Microsoft Security Bulletin Summary for January 13, 2015

Discussion in 'other security issues & news' started by NICK ADSL UK, Jan 13, 2015.

Thread Status:
Not open for further replies.
  1. NICK ADSL UK

    NICK ADSL UK Administrator

    Joined:
    May 13, 2003
    Posts:
    9,505
    Location:
    UK
    Microsoft Security Bulletin Summary for January 13, 2015

    Note: There may be latency issues due to replication, if the page does not display keep refreshing
    Today Microsoft released the following Security Bulletin(s).
    http://technet.microsoft.com/en-us/library/dn903782.aspx

    Important (7)
    Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (3019215)
    https://technet.microsoft.com/library/security/MS15-008

    Vulnerability in Network Policy Server RADIUS Implementation Could Cause Denial of Service (3014029)
    https://technet.microsoft.com/library/security/MS15-007

    Vulnerability in Windows Error Reporting Could Allow Security Feature Bypass (3004365)
    https://technet.microsoft.com/library/security/MS15-006

    Vulnerability in Network Location Awareness Service Could Allow Security Feature Bypass (3022777)
    https://technet.microsoft.com/library/security/MS15-005

    Vulnerability in Windows Components Could Allow Elevation of Privilege (3025421)
    https://technet.microsoft.com/library/security/MS15-004

    Vulnerability in Windows User Profile Service Could Allow Elevation of Privilege (3021674)
    https://technet.microsoft.com/library/security/MS15-003

    Vulnerability in Windows Application Compatibility Cache Could Allow Elevation of Privilege (3023266)
    https://technet.microsoft.com/library/security/MS15-001

    Critical (1)
    Vulnerability in Windows Telnet Service Could Allow Remote Code Execution (3020393)
    https://technet.microsoft.com/library/security/MS15-002

    Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.
    If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact For home users, no-charge support for security updates (only!) is available by calling 800-MICROSOFT (800-642-7676) in the US or 877-568-2495 in Canada.
    As always, download the updates only from the vendors website - visit Windows Update and Office Update or Microsoft Update websites. You may also get the updates thru Automatic Updates functionality in Windows system.

    Security Tool
    Find out if you are missing important Microsoft product updates by using MBSA
     
    Last edited: Jan 13, 2015
  2. NICK ADSL UK

    NICK ADSL UK Administrator

    Joined:
    May 13, 2003
    Posts:
    9,505
    Location:
    UK
    Summary
    =======
    The following bulletins have undergone a major revision increment.
    * MS14-080 - Critical

    Bulletin Information:
    =====================
    MS14-080 - Critical
    - Title: Cumulative Security Update for Internet Explorer
    - https://technet.microsoft.com/library/security/ms14-080
    - Reason for Revision: V2.0 (January 13, 2015): To address issues
    with Security Update 3008923, Microsoft re-released MS14-080 to
    comprehensively address CVE-2014-6363. In addition to installing
    update 3008923, customers running Internet Explorer 10 on Windows 8,
    Windows Server 2012, or Window RT should also install update
    3029449, which has been added with this rerelease. Customers who
    have already successfully installed the 3008923 update, which has
    not changed since its original release, do not need to reinstall
    it. See Microsoft Knowledge Base Article 3008923 for more
    information.
    - Originally posted: December 9, 2014
    - Updated: January 13, 2015
    - Bulletin Severity Rating: Critical
    - Version: 2.0
     
  3. NICK ADSL UK

    NICK ADSL UK Administrator

    Joined:
    May 13, 2003
    Posts:
    9,505
    Location:
    UK
    Microsoft Security Bulletin & Bulletin Summary Minor Revisions Issued: Janu
    Summary

    The following bulletins and bulletin summary have undergone a minor
    revision increment.

    Please see the appropriate bulletin or bulletin summary for more
    details.

    * MS15-006 - Important


    Bulletin Information:


    MS15-006 - Important

    - Title: Vulnerability in Windows Error Reporting Could Allow
    Security Feature Bypass
    - »technet.microsoft.com/library/se···ms15-006
    - Reason for Revision: V1.1 (January 21, 2015): Bulletin revised
    to correct Server Core installation entries in the Affected
    Software and Severity Ratings tables. This is an informational
    change only. Customers who have already successfully installed
    the update do not have to take any action.
    - Originally posted: January 13, 2015
    - Updated: January 21, 2015
    - Bulletin Severity Rating: Important
    - Version: 1.1
     
  4. NICK ADSL UK

    NICK ADSL UK Administrator

    Joined:
    May 13, 2003
    Posts:
    9,505
    Location:
    UK
    Microsoft Security Advisory Notification Issued: January 27, 2015
    Security Advisories Updated or Released Today

    * Microsoft Security Advisory (2755801)
    - Title: Update for Vulnerabilities in Adobe Flash Player in
    Internet Explorer
    - »technet.microsoft.com/library/se···/2755801
    - Revision Note: V36.0 (January 27, 2015): Added the 3035034
    update to the Current Update section.
    --
     
  5. NICK ADSL UK

    NICK ADSL UK Administrator

    Joined:
    May 13, 2003
    Posts:
    9,505
    Location:
    UK
    Microsoft Security Advisory Notification Issued: February 5, 2015
    Security Advisories Updated or Released Today

    * Microsoft Security Advisory (2755801)
    - Title: Update for Vulnerabilities in Adobe Flash Player in
    Internet Explorer
    - »technet.microsoft.com/library/se···/2755801
    - Revision Note: V37.0 (February 5, 2015): Added the 3021953
    update to the Current Update section.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.