Microsoft Alerts

M$ reissues KB 2952664, KB 2976978, KB 2977759

FYI...

Deja vu all over again: Microsoft reissues KB 2952664, KB 2976978, KB 2977759
The three Win7/8.1 updates have returned and brought the warmed-over KB 3138612 and 3138615 Windows Update patches with them
- http://www.infoworld.com/article/30...eissues-kb-2952664-kb-2976978-kb-2977759.html
Mar 2, 2016 - "Yesterday, Microsoft re-re-released three patches - KB 2952664, KB 2976978 and KB 2977759 - all of which offer "compatibility" updates for those of you hell-bent on upgrading from Windows 7 or 8.1 to Windows 10 via Windows Update. We also received two -new- patches - KB 3138612 and KB 3138615 - that update Windows Update by replacing their tired, old counterparts... If you're running Windows 7 and headed to Windows 10 sometime soon, then by all means, install the 'patch'. If not, fuhgeddaboutit... Bottom line: Unless Windows Update is horribly slow, I don't see any reason at all to install any of these 'optional' updates."

Compatibility update for upgrading Windows 7
- https://support.microsoft.com/en-us/kb/2952664
Last Review: 03/01/2016 17:31:00 - Rev: 18.0

Compatibility update for Windows 8.1 and Windows 8
- https://support.microsoft.com/en-us/kb/2976978
Last Review: 03/01/2016 17:32:00 - Rev: 21.0

Compatibility update for Windows 7 RTM
- https://support.microsoft.com/en-us/kb/2977759
Last Review: 03/01/2016 17:33:00 - Rev: 17.0
___

Windows Update Client for Windows 7 and Windows Server 2008 R2: March 2016
- https://support.microsoft.com/en-us/kb/3138612
Last Review: 03/01/2016 17:27:00 - Rev: 1.0

Windows Update Client for Windows 8.1 and Windows Server 2012 R2: March 2016
- https://support.microsoft.com/en-us/kb/3138615
Last Review: 03/01/2016 17:27:00 - Rev: 1.0

:fear::fear:
 
MS Security Bulletin Summary - March 2016

FYI...

- https://technet.microsoft.com/en-us/library/security/ms16-Mar
Mar 8, 2016 - "This bulletin summary lists security bulletins released for March 2016...
(Total of -13-)

Microsoft Security Bulletin MS16-023 - Critical
Cumulative Security Update for Internet Explorer (3142015)
- https://technet.microsoft.com/library/security/MS16-023
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer

Microsoft Security Bulletin MS16-024 - Critical
Cumulative Security Update for Microsoft Edge (3142019)
- https://technet.microsoft.com/library/security/MS16-024
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Microsoft Edge

Microsoft Security Bulletin MS16-025 - Important
Security Update for Windows Library Loading to Address Remote Code Execution (3140709)
- https://technet.microsoft.com/library/security/MS16-025[/b]
Important - Remote Code Execution - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-026 - Critical
Security Update for Graphic Fonts to Address Remote Code Execution (3143148)
- https://technet.microsoft.com/en-us/library/security/MS16-026
Critical - Remote Code Execution - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-027 - Critical
Security Update for Windows Media to Address Remote Code Execution (3143146)
- https://technet.microsoft.com/en-us/library/security/MS16-027
Critical - Remote Code Execution - May require restart - Microsoft Windows

Microsoft Security Bulletin MS16-028 - Critical
Security Update for Microsoft Windows PDF Library to Address Remote Code Execution (3143081)
- https://technet.microsoft.com/en-us/library/security/MS16-028
Critical - Remote Code Execution - May require restart - Microsoft Windows

Microsoft Security Bulletin MS16-029 - Important
Security Update for Microsoft Office to Address Remote Code Execution (3141806)
- https://technet.microsoft.com/library/security/MS16-029
Important - Remote Code Execution - May require restart - Microsoft Office, Microsoft Office Services and Web Apps, Microsoft Server Software

Microsoft Security Bulletin MS16-030 - Important
Security Update for Windows OLE to Address Remote Code Execution (3143136)
- https://technet.microsoft.com/en-us/library/security/MS16-030
Important - Remote Code Execution - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-031 - Important
Security Update for Microsoft Windows to Address Elevation of Privilege (3140410)
- https://technet.microsoft.com/en-us/library/security/MS16-031
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-032 - Important
Security Update for Secondary Logon to Address Elevation of Privilege (3143141)
- https://technet.microsoft.com/en-us/library/security/MS16-032
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-033 - Important
Security Update for Windows USB Mass Storage Class Driver to Address Elevation of Privilege (3143142)
- https://technet.microsoft.com/en-us/library/security/MS16-033
Important - Elevation of Privilege - May require restart - Microsoft Windows

Microsoft Security Bulletin MS16-034 - Important
Security Update for Windows Kernel-Mode Drivers to Address Elevation of Privilege (3143145)
- https://technet.microsoft.com/en-us/library/security/MS16-034
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-035 - Important
Security Update for .NET Framework to Address Security Feature Bypass (3141780)
- https://technet.microsoft.com/library/security/MS16-035
Important - Elevation of Privilege - May require restart - Microsoft Windows, Microsoft .NET Framework
___

MS16-023: http://www.securitytracker.com/id/1035203
MS16-024: http://www.securitytracker.com/id/1035204
MS16-025: http://www.securitytracker.com/id/1035205
MS16-026: http://www.securitytracker.com/id/1035198
MS16-027: http://www.securitytracker.com/id/1035200
MS16-028: http://www.securitytracker.com/id/1035202
MS16-029: http://www.securitytracker.com/id/1035206
> http://www.securitytracker.com/id/1035207
MS16-030: http://www.securitytracker.com/id/1035208
MS16-031: http://www.securitytracker.com/id/1035209
MS16-032: http://www.securitytracker.com/id/1035210
MS16-033: http://www.securitytracker.com/id/1035211
MS16-034: http://www.securitytracker.com/id/1035212
MS16-035: http://www.securitytracker.com/id/1035213
___

- http://blogs.technet.com/b/msrc/archive/2016/03/08/march-2016-security-update-release-summary.aspx
8 Mar 2016

Security Advisories - March 2016
- https://technet.microsoft.com/en-us/library/security/mt631688.aspx
___

March 2016 Office Update Release
- https://blogs.technet.microsoft.com.../2016/03/09/march-2016-office-update-release/
March 9, 2016 - The March 2016 Public Update releases for Office are now available. This month, there are -22- security updates (1 bulletin) and -41- non-security updates.
Security bulletins: MS16-029:
> https://technet.microsoft.com/en-us/library/security/ms16-029.aspx
All of the security and non-security updates for March are listed in KB article 3143491:
> https://support.microsoft.com/en-us/kb/3143491
Last Review: 03/09/2016 00:52:00 - Rev: 1.0
___

ISC Analysis
- https://isc.sans.edu/mspatchdays.html?viewday=2016-03-08
2016-03-08

Qualys Analysis
- https://blog.qualys.com/laws-of-vulnerabilities/2016/03/08/patch-tuesday-march-2016
March 8, 2016

.
 
Last edited:
Access 2010 KB 3085515 fails...

FYI...

March 2016 Office Update Release
- https://blogs.technet.microsoft.com.../2016/03/09/march-2016-office-update-release/
Update – March 9, 2016 - "KB 3085515* is no longer available because it may prevent Access 2010 from opening VB-enabled apps and wizards. The workaround is to -uninstall- this update. See the Access Support Team blog** for more details."

* https://support.microsoft.com/en-us/kb/3085515
Last Review: 03/09/2016 22:49:00 - Rev: 2.0
"Notice: This update is no longer available from Microsoft Update or the Microsoft Download Center. After you install this update, you may not be able to open Microsoft Visual Basic-enabled apps in Microsoft Access 2010. Also, Access wizards may not run. To work around this problem, -uninstall- this update by following the steps in the "How to uninstall this update"[1] section."
1] https://support.microsoft.com/en-us/kb/3085515#bookmark-uninstall

** http://blogs.technet.com/b/the_micr...e-march-update-for-office-2010-kb3085515.aspx
9 Mar 2016
___

When a security update is not a security update ...
Microsoft buried a 'Get Windows 10 ad generator' inside this month's Internet Explorer security patch for Windows 7 and 8.1
- http://www.infoworld.com/article/30...security-update-is-not-a-security-update.html
Mar 9, 2016 - "If Microsoft's documentation is correct, installing Patch Tuesday's KB 3139929* security update for Internet Explorer also installs a new Windows 10 ad-generating routine called KB 3146449**... putting an 'ad generator' inside a security patch crosses way over the line. In fact, you have to ask yourself if there are any lines any more... It's important to note that KB 3146449 is not installed separately. You can't remove it. If you look in your installed updates list, KB 3146449 doesn't appear. Instead, it's baked into the IE security patch KB 3139929. The only way to get rid of the new advertising inside Internet Explorer 11 is to remove the security patch entirely... Rubbing salt in the wound: PCs attached to -corporate- domains are spared the pain - but not the bits - of this decidedly nonsecurity patch. In bypassing domain-joined PCs, Microsoft has avoided the inevitable screams of "foul play" from its largest corporate customers."

MS16-023: Security update for Internet Explorer
* https://support.microsoft.com/en-us/kb/3139929
Last Review: 03/09/2016 17:51:00 - Rev: 2.0

Updated Internet Explorer 11 capabilities to upgrade Windows 8.1 and Windows 7
** https://support.microsoft.com/en-us/kb/3146449
Last Review: 03/08/2016 17:37:00 - Rev: 1.0

>> http://www.infoworld.com/article/30...hed-pcs-are-sprouting-get-windows-10-ads.html
Mar 9, 2016
> http://core0.staticworld.net/images/article/2016/03/gwx-for-admins-100649333-large.idge.jpg

:fear::fear:
 
Last edited:
MS Security Bulletin MS16-036 - Critical

FYI...

Microsoft Security Bulletin MS16-036 - Critical
Security Update for Adobe Flash Player (3144756)
- https://technet.microsoft.com/en-us/library/security/MS16-036
March 10, 2016 - "This security update resolves vulnerabilities in Adobe Flash Player when installed on all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, Windows RT 8.1, and Windows 10. This security update is rated Critical. The update addresses the vulnerabilities in Adobe Flash Player by updating the affected Adobe Flash libraries contained within Internet Explorer 10, Internet Explorer 11, and Microsoft Edge..."

- https://support.microsoft.com/en-us/kb/3144756
Last Review: 03/10/2016 21:33:00 - Rev: 1.2
___

- https://technet.microsoft.com/en-us/library/security/ms16-mar
V2.0 (March 10, 2016): Bulletin Summary revised to document the out-of-band release of MS16-036.
V2.1 (March 10, 2016): Added a Known Issues reference to the Executive Summaries table for MS16-035. For more information, see Microsoft Knowledge Base Article 3148821*.

After you apply security update 3141780, .NET Framework applications encounter exception errors or unexpected failures while processing files that contain SignedXml
* https://support.microsoft.com/en-us/kb/3148821
Last Review: 03/16/2016 20:51:00 - Rev: 5.0
Applies to:
Microsoft .NET Framework 4.6.1
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.5.2
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.0 Service Pack 2
Microsoft .NET Framework 2.0 Service Pack 2

:fear::fear:
 
Last edited:
MS upgraded users to Win10 -without- their OK

FYI...

MS upgraded users to Win10 -without- their OK
- http://www.infoworld.com/article/30...ded-users-to-windows-10-without-their-ok.html
Mar 14, 2016 - "... the complaints really started piling up Friday evening. More and more Windows 7 and 8.1 customers are complaining that Microsoft upgraded their computers to Windows 10 - and they didn't do anything to bring it on... If you haven't been bit yet, make sure you run GWX-Control-Panel*, then turn Automatic Update to 'Check for Updates but Let Me Choose Whether to Download and Install Them'...
> http://core0.staticworld.net/images...e-checked-and-ready-to-run-100650025-orig.jpg

* http://blog.ultimateoutsider.com/2015/08/using-gwx-stopper-to-permanently-remove.html

- http://ultimateoutsider.com/downloads/

Remove the 'Get Windows 10' icon on Win7 and Win8
> https://www.youtube.com/watch?v=5pcmDTDRGgA&feature=youtu.be

- http://www.infoworld.com/article/30...first-aid-for-forced-windows-10-upgrades.html
Mar 14, 2016 - "... if you enable 'Automatic Update' then Microsoft owns your computer - it can make your PC do anything it likes. You've been pwned..."
___

MS16-023: Security update for Internet Explorer
- https://support.microsoft.com/en-us/kb/3139929
"... Additionally, this security update includes several nonsecurity-related fixes for Internet Explorer..."
Last Review: 03/17/2016 08:33:00 - Rev: 3.0
Applies to:
Internet Explorer 11
Internet Explorer 10
Windows Internet Explorer 9
Windows Internet Explorer 8

Updated Internet Explorer 11 capabilities to upgrade Windows 8.1 and Windows 7
> https://support.microsoft.com/en-us/kb/3146449
"This update adds functionality to Internet Explorer 11 on some computers that lets users learn about Windows 10 or start an upgrade to Windows 10..."
Last Review: 03/08/2016 17:37:00 - Rev: 1.0

Empty "textarea" loses its closing tag after conversion from XML to HTML in Internet Explorer 11
> https://support.microsoft.com/en-us/kb/3144523
"... Note This update was first included in the MS16-023: Security update for Internet Explorer: March 8, 2016."
Last Review: 03/08/2016 17:35:00 - Rev: 1.0

- http://windowssecrets.com/patch-watch/using-ie-11-to-promote-win10-upgrading/
March 10, 2016

- http://www.theinquirer.net/inquirer...rying-adware-in-its-own-patch-tuesday-updates
Mar 10 2016
___

- http://www.theinquirer.net/inquirer...e-tries-to-turn-workers-against-system-admins
Mar 11 2016

:fear::fear: :mad:
 
Last edited:
'Get Windows 10 app' KB 3035583 Rev: 11.0

FYI...

Update installs Get Windows 10 app in Windows 8.1 and Windows 7 SP1
- https://support.microsoft.com/en-us/kb/3035583
Last Review: 03/23/2016 18:07:00 - Rev: 11.0
___

GWX Control Panel
"... disable 'Upgrade to Windows 10' behavior"
> http://ultimateoutsider.com/downloads/
Version: 1.7.4.1
April 1, 2016

'Never 10'
> https://www.grc.com/never10.htm
Mar 28, 2016

> http://www.infoworld.com/article/30...er10-vs-josh-mayfields-gwx-control-panel.html
Mar 30, 2016
___

- http://www.infoworld.com/article/30...b-3035583-get-windows-10-installer-again.html
Mar 24, 2016 - "... strongly recommend you turn Automatic Update to 'Check for updates but let me choose whether to download and install them' and -uncheck- the box marked 'Give me recommended updates the same way I receive important updates'. That advice stands..."
___

>> http://windowssecrets.com/patch-watch/a-few-problem-patches-among-marchs-many-updates/
March 24, 2016 - "... keep the Windows Update option 'Give me recommended updates the same way I receive important updates' -unchecked- ..."

:fear::fear:
 
Last edited:
(MS Office) Upcoming change to the release schedule for non-security updates

FYI...

(MS Office) Upcoming change to the release schedule for non-security updates
> https://blogs.technet.microsoft.com...he-release-schedule-for-non-security-updates/
March 28, 2016 - "We want to let you know about an important change coming to the release schedule for Office updates so that you can plan accordingly. Until now, both security and non-security updates have been released on the second Tuesday of each month.
Starting in April, the non-security updates will be released in Microsoft Update and the Windows Server Update Service (WSUS) on the -first- Tuesday of the month, which is April 5 in this case. This will include all updates that have the Critical or Definition classification. Updates with the Security classification will continue to release on second Tuesday as usual. This change applies only to the MSI version of Office. Office Click-To-Run (C2R) will release on second Tuesday."
Tags: Office Office 2003, Office 2007, Office 2010, Office 2013, Office 2016, Office Public Update, Public Update Security
___

- http://www.infoworld.com/article/30...anges-to-the-schedule-for-office-updates.html
Mar 31, 2016

:fear::fear:
 
Last edited:
More 'Win10 upgrade' updates ...

FYI...

Compatibility update for upgrading Windows 7
- https://support.microsoft.com/en-us/kb/2952664
Last Review: 03/31/2016 16:17:00 - Rev: 19.0
___

Compatibility update for Windows 8.1 and Windows 8
- https://support.microsoft.com/en-us/kb/2976978
Last Review: 03/31/2016 16:18:00 - Rev: 22.0
___

Compatibility update for Windows 7 RTM
- https://support.microsoft.com/en-us/kb/2977759
Last Review: 03/31/2016 16:19:00 - Rev: 18.0
___

> http://www.infoworld.com/article/30...s-patches-kb-2952664-2976978-and-2977759.html
Mar 31, 2016 - "Now weighing in at Version 19.0, KB 2952664 is a 'compatibility update' to ease upgrading from Windows 7 to Windows 10. The analogous patch for Windows 8.1, KB 2976978, is now up to version 22.0, and the patch for Windows 7 without SP 1, KB 2977759, stands at version 18.0. All three have been re-released -six- times in the past three months..."

:fear::fear:
 
More 'Win10 upgrade' updates ...

FYI...

More 'Win10 upgrade' updates ...

Compatibility update for upgrading Windows 7
- https://support.microsoft.com/en-us/kb/2952664
Last Review: 04/07/2016 20:12:00 - Rev: 20.0

Compatibility update for Windows 8.1 and Windows 8
- https://support.microsoft.com/en-us/kb/2976978
Last Review: 04/07/2016 23:49:00 - Rev: 24.0

Compatibility update for Windows 7 RTM
- https://support.microsoft.com/en-us/kb/2977759
Last Review: 04/07/2016 23:50:00 - Rev: 20.0

- http://www.infoworld.com/article/30...2977759-keep-turning-up-like-bad-pennies.html
Apr 8, 2016 - "... They appear in Windows Update as optional and unchecked.
KB 2952664 is a "compatibility update" that eases upgrading from Win7 SP1 to Win10. It now sits at version 20, up from 19 last week.
KB 2976978 does the same thing, but for Windows 8 and 8.1. It's at version 24, up from 22. There's no indication why Microsoft gave it an additional version number bump.
KB 2977759 covers the same bases, but for Windows 7 without SP1. It, too, has been given an extra bump, from version 18 last week to version 20 this week..."

:fear::fear:
 
MS info Updates - 2016.04.07

FYI...

MS16-027 - Critical
Security Update for Windows Media to Address Remote Code Execution
- https://technet.microsoft.com/en-us/library/security/MS16-027
V1.2 (April 7, 2016): Added a note to clarify that Windows Media is only enabled on Windows server operating systems when the Desktop Experience feature is enabled. This is an informational change only.

MS15-115 - Critical
Security Update for Microsoft Windows to Address Remote Code Execution
- https://technet.microsoft.com/en-us/library/security/MS15-115
V2.1 (April 7, 2016): Updated the footnotes following the Affected Software table to further clarify installation order for security update 3101746 in MS15-115, 3081320 in MS15-121, and 3101246 in MS15-122. This is an informational change only. Customers who have already successfully installed the update do not need to take any action.

MS15-121 - Important
Security Update for Schannel to Address Spoofing
- https://technet.microsoft.com/en-us/library/security/MS15-121
V1.1 (April 7, 2016): Updated the footnotes following the Affected Software table to further clarify installation order for security update 3101746 in MS15-115, 3081320 in MS15-121, and 3101246 in MS15-122. This is an informational change only. Customers who have already successfully installed the update do not need to take any action.

MS15-122 - Important
Security Update for Kerberos to Address Security Feature Bypass
- https://technet.microsoft.com/en-us/library/security/MS15-122
V1.2 (April 7, 2016): Updated the footnotes following the Affected Software and Vulnerability Severity Ratings table to further clarify installation order for security update 3101746 in MS15-115, 3081320 in MS15-121, and 3101246 in MS15-122. This is an informational change only. Customers who have already successfully installed the update do not need to take any action.

MS13-082 - Critical
Vulnerabilities in .NET Framework Could Allow Remote Code Execution
- https://technet.microsoft.com/en-us/library/security/MS13-082
V1.2 (April 7, 2016): Corrected download links for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows 2008 R2. This is an informational change only. Customers who have already successfully updated their systems do not need to take any action.

:blink:
 
MS Security Bulletin Summary - April 2016

FYI...

- https://technet.microsoft.com/library/security/ms16-apr
April 12, 2016 - "This bulletin summary lists security bulletins released for April 2016...
(Total of -13-)

Microsoft Security Bulletin MS16-037 - Critical
Cumulative Security Update for Internet Explorer (3148531)
- https://technet.microsoft.com/library/security/MS16-037
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer

Microsoft Security Bulletin MS16-038 - Critical
Cumulative Security Update for Microsoft Edge (3148532)
- https://technet.microsoft.com/library/security/MS16-038
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Microsoft Edge

Microsoft Security Bulletin MS16-039 - Critical
Security Update for Microsoft Graphics Component (3148522)
- https://technet.microsoft.com/library/security/MS16-039
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Skype for Business, Microsoft Lync.

Microsoft Security Bulletin MS16-040 - Critical
- https://technet.microsoft.com/library/security/MS16-040
Critical - Remote Code Execution - May require restart - Microsoft Windows

Microsoft Security Bulletin MS16-041 - Important
Security Update for .NET Framework (3148789)
- https://technet.microsoft.com/library/security/MS16-041
Important - Remote Code Execution - May require restart - Microsoft Windows, Microsoft .NET Framework

Microsoft Security Bulletin MS16-042 - Critical
Security Update for Microsoft Office (3148775)
- https://technet.microsoft.com/library/security/MS16-042
Critical - Remote Code Execution - May require restart - Microsoft Office, Microsoft Office Services and Web Apps

Microsoft Security Bulletin MS16-044 - Important
Security Update for Windows OLE (3146706)
- https://technet.microsoft.com/library/security/MS16-044
Important - Remote Code Execution - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-045 - Important
Security Update for Windows Hyper-V (3143118)
- https://technet.microsoft.com/library/security/MS16-045
Important - Remote Code Execution - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-046 - Important
Security Update for Secondary Logon (3148538)
- https://technet.microsoft.com/library/security/MS16-046
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-047 - Important
Security Update for SAM and LSAD Remote Protocols (3148527)
- https://technet.microsoft.com/library/security/MS16-047
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-048 - Important
Security Update for CSRSS (3148528)
- https://technet.microsoft.com/library/security/MS16-048
Important - Security Feature Bypass - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-049 - Important
Security Update for HTTP.sys (3148795)
- https://technet.microsoft.com/library/security/MS16-049
Important - Denial of Service - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-050 - Critical
Security Update for Adobe Flash Player (3154132)
- https://technet.microsoft.com/library/security/MS16-050
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Adobe Flash Player
___

MS16-037: http://www.securitytracker.com/id/1035521
MS16-038: http://www.securitytracker.com/id/1035522
MS16-039: http://www.securitytracker.com/id/1035528
- http://www.securitytracker.com/id/1035529
- http://www.securitytracker.com/id/1035530
- http://www.securitytracker.com/id/1035531
- http://www.securitytracker.com/id/1035532
MS16-040: http://www.securitytracker.com/id/1035523
MS16-041: http://www.securitytracker.com/id/1035535
MS16-042: http://www.securitytracker.com/id/1035524
- http://www.securitytracker.com/id/1035525
MS16-044: http://www.securitytracker.com/id/1035536
MS16-045: http://www.securitytracker.com/id/1035538
MS16-046: http://www.securitytracker.com/id/1035541
MS16-047: http://www.securitytracker.com/id/1035534
MS16-048: http://www.securitytracker.com/id/1035544
MS16-049: http://www.securitytracker.com/id/1035546
MS16-050: http://securitytracker.com/id/1035527
___

- https://blogs.technet.microsoft.com/msrc/2016/04/12/april-2016-security-update-release/
April 12, 2016

Security Advisories:
Microsoft Security Advisory 3152550
Update to Improve Wireless Mouse Input Filtering
- https://technet.microsoft.com/library/security/3152550.aspx
April 12, 2016

April 2016 Office Update Release
- https://blogs.technet.microsoft.com.../2016/04/12/april-2016-office-update-release/
April 12, 2016 - "... This month, there are -23- security updates (2 bulletins) and -47- non-security updates. Security bulletins:
MS16-039: https://technet.microsoft.com/en-us/library/security/ms16-039.aspx
MS16-042: https://technet.microsoft.com/en-us/library/security/ms16-042.aspx
All of the security and non-security updates for April are listed in KB article KB3150264:
> https://support.microsoft.com/en-us/kb/3150264
A new version of Office 2013 Click-To-Run is available: 15.0.4815.1001
A new version of Office 2010 Click-To-Run is available: 14.0.7168.5000
For information on Office 365 Click-To-Run updates, see:
- https://technet.microsoft.com/en-us/mt465751
___

ISC Analysis
- https://isc.sans.edu/mspatchdays.html?viewday=2016-04-12
___

Qualys Analysis
- https://blog.qualys.com/laws-of-vulnerabilities/2016/04/12/22939
___

- https://www.us-cert.gov/ncas/curren...crosoft-Releases-April-2016-Security-Bulletin
April 12, 2016

.
 
Last edited:
Patch -reliability- is unclear...

FYI...

Patch -reliability- is unclear...

It’s NOT time to install Windows or Office updates
> http://www.askwoody.com/2016/its-not-time-to-install-windows-or-office-updates/
Apr 16, 2016 - "... Right now is a -bad-time- to install updates. Check back in a-week-or-two...
(Right now I’m waiting to see what MS does with KB3146706*, but other problems may well surface)..."

* https://support.microsoft.com/en-us/kb/3146706
Last Review: 04/12/2016 18:38:00 - Rev: 1.1
___

> http://www.askwoody.com/2016/win7-security-patch-kb3146706-causing-problems/
Apr 16, 2016 - "... lots of reports of MS16-044/KB3146706 throwing errors – most commonly blue screen 0x0000006B – that go away if the patch is removed..." (-aka- BSOD).
___

MS16-039: Description of the security update for Office 2010
- https://support.microsoft.com/en-us/kb/3114566
Last Review: 04/13/2016 00:37:00 - Rev: 2.0
"... Known issues in this security update:
After you install this security update, you may receive an error message that resembles the following when you try to start an Office application:
'The Windows installer service could not be accessed.'
To resolve this problem, do one of the following:
Option 1 On systems that have update 3139923* installed, make sure that update 3072630** is also installed.
Option 2 Uninstall update 3139923..."
Applies to:
Microsoft Office 2010 Service Pack 2

* https://support.microsoft.com/en-us/kb/3139923
Last Review: 03/15/2016 17:15:00 - Rev: 1.0

** https://support.microsoft.com/en-us/kb/3072630
Last Review: 12/14/2015 19:59:00 - Rev: 2.0

:fear::fear:
 
Last edited:
Speed up Win7 scans for updates

FYI...

Speed up Win7 scans for updates
- http://www.infoworld.com/article/30...tly-speed-up-windows-7-scans-for-updates.html
Apr 19, 2016 - "If you're experiencing Windows 7 update scans measured in hours - if not days... there's a newly discovered trick that -may- reduce scan times to minutes. It's an -unlikely- combination of two updates... Try it and see how it works on yours":
> http://www.askwoody.com/2016/possib...-7-update-scans/comment-page-3/#comment-80655
"I needed to install a COMBINATION of the following updates on Win7 SP1 – KB3138612* AND KB3145739**. I found out that patching KB3145739 alone without patching the WU Client for Win7 SP1 is not enough...
Microsoft did -not- bother patching the WU client app for Vista SP2..."

Windows Update Client for Windows 7 and Windows Server 2008 R2
* https://support.microsoft.com/en-us/kb/3138612
Last Review: 03/08/2016 18:22:00 - Rev: 2.0

MS16-039: Description of the security update for Windows Graphics Component
** https://support.microsoft.com/en-us/kb/3145739
Last Review: 04/12/2016 17:54:00 - Rev: 1.0

... YMMV.
___

MS16-044: Security Update for Windows OLE
> https://support.microsoft.com/en-us/kb/3146706
Last Review: 04/12/2016 18:38:00 - Rev: 1.1

... now "unchecked" but still listed on 'Windows Update' list (??)

:spider:
 
Last edited:
MS releases -24- 'optional' patches

FYI...

MS releases 24 'optional' patches
- http://www.infoworld.com/article/30...oft-releases-24-optional-windows-patches.html
Apr 21, 2016 - "The official Windows Update list[1] says -24- patches were released on April 19. But it seems only two of them - KB 3138378* and 3140245** - were released that day, and the rest came out on April 20. The list itself wasn't updated until April 20... Three of the patches -fix-problems- with earlier security patches..."
1] https://support.microsoft.com/en-us/kb/894199
Last Review: 04/20/2016 19:08:00 - Rev: 1.0

Update for Journal.dll binary in Windows
* https://support.microsoft.com/en-us/kb/3138378
Last Review: 04/20/2016 04:55:00 - Rev: 3.0

A new registry key enables TLS 1.1 and TLS 1.2 to default to secure protocols in WinHTTP in Windows
** https://support.microsoft.com/en-us/kb/3140245
Last Review: 04/20/2016 04:43:00 - Rev: 3.0

(-More- listed w/details at the infoworld URL above.)

:fear::fear:
 
KB3148812 breaks WSUS server - DO NOT INSTALL / Buggy patch KB3114941

FYI...

KB3148812 breaks WSUS server - DO NOT INSTALL
- https://myonlinesecurity.co.uk/kb3148812-breaks-wsus-server/
22 Apr 2016 - "We are seeing loads of reports of KB3148812* -breaks- WSUS server. This update is supposed to prepare WSUS (Windows Software Update Services) to be able to install W10 updates from the WSUS server. It is described as Update enables ESD decryption provision in WSUS in Windows Server 2012 and Windows Server 2012 R2. Update enables ESD decryption provision in WSUS in Windows Server 2012 and Windows Server 2012 R2..."

Update enables ESD decryption provision in WSUS in Windows Server 2012 and Windows Server 2012 R2
* https://support.microsoft.com/en-us/kb/3148812
Last Review: 04/20/2016 04:45:00 - Rev: 3.0

What you need to know about KB3148812
** http://blogs.technet.com/b/wsus/archive/2016/04/22/what-you-need-to-know-about-kb3148812.aspx
21 Apr 2016 - "... We try not to require post-update manual effort whenever possible, and unfortunately in this case it was unavoidable. This post describes the symptoms you’ll see, details how to resolve them, and then provides some background on this change... it requires some additional manual steps to be taken afterward in order to realign the moving parts of the system. More information on that will be available via the KB article and this blog later-this-week." ??
___

Hold Off on Deploying KB3148812 for Now
>> http://windowsitpro.com/patch-tuesday/hold-deploying-kb3148812-now
Apr 20, 2016
> http://blogs.technet.com/b/wsus/archive/2016/04/20/known-issues-with-kb3148812.aspx
___

Botched WSUS patch KB 3148812 throws errors 80244019, 80244008, 8024401f
Two days after the patch rolled out, Microsoft provided instructions for dealing with reported problems - but the new fixes don't work either
- http://www.infoworld.com/article/30...ws-errors-80244019-80244008-and-8024401f.html
Apr 22, 2016 - "... Big problem: The new fixes don't work. A tirade of complaints on the TechNet forum said the manual fixes that Microsoft offered after the fact don't fix the patch. Win10 PCs attached to the patched WSUS server still couldn't see the server. Clients are reporting errors 80244007, 80244019, 80244008, and 8024401f..."

DO NOT roll out KB3148812
___

Buggy Office 2013 patch KB 3114941
Crashes in Lync and Outlook lead to Microsoft's -fourth- official recall of a Click-to-Run version of Office in the past four months
- http://www.infoworld.com/article/30...-with-buggy-office-2013-patch-kb-3114941.html
Apr 22, 2016

Lync 2013 (Skype for Business) or Outlook 2013 Crash
- https://support.microsoft.com/en-us/kb/3158521
Last Review: 04/22/2016 22:03:00 - Rev: 6.0
"Symptoms: After you install the April 5, 2016, update for Outlook 2013 (KB3114941*), you may experience random crashes of Microsoft Lync 2013 (Skype for Business) or Microsoft Outlook 2013, or both. When this issue occurs, you may find an Application Error...
Workaround:
Method 1: -Uninstall- the April 2016 Outlook update...
> https://support.microsoft.com/en-us/kb/3114941
Last Review: 04/22/2016 19:40:00 - Rev: 3.0
"Known issue: After you install this update, you may experience frequent crashes in Outlook 2013 and Skype for Business 2013. If this behavior occurs, uninstall the update...
> Click-to-Run based Installations: Revert to the March 2016 version of Office 2013 by following the steps in the following article in the Microsoft Knowledge Base:
2770432 How to revert to an earlier version of Office 2013 or Office 2016 Click-to-Run
- https://support.microsoft.com/en-us/kb/2770432
Last Review: 02/29/2016 08:38:00 - Rev: 6.0 "

:fear::fear:
 
Last edited:
Updated: April 2016 Office Update Release

FYI...

Updated: April 2016 Office Update Release
- https://blogs.technet.microsoft.com.../2016/04/12/april-2016-office-update-release/
Apr 29, 2016 - "A new build of Office 2013 Click-To-Run – 15.0.4815.1002 – is available now. This build fixes an intermittent -crash- that may occur in Outlook or Skype for Business (see KB 3158521*). To get this build, you can either wait until you are prompted to update, or go to
File > Account and select Update Options > Update Now."

* https://support.microsoft.com/en-us/kb/3158521
Last Review: 04/28/2016 17:11:00 - Rev: 7.0
Applies to:
Microsoft Lync 2013
Skype for Business 2015
Microsoft Outlook 2013
___

Win10 nagware patch KB 3035583 back on Win7 PCs
- http://www.infoworld.com/article/30...e-patch-kb-3035583-back-on-windows-7-pcs.html
May 3, 2016

Update installs Get Windows 10 app in Windows 8.1 and Windows 7 SP1
> https://support.microsoft.com/en-us/kb/3035583
Last Review: 03/23/2016 18:07:00 - Rev: 11.0
Applies to:
Windows 8.1 Pro
Windows 8.1
Windows 7 Service Pack 1

:fear:
 
Last edited:
MS Security Bulletin Summary - May 2016

FYI...

- https://technet.microsoft.com/en-us/library/security/ms16-May
May 10, 2016 - "This bulletin summary lists security bulletins released for May 2016...
(Total of -16-)

Microsoft Security Bulletin MS16-051 - Critical
Cumulative Security Update for Internet Explorer (3155533)
- https://technet.microsoft.com/library/security/MS16-051
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer

Microsoft Security Bulletin MS16-052 - Critical
Cumulative Security Update for Microsoft Edge (3155538)
- https://technet.microsoft.com/library/security/MS16-052
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Microsoft Edge

Microsoft Security Bulletin MS16-053 - Critical
Cumulative Security Update for JScript and VBScript (3156764)
- https://technet.microsoft.com/library/security/MS16-053
Critical - Remote Code Execution - May require restart - Microsoft Windows

Microsoft Security Bulletin MS16-054 - Critical
Security Update for Microsoft Office (3155544)
- https://technet.microsoft.com/library/security/MS16-054
Critical - Remote Code Execution - May require restart - Microsoft Office, Microsoft Office Svcs and Web Apps

Microsoft Security Bulletin MS16-055 - Critical
Security Update for Microsoft Graphics Component (3156754)
- https://technet.microsoft.com/library/security/MS16-055
Critical - Remote Code Execution - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-056 - Critical
Security Update for Windows Journal (3156761)
- https://technet.microsoft.com/library/security/MS16-056
Critical - Remote Code Execution - May require restart - Microsoft Windows

Microsoft Security Bulletin MS16-057 - Critical
Security Update for Windows Shell (3156987)
- https://technet.microsoft.com/library/security/MS16-057
Critical - Remote Code Execution - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-058 - Important
Security Update for Windows IIS (3141083)
- https://technet.microsoft.com/library/security/MS16-058
Important - Remote Code Execution - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-059 - Important
Security Update for Windows Media Center (3150220)
- https://technet.microsoft.com/library/security/MS16-059
Important - Remote Code Execution - May require restart - Microsoft Windows

Microsoft Security Bulletin MS16-060 - Important
Security Update for Windows Kernel (3154846)
- https://technet.microsoft.com/library/security/MS16-060
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-061 - Important
Security Update for Microsoft RPC (3155520)
- https://technet.microsoft.com/library/security/MS16-061
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-062 - Important
Security Update for Windows Kernel-Mode Drivers (3158222)
- https://technet.microsoft.com/library/security/MS16-062
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-064 - Critical
Security Update for Adobe Flash Player (3157993)
- https://technet.microsoft.com/library/security/MS16-064
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Adobe Flash Player
V2.0 (May 13, 2016): Bulletin revised to announce the release of update 3163207 to address the vulnerabilities included in Adobe Security Bulletin APSB16-15. Note that update 3163207 replaces the update previously released in this bulletin (update 3157993). Microsoft strongly recommends that customers install update 3163207 to help be protected from the vulnerabilities described in Adobe Security Bulletin APSB16-15.

Microsoft Security Bulletin MS16-065 - Important
Security Update for .NET Framework (3156757)
- https://technet.microsoft.com/library/security/MS16-065
Important - Information Disclosure - May require restart - Microsoft Windows, .NET Framework

Microsoft Security Bulletin MS16-066 - Important
Security Update for Virtual Secure Mode (3155451)
- https://technet.microsoft.com/library/security/MS16-066
Important - Security Feature Bypass - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS16-067 - Important
Security Update for Volume Manager Driver (3155784)
- https://technet.microsoft.com/library/security/MS16-067
Important - Information Disclosure - May require restart - Microsoft Windows
___

- https://blogs.technet.microsoft.com/msrc/2016/05/10/may-2016-security-update-release/
May 10, 2016

Microsoft Security Advisory 3155527
Update to Cipher Suites for FalseStart
- https://technet.microsoft.com/library/security/3155527.aspx
May 10, 2016

May 2016 Office Update Release
- https://blogs.technet.microsoft.com...ng/2016/05/10/may-2016-office-update-release/
May 10, 2016 - "... This month, there are -15- security updates (1 bulletin) and -44- non-security updates.
Security bulletins: MS16-054: https://technet.microsoft.com/en-us/library/security/ms16-054.aspx
All of the security and non-security updates for March are listed in KB article 3158453:
> https://support.microsoft.com/en-us/kb/3158453
A new version of Office 2013 Click-To-Run is available: 15.0.4823.1002
A new version of Office 2010 Click-To-Run is available: 14.0.7169.5000
For information on Office 365 Click-To-Run updates, see Office 365 client update branch releases:
> https://technet.microsoft.com/en-us/mt465751

May 2016 Non-Security Office Update Release
- https://blogs.technet.microsoft.com.../may-2016-non-security-office-update-release/
May 3, 2016
___

MS16-051: http://www.securitytracker.com/id/1035820
MS16-052: http://www.securitytracker.com/id/1035821
MS16-053: http://www.securitytracker.com/id/1035822
MS16-054: http://www.securitytracker.com/id/1035819
MS16-055: http://www.securitytracker.com/id/1035823
MS16-056: http://www.securitytracker.com/id/1035824
MS16-057: http://www.securitytracker.com/id/1035825
MS16-058: http://www.securitytracker.com/id/1035834
MS16-059: http://www.securitytracker.com/id/1035832
MS16-060: http://www.securitytracker.com/id/1035833
MS16-061: http://www.securitytracker.com/id/1035837
MS16-062: http://www.securitytracker.com/id/1035841
MS16-064:
MS16-065: http://www.securitytracker.com/id/1035842
MS16-066: http://www.securitytracker.com/id/1035843
MS16-067: http://www.securitytracker.com/id/1035844
___

ISC Analysis
- https://isc.sans.edu/mspatchdays.html?viewday=2016-05-10
2016-05-10

Qualys Analysis
- https://blog.qualys.com/laws-of-vulnerabilities/2016/05/10/patch-tuesday-may-2015-2
May 10, 2016

.
 
Last edited:
MS Security Bulletin MS16-064 V2.0

FYI...

MS Security Bulletin MS16-064 - Critical
Security Update for Adobe Flash Player (3157993)
- https://technet.microsoft.com/library/security/MS16-064
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Adobe Flash Player
V2.0 (May 13, 2016): Bulletin revised to announce the release of update 3163207 to address the vulnerabilities included in Adobe Security Bulletin APSB16-15. Note that update 3163207 replaces the update previously released in this bulletin (update 3157993). Microsoft strongly recommends that customers install update 3163207* to help be protected from the vulnerabilities described in Adobe Security Bulletin APSB16-15.
> https://support.microsoft.com/en-us/kb/3163207
Applies to:
Windows 10
Windows 10 Version 1511
Windows Server 2012 R2 Datacenter
Windows Server 2012 R2 Standard
Windows Server 2012 R2 Essentials
Windows Server 2012 R2 Foundation
Windows 8.1 Enterprise
Windows 8.1 Pro
Windows 8.1
Windows RT 8.1
Windows Server 2012 Datacenter
Windows Server 2012 Standard
Windows Server 2012 Essentials
Windows Server 2012 Foundation

:fear::fear:
 
MS Updates revisions - 5.18.2016

FYI...

MS Security Bulletin MS16-035 - Important
Security Update for .NET Framework to Address Security Feature Bypass (3141780)
- https://technet.microsoft.com/en-us/library/security/MS16-035
V2.0 (May 10, 2016): Revised bulletin to announce the security updates for Microsoft .NET Framework 4.5.2 and Microsoft .NET Framework 4.6/4.6.1 have been rereleased to address issues with certain printing scenarios. The rereleases are available via Windows Update and the Microsoft Update Catalog. Note that this re-release applies only to LDR (Limited Distribution Release) customers. GDR (General Distribution Release) customers are not affected. For more information about the specific security updates that were re-released, see the Update FAQs section of this bulletin (MS16-035).
V2.1 (May 18, 2016): Revised bulletin to clarify the distribution audience for the Microsoft .NET Framework 4.5.2 and Microsoft .NET Framework 4.6/4.6.1 security updates that were re-released on May 10, 2016, as follows: The security updates for Microsoft .NET Framework 4.5.2 have been re-released to Limited Distribution Release (LDR) customers only. The security updates for Microsoft .NET Framework 4.6/4.6.1 have been re-released to all customers.
___

MS Security Advisory 2880823
Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program
- https://technet.microsoft.com/en-us/library/security/2880823
V2.0 (May 18, 2016): Advisory updated to provide links to the current information regarding the use of the SHA1 hashing algorithm for the purposes of SSL and code signing. For more information, see Windows Enforcement of Authenticode Code Signing and Timestamping*.
* http://social.technet.microsoft.com...thenticode-code-signing-and-timestamping.aspx
___

Convenience rollup update for Windows 7 SP1 and Windows Server 2008 R2 SP1
- https://support.microsoft.com/en-us/kb/3125574
Last Review: 05/17/2016 17:38:00 - Rev: 1.0
Cautionary note - see: "... Known issue in this convenience rollup..."

> https://blogs.technet.microsoft.com...17/simplifying-updates-for-windows-7-and-8-1/
May 17, 2016

MSI repair doesn't work when MSI source is installed on an HTTP share in Windows
- https://support.microsoft.com/en-us/kb/3139923
Last Review: 05/17/2016 19:43:00 - Rev: 3.0

>> http://www.infoworld.com/article/30...s-usher-in-the-future-of-rollup-updating.html
May 18, 2016

:fear::fear:
 
Last edited:
MS 'tactics' upgrading people to Win10

FYI...

MS 'tactics' upgrading people to Win10
- https://bgr.com/2016/05/25/microsoft-windows-10-upgrade-trick/
May 25, 2016 - "For months now, Microsoft has done everything in its power to shove Windows 10 down your throat. The 'free' update is mandatory at this point, and we’ve heard from many Windows users who discovered their computers updated to the newest version automatically, -without- their knowledge or explicit permission. Microsoft kept offering excuses for these annoying occurrences, and even said it will stop pushing upgrades to Windows users refuse to hop aboard the Windows 10 train. Now, the company has come up with its most evil trick yet to get you to update your PC to Windows 10, and it’s based on the same methodology hackers use to trick people into installing malware. 'Pop-ups' often appear when you visit 'malicious' websites and when you click the “X” to close them, malware is installed on your computer. Well, Microsoft just tweaked its 'Windows 10 upgrade alert pop-up' so that the update is triggered when clicking the X, PC World explains:
> http://www.pcworld.com/article/3073...dows-10-pop-up-tricks-you-into-upgrading.html
May 22, 2016
>> https://boygeniusreport.files.wordp...t-windows-10-upgrade-x-button-popup-alert.jpg
The Get Windows X app that pushes the update prompt has recently changed the behavior of the “X” button. Earlier, users would have been able to dismiss the pop-up by pressing the button, as you would expect. But you can’t do that anymore. Pressing the X now has a different function. It tells the company you’re happy to have your computer updated at the time shown inside the pop-up. The only way to get rid of it is to change the update time manually. But of course, that’s not intuitive at all and many people are about to be tricked into upgrading. The trick is disingenuous at best, since Microsoft isn’t technically doing anything wrong. It’s just turning the function of the X button from “close and do nothing” to “close and upgrade later.” You know, without explaining this tiny change to anyone. Come July 29th, Microsoft will stop prompting users to upgrade, Business Insider reminds us*, so make sure you change your Windows 10 upgrade time to August or later!"
* http://www.businessinsider.com/windows-10-pop-ups-tricking-users-into-upgrading-x-2016-5

>> https://www.youtube.com/watch?v=VMPeTrHNX1U
Apr 27, 2016

>> http://core0.staticworld.net/images/article/2016/05/gwx-new-100662456-orig.png
May 22, 2016
???

>> http://windowssecrets.com/patch-watch/getting-ready-or-not-for-windows-10/
May 25, 2016

:fear::fear::fear:
 
Last edited:
Back
Top