Page 17 of 47 FirstFirst ... 713141516171819202127 ... LastLast
Results 161 to 170 of 467

Thread: Microsoft Alerts

  1. #161
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation MS Security Advisories - May 13, 2014

    FYI...

    Microsoft Security Advisory 2871997
    Update to Improve Credentials Protection and Management
    - https://technet.microsoft.com/en-us/...curity/2871997
    May 13, 2014 - "Microsoft is announcing the availability of an update for supported editions of Windows 8, Windows RT, Windows Server 2012, Windows 7, and Windows Server 2008 R2 that improves credential protection and domain authentication controls to reduce credential theft. This update provides additional protection for the Local Security Authority (LSA), adds a restricted admin mode for Credential Security Support Provider (CredSSP), introduces support for the protected account-restricted domain user category, and enforces stricter authentication policies for Windows 7, Windows Server 2008 R2, Windows 8, and Windows Server 2012 machines as clients.
    Recommendation. Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service..."
    - https://support.microsoft.com/kb/2871997

    Microsoft Security Advisory 2962824
    Update Rollup of Revoked Non-Compliant UEFI Modules
    - https://technet.microsoft.com/en-us/...curity/2962824
    May 13, 2014 - "With this advisory, Microsoft is revoking the digital signature for four private, third-party UEFI (Unified Extensible Firmware Interface) modules that could be loaded during UEFI Secure Boot. These UEFI (Unified Extensible Firmware Interface) modules are partner modules distributed in backup and recovery software. When the update is applied, the affected UEFI modules will no longer be trusted and will no longer load on systems where UEFI Secure Boot is enabled. The affected UEFI modules consist of specific Microsoft-signed modules that are not in compliance with our certification program and are being revoked at the request of the author. Microsoft is not aware of any misuse of the affected UEFI modules..."
    - https://support.microsoft.com/kb/2962824

    Microsoft Security Advisory 2960358
    Update for Disabling RC4 in .NET TLS
    - https://technet.microsoft.com/en-us/...curity/2960358
    May 13, 2014 - "Microsoft is announcing the availability of an update for Microsoft .NET Framework that disables RC4 in Transport Layer Security (TLS) through the modification of the system registry. Use of RC4 in TLS could allow an attacker to perform man-in-the-middle attacks and recover plaintext from encrypted sessions.
    Recommendation. Microsoft recommends that customers download and test the update before deploying it in their environments as soon as possible..."
    - https://support.microsoft.com/kb/2960358

    Microsoft Security Advisory 2755801
    Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
    - https://technet.microsoft.com/en-us/...curity/2755801
    Updated: May 13, 2014 Ver: 24.0 - "Microsoft is announcing the availability of an update for Adobe Flash Player in Internet Explorer on all supported editions of Windows 8, Windows Server 2012, Windows RT, Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1. The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10 and Internet Explorer 11..."
    - https://support.microsoft.com/kb/2957151

    Microsoft Security Advisory 2269637
    Insecure Library Loading Could Allow Remote Code Execution
    - https://technet.microsoft.com/en-us/...curity/2269637
    Updated: May 13, 2014 Ver: 19.0 - "Microsoft is aware that research has been published detailing a remote attack vector for a class of vulnerabilities that affects how applications load external libraries. This issue is caused by specific insecure programming practices that allow so-called "binary planting" or "DLL preloading attacks". These practices could allow an attacker to remotely execute arbitrary code in the context of the user running the vulnerable application when the user opens a file from an untrusted location. This issue is caused by applications passing an insufficiently qualified path when loading an external library. Microsoft has issued guidance to developers in the MSDN article, Dynamic-Link Library Security, on how to correctly use the available application programming interfaces to prevent this class of vulnerability. Microsoft is also actively reaching out to third-party vendors through the Microsoft Vulnerability Research Program to inform them of the mitigations available in the operating system. Microsoft is also actively investigating which of its own applications may be affected. In addition to this guidance, Microsoft is releasing a tool that allows system administrators to mitigate the risk of this new attack vector by altering the library loading behavior system-wide or for specific applications. This advisory describes the functionality of this tool and other actions that customers can take to help protect their systems...
    V19.0 (May 13, 2014): Added the following Microsoft Security Bulletin to the Updates relating to Insecure Library Loading section: MS14-023, "Vulnerabilities in Microsoft Office Could Allow Remote Code Execution."

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  2. #162
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Unhappy KB2920189 and 2962824 problems

    FYI...

    Problems with 'revoked UEFI module' patches KB 2920189 and 2962824
    - http://www.infoworld.com/t/microsoft...2962824-242533
    May 14, 2014

    Microsoft Security Advisory 2962824
    Update Rollup of Revoked Non-Compliant UEFI Modules
    - https://support.microsoft.com/kb/2962824
    May 13, 2014 - Rev: 2.0

    - https://support.microsoft.com/kb/2920189
    Last Review: May 13, 2014 - Rev: 2.0
    ___

    - http://windowssecrets.com/patch-watc...2013-continue/
    May 14, 2014 - "... concentrate on the security updates and leave most of the nonsecurity fixes for later..."

    Last edited by AplusWebMaster; 2014-05-15 at 16:26.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  3. #163
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Post Win8.1 Update - more errors

    FYI...

    MS acknowledges more errors, 80070371 and 80071A91 - installing Win8.1 Update - KB 2919355
    - http://www.infoworld.com/t/microsoft...b-2919355-2426
    May 16, 2014

    - https://support.microsoft.com/kb/2919355
    Last Review: May 16, 2014 - Rev: 21.0
    ___

    Security Bulletin Webcast Q&A
    - http://blogs.technet.com/b/msrc/p/ma...letin-q-a.aspx
    May 14, 2014

    Last edited by AplusWebMaster; 2014-05-18 at 04:14.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  4. #164
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation IE 0-day - unpatched - 2014.05.21 ...

    FYI...

    IE 0-day - CMarkup Object Processing Flaw Lets Remote Users Execute Arbitrary Code
    - http://www.securitytracker.com/id/1030266
    CVE Reference: https://web.nvd.nist.gov/view/vuln/d...=CVE-2014-1770
    May 21 2014
    Impact: Execution of arbitrary code via network, User access via network
    Vendor Confirmed: Yes
    Version(s): 8; possibly other versions
    Description: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory error in the processing of CMarkup objects to execute arbitrary code on the target system. The code will run with the privileges of the target user.
    The vendor was notified on October 11, 2013.
    The original advisory is available at:
    - http://zerodayinitiative.com/advisories/ZDI-14-140/
    Solution: No solution was available at the time of this entry...
    ___

    - https://atlas.arbor.net/briefs/index#1620714508
    Elevated Severity
    23 May 2014
    A new zero-day vulnerability for Internet Explorer 8 has been disclosed.
    Analysis: The flaw, which exists in the handling of CMarkup objects, could allow remote attackers to execute arbitrary code. Exploitation of this vulnerability requires user interaction, either by visiting a malicious site or opening a malicious file... The vulnerability is currently unpatched; it is recommended that users set Internet security zone settings to "High" to block ActiveX Controls and configure IE to prompt before running Active Scripting. Users should also ensure that Microsoft’s EMET (Enhanced Mitigation Experience Toolkit) is enabled.

    Last edited by AplusWebMaster; 2014-05-24 at 04:32.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  5. #165
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation MS Security Advisory 2915720

    FYI...

    Microsoft Security Advisory 2915720
    Changes in Windows Authenticode Signature Verification
    - https://technet.microsoft.com/en-us/...curity/2915720
    Published: Dec 10, 2013 | Updated: May 21, 2014 Version: 1.3
    "Microsoft is announcing the availability of an update for all supported releases of Microsoft Windows to change how signatures are verified for binaries signed with the Windows Authenticode signature format. The change is included with Security Bulletin MS13-098, but will not be enabled until August 12, 2014. Once enabled, the new default behavior for Windows Authenticode signature verification will no longer allow extraneous information in the WIN_CERTIFICATE structure. Note that after August 12, 2014, Windows will no longer recognize non-compliant binaries as signed.
    Recommendation: Microsoft recommends that by August 12, 2014, executables authors ensure that all signed binaries comport with this new verification behavior by containing no extraneous information in the WIN_CERTIFICATE structure. Microsoft also recommends that customers appropriately test this change to evaluate how it will behave in their environments...
    Suggested Actions: Review Microsoft Root Certificate Program Technical Requirements
    Customers who are interested in learning more about the topic covered in this advisory should review Windows Root Certificate Program - Technical Requirements*..."
    * http://social.technet.microsoft.com/...uirements.aspx
    "... The Technical Requirements version 1.1 have been superseded by this version 2.0..."

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  6. #166
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Win8.1 update - Rev: 23.0 ...

    FYI...

    Win8.1 update ...
    - https://support.microsoft.com/kb/2919355
    May 30, 2014 - Rev: 23.0
    Last Review: June 4, 2014 - Rev: 24.0
    ___

    Cleaning up May’s Windows and Office updates
    - http://windowssecrets.com/patch-watc...ffice-updates/
    June 4, 2014
    ___

    Overview of KB2871997
    - http://blogs.technet.com/b/srd/archi...kb2871997.aspx
    5 Jun 2014

    - https://support.microsoft.com/kb/2871997#FixItForMe
    Last Review: June 5, 2014 - Rev: 4.0
    Microsoft Fix it 20141 - "... This Fix it solution changes the UseLogonCredentials registry key to disable WDigest passwords from being stored in memory. After you install security update 2871997 and then apply this Fix it solution to systems that are running Windows 7, Windows Server 2008 R2, Windows 8, or Windows Server 2012, you should no longer have clear-text credentials stored in memory.
    Note: This Fix it solution will take effect only if security update 2871997 is installed..."

    Last edited by AplusWebMaster; 2014-06-06 at 01:00.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  7. #167
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation MS Security Bulletin Advance Notification - June 2014

    FYI...

    - https://technet.microsoft.com/library/security/ms14-jun
    June 5, 2014 - "This is an advance notification of security bulletins that Microsoft is intending to release on June 10, 2014...
    (Total of -7-)

    Bulletin 1 - Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer
    Bulletin 2 - Critical - Remote Code Execution - Requires restart - Microsoft Windows, Microsoft Office, Microsoft Lync
    Bulletin 3 - Important - Remote Code Execution - May require restart - Microsoft Office
    Bulletin 4 - Important - Information Disclosure - May require restart - Microsoft Windows
    Bulletin 5 - Important - Information Disclosure - May require restart - Microsoft Lync Server
    Bulletin 6 - Important - Denial of Service - Requires restart - Microsoft Windows
    Bulletin 7 - Important - Tampering - May require restart - Microsoft Windows

    - http://blogs.technet.com/b/msrc/arch...n-release.aspx
    5 Jun 2014
    ___

    Overview of KB2871997
    - http://blogs.technet.com/b/srd/archi...kb2871997.aspx
    5 Jun 2014

    - https://support.microsoft.com/kb/2871997#FixItForMe
    Last Review: June 5, 2014 - Rev: 4.0
    Microsoft Fix it 20141 - "... This Fix it solution changes the UseLogonCredentials registry key to disable WDigest passwords from being stored in memory. After you install security update 2871997 and then apply this Fix it solution to systems that are running Windows 7, Windows Server 2008 R2, Windows 8, or Windows Server 2012, you should no longer have clear-text credentials stored in memory.
    Note: This Fix it solution will take effect only if security update 2871997 is installed..."

    Last edited by AplusWebMaster; 2014-06-06 at 02:12.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  8. #168
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation MS Security Bulletin Summary - June 2014

    FYI...

    - https://technet.microsoft.com/library/security/ms14-jun
    June 10, 2014 - "This bulletin summary lists security bulletins released for June 2014...
    (Total of -7-)

    Microsoft Security Bulletin MS14-035 - Critical
    Cumulative Security Update for Internet Explorer (2969262)
    - https://technet.microsoft.com/library/security/ms14-035
    Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer
    "... resolves -59- items..." *

    Microsoft Security Bulletin MS14-036 - Critical
    Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution (2967487)
    - https://technet.microsoft.com/library/security/ms14-036
    Critical - Remote Code Execution - Requires restart - Microsoft Windows, Microsoft Office, Microsoft Lync

    Microsoft Security Bulletin MS14-034 - Important
    Vulnerability in Microsoft Word Could Allow Remote Code Execution (2969261)
    - https://technet.microsoft.com/library/security/ms14-034
    Important - Remote Code Execution - May require restart - Microsoft Office

    Microsoft Security Bulletin MS14-033 - Important
    Vulnerability in Microsoft XML Core Services Could Allow Information Disclosure (2966061)
    - https://technet.microsoft.com/en-us/...urity/ms14-033
    Important - Information Disclosure - May require restart - Microsoft Windows

    Microsoft Security Bulletin MS14-032 - Important
    Vulnerability in Microsoft Lync Server Could Allow Information Disclosure (2969258)
    - https://technet.microsoft.com/library/security/ms14-032
    Important - Information Disclosure - May require restart - Microsoft Lync Server

    Microsoft Security Bulletin MS14-031 - Important
    Vulnerability in TCP Protocol Could Allow Denial of Service (2962478)
    - https://technet.microsoft.com/library/security/ms14-031
    Important - Denial of Service - Requires restart - Microsoft Windows

    Microsoft Security Bulletin MS14-030 - Important
    Vulnerability in Remote Desktop Could Allow Tampering (2969259)
    - https://technet.microsoft.com/library/security/ms14-030
    Important - Tampering - May require restart - Microsoft Windows
    ___

    * http://blogs.technet.com/b/msrc/arch...n-release.aspx
    10 Jun 2014

    Deployment Priority, Severity, and Exploit Index
    - http://blogs.technet.com/cfs-file.as...Deployment.jpg
    ___

    June 2014 Office Updates
    - http://blogs.technet.com/b/office_su...e-release.aspx
    10 Jun 2014 - "... There are 7 security updates (2 bulletins*) and 20 non-security updates..."
    * MS14-034, MS14-036
    ___

    ISC Analysis
    - https://isc.sans.edu/diary.html?storyid=18233
    2014-06-10

    .
    Last edited by AplusWebMaster; 2014-06-10 at 23:47.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  9. #169
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation MS Security Advisories - 2014.06.10 ...

    FYI...

    June 2014 security fixes ...
    - http://windowssecrets.com/patch-watc...ecurity-fixes/
    June 11, 2014

    Win8.1 Update ...
    - https://support.microsoft.com/kb/2919355
    May 30, 2014 - Rev: 23.0
    June 4, 2014 - Rev: 24.0
    Last Review: June 10, 2014 - Rev: 26.0
    ___

    Microsoft Security Advisory 2962824
    Update Rollup of Revoked Non-Compliant UEFI Modules
    - https://technet.microsoft.com/en-us/...curity/2962824
    Updated: June 10, 2014 - Ver: 1.1 - "With this advisory, Microsoft is revoking the digital signature for four private, third-party UEFI (Unified Extensible Firmware Interface) modules that could be loaded during UEFI Secure Boot. These UEFI (Unified Extensible Firmware Interface) modules are partner modules distributed in backup and recovery software. When the update is applied, the affected UEFI modules will no longer be trusted and will no longer load on systems where UEFI Secure Boot is enabled. The affected UEFI modules consist of specific Microsoft-signed modules that are not in compliance with our certification program and are being revoked at the request of the author. Microsoft is not aware of any misuse of the affected UEFI modules. Microsoft is proactively revoking these non-compliant modules in coordination with their author as part of ongoing efforts to protect customers. This action only affects systems running Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2 that are capable of UEFI Secure Boot where the system is configured to boot via UEFI and Secure Boot is enabled. There is no action on systems that do not support UEFI Secure Boot or where it is disabled...
    Known Issues. Microsoft Knowledge Base Article 2962824* documents the currently known issues that customers may experience when installing this update. The article also documents recommended solutions for these issues."
    * https://support.microsoft.com/kb/2962824

    Microsoft Security Advisory 2755801
    Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
    - https://technet.microsoft.com/en-us/...curity/2755801
    Updated: June 10, 2014 - Ver: 25.0 - "... Microsoft recommends that customers apply the current update immediately using update management software, or by checking for updates using the Microsoft Update service. Since the update is cumulative, only the current update will be offered. Customers do not need to install previous updates as a prerequisite for installing the current update. On June 10, 2014, Microsoft released an update (2966072) for Internet Explorer 10 on Windows 8, Windows Server 2012, and Windows RT, and for Internet Explorer 11 on Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1. The update addresses the vulnerabilities described in Adobe Security bulletin APSB14-16*..."
    * http://helpx.adobe.com/security/prod...apsb14-16.html

    Microsoft Security Advisory 2862973
    Update for Deprecation of MD5 Hashing Algorithm for Microsoft Root Certificate Program
    - https://technet.microsoft.com/en-us/...curity/2862973
    Updated: June 10, 2014 - Ver: 3.0 - "Microsoft is announcing the availability of an update for supported editions of Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, and Windows RT that restricts the use of certificates with MD5 hashes. This restriction is limited to certificates issued under roots in the Microsoft root certificate program. Usage of MD5 hash algorithm in certificates could allow an attacker to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. Recommendation: Microsoft recommends that customers apply the update at the earliest opportunity. Please see the Suggested Actions section of this advisory for more information..."
    - https://support.microsoft.com/kb/2862966

    - https://support.microsoft.com/kb/2862973

    Last edited by AplusWebMaster; 2014-06-12 at 20:51.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  10. #170
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation June 2014 Security Bulletin Webcast Q&A

    FYI...

    - http://blogs.technet.com/b/msrc/arch...d-q-amp-a.aspx
    13 Jun 2014 - "Today we published the June 2014 Security Bulletin webcast questions and answers page*..."

    June 2014 Security Bulletin Webcast Q&A
    * http://blogs.technet.com/b/msrc/p/ju...letin-q-a.aspx
    June 11, 2014


    .
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •