Error opening Office docs after upgrading to Win10
- https://support.micr...n-us/kb/3086786
Last Review: 08/04/2015 - Rev: 1.0 - "Symptoms: After upgrading from Windows 7 to Windows 10, you may find that some of your Office -2013- documents do not open and you receive one of the following errors:
- Word: “Word experienced an error trying to open the file”
- Excel: “This file is corrupt and cannot be opened”
- PowerPoint: one of the following -
        “The application was unable to start correctly"
        “PowerPoint found a problem with <filename>"
        “Sorry, PowerPoint can’t read <filename>" ...
Resolution: There are two workarounds for this issue. Try the first workaround, and if that doesn’t resolve the issue, try the second...:
 

:ph34r:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.


#8 AplusWebMaster

AplusWebMaster

    AplusWebMaster

  • Authentic Member
  • PipPipPipPipPipPipPip
  • 10,472 posts
  • Interests:... The never-ending battle for Truth, Justice, and the American way.

Posted 08 August 2015 - 04:40 AM

FYI..

Required Group Policy Preference Actions for MS Security Bulletin MS14-025
- https://www.us-cert....rosoft-Security
Aug 07, 2015 - "US-CERT is aware of continued exploitation of insecurely stored passwords in Group Policy Preferences, due to -incomplete- implementations of Microsoft Security Bulletin MS14-025*. Systems may still be vulnerable to exploitation if administrators have not cleared all previously stored passwords from their environment. An attacker may decrypt these passwords and use them to gain escalated privileges.
US-CERT strongly recommends that administrators employ the PowerShell script provided in Microsoft  Knowledge Base Article 2962486** and follow the included instructions for clearing all "CPassword" preferences from their environment."

Microsoft Security Bulletin MS14-025 - Important
Vulnerability in Group Policy Preferences Could Allow Elevation of Privilege (2962486)
* https://technet.micr...curity/ms14-025
May 13, 2014

** https://support.micr...n-us/kb/2962486
Last Review: 05/13/2014 - Rev: 1.1
 

:ph34r: :ph34r:


.The machine has no brain.
 ......... Use your own.
Browser check for updates here.
YOU need to defend against -all- vulnerabilities.
Hacks only need to find -1- to get in...
.

Related Topics



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users