Microsoft Alerts

MS SharePoint 2013 - Hotfix ...

FYI...

An important fix for SharePoint Foundation 2013 SP1 has just been released
- http://blogs.technet.com/b/stefan_g...undation-2013-sp1-has-just-been-released.aspx
20 Mar 2014 - "When looking in the last couple of days at the KB article for SP1 for SharePoint Foundation 2013* you might have seen the following comment:
Notice: A known issue in SharePoint Foundation 2013 SP1 can affect the functionality of the Search WebPart. We encourage you to limit production installations of SharePoint Foundation 2013 SP1 until a fix is available. SharePoint Server 2013 is not affected by this issue.

Today we have released March 2014 Public Update (PU) for SharePoint Foundation 2013** which fixes this problem. Be aware that this fix is only necessary for SharePoint Foundation 2013 installations. SharePoint Server 2013 is not affected by the problem..."
(More detail at the technet URL above.)
Tags: SharePoint 2013, Hotfix Info

* http://support.microsoft.com/kb/2817439
Last Review: Mar 1, 2014 - Rev: 3.0

** http://support.microsoft.com/kb/2760625
Last Review: Mar 20, 2014 - Rev: 1.0
___

- http://windowssecrets.com/patch-watch/the-final-countdown-for-windows-xp-support/
Mar 13, 2014 Susan Bradley - "... I plan to post alerts of security issues you might face come April 9. Because Windows Server 2003 will still get updates for another year, we’ll have a better idea of what vulnerabilities XP users face and what’s not getting patched..."

:fear:
 
Last edited:
MS Security Advisory 2953095 ...

FYI...

Microsoft Security Advisory (2953095)
Vulnerability in Microsoft Word Could Allow Remote Code Execution
- https://technet.microsoft.com/en-us/security/advisory/2953095
Mar 24, 2014 - "Microsoft is aware of a vulnerability affecting supported versions of Microsoft Word. At this time, we are aware of limited, targeted attacks directed at Microsoft Word 2010. The vulnerability could allow remote code execution if a user opens a specially crafted RTF file using an affected version of Microsoft Word, or previews or opens a specially crafted RTF email message in Microsoft Outlook while using Microsoft Word as the email viewer. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Applying the Microsoft Fix it solution*, "Disable opening RTF content in Microsoft Word," prevents the exploitation of this issue through Microsoft Word... The vulnerability is a remote code execution vulnerability. The issue is caused when Microsoft Word parses specially crafted RTF-formatted data causing system memory to become corrupted in such a way that an attacker could execute arbitrary code. The vulnerability could be exploited through Microsoft Outlook only when using Microsoft Word as the email viewer. Note that by default, Microsoft Word is the email reader in Microsoft Outlook 2007, Microsoft Outlook 2010, and Microsoft Outlook 2013. On completion of investigation for this vulnerability, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs..."
• V1.1 (March 27, 2014): Updated Advisory FAQ to clarify that Microsoft WordPad is not affected by the issue and to help explain how the issue is specific to Microsoft Word.
* https://support.microsoft.com/kb/2953095#FixItForMe
Microsoft Fix it 51010

- http://blogs.technet.com/b/srd/arch...ion-to-stay-protected-and-for-detections.aspx
24 Mar 2014
___

- https://secunia.com/advisories/57577/
Criticality: Extremely Critical
Where: From remote
Impact: System access...
CVE Reference: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1761 - 9.3 (HIGH)
"... as exploited in the wild in March 2014."
Reported as a 0-Day...
Original Advisory: https://technet.microsoft.com/en-us/security/advisory/2953095

0-Day Exploit Targeting Word, Outlook
- http://krebsonsecurity.com/2014/03/microsoft-warns-of-word-2010-exploit/
Mar 24, 2014

- https://www.computerworld.com/s/art...s_of_ongoing_attacks_exploiting_unpatched_bug
Mar 24, 2014 - "... exploits are triggered just by -previewing- malicious messages in Outlook 2007, 2010 and 2013..."

:fear::fear:
 
Last edited:
MS Security Bulletin Summary - April 2014

FYI...

- https://technet.microsoft.com/en-us/security/bulletin/ms14-apr
April 08, 2014 - "This bulletin summary lists security bulletins released for April 2014...
(Total of -4-)

Microsoft Security Bulletin MS14-017 - Critical
Vulnerabilities in Microsoft Word and Office Web Apps Could Allow Remote Code Execution
- http://technet.microsoft.com/en-us/security/bulletin/ms14-017
Critical - Remote Code Execution - May require restart - Microsoft Office, Microsoft Office Services, Microsoft Office Web Apps

Microsoft Security Bulletin MS14-018 - Critical
Cumulative Security Update for Internet Explorer (2950467)
- http://technet.microsoft.com/en-us/security/bulletin/ms14-018
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer

Microsoft Security Bulletin MS14-019 - Important
Vulnerability in Windows File Handling Component Could Allow Remote Code Execution
- http://technet.microsoft.com/en-us/security/bulletin/ms14-019
Important - Remote Code Execution - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS14-020 - Important
Vulnerability in Microsoft Publisher Could Allow Remote Code Execution (2950145)
- http://technet.microsoft.com/en-us/security/bulletin/ms14-020
Important - Remote Code Execution - May require restart - Microsoft Office
___

- http://blogs.technet.com/b/msrc/archive/2014/04/08/the-april-2014-security-updates.aspx

Deployment Priority, Severity, and Exploit Index
- http://blogs.technet.com/cfs-file.a...nts-weblogfiles/00-00-00-45-71/deployment.jpg
[ Open link target in IE ]
___

MS14-019 - MSRD info:
- http://blogs.technet.com/b/srd/arch...g-a-binary-hijacking-via-cmd-or-bat-file.aspx
8 Apr 2014
___

April 2014 Office Update Release
- http://blogs.technet.com/b/office_s...4/04/08/april-2014-office-update-release.aspx
8 Apr 2014 - "... There are 13 security updates (2 bulletins) and 28 non-security updates..."
MS14-017, MS14-020
___

- https://secunia.com/advisories/57577/ - MS14-017
- https://secunia.com/advisories/57586/ - MS14-018
- https://secunia.com/advisories/57642/ - MS14-019
- https://secunia.com/advisories/57652/ - MS14-020
___

ISC Analysis
- https://isc.sans.edu/diary.html?storyid=17923
Last Updated: 2014-04-08 20:23:09 UTC - Version: 3

.
 
Last edited:
MS Security Advisories 2014.04.08 ...

FYI...

Microsoft Security Advisory (2953095)
Vulnerability in Microsoft Word Could Allow Remote Code Execution
- http://technet.microsoft.com/en-us/security/advisory/2953095
Last Updated: April 8, 2014 - "... We have issued MS14-017* to address this issue..."
* http://technet.microsoft.com/en-us/security/bulletin/ms14-017

Microsoft Security Advisory (2755801)
Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
- http://technet.microsoft.com/en-us/security/advisory/2755801
Last Updated: April 8, 2014 - V22.0

:fear:
 
Win 8.1 Update KB 2919355

FYI...

Windows 8.1 Update woes continue with errors 80070020, 80073712, 800F081F, 80242FFF, and 800F0922
WSUS is still down, as general update failures and complaints pile up in the two days since the release of Windows 8.1 Update
- http://www.infoworld.com/t/microsof...0073712-800f081f-80242fff-and-800f0922-240249
April 10, 2014

- http://support.microsoft.com/kb/2919355
Last Review: April 11, 2014 - Rev: 9.0

- http://blogs.technet.com/b/wsus/arc...vents-interaction-with-wsus-3-2-over-ssl.aspx
8 Apr 2014 - "There is a -known- issue which causes some PCs updated with the Windows 8.1 Update (KB 2919355) to stop scanning against Windows Server Update Services 3.0 Service Pack 2 (WSUS 3.0 SP2 or WSUS 3.2) servers which are configured to use SSL and have not enabled TLS 1.2... we recommend that you -suspend- deployment of this update in your organization until we release the update that resolves this issue..."

- http://www.infoworld.com/t/microsof...-windows-81-update-wsus-update-servers-240129
April 08, 2014 - "... Microsoft has -blocked- Windows 8.1 Update from WSUS servers, so it is no longer available for iT admins to distribute to their users. Individuals can still download the update directly through Windows Update..."
___

MS yanks SharePoint 2013 SP1, KB 2817429
... Microsoft has pulled the two-week-old SP1 for SharePoint 2013
- http://www.infoworld.com/t/microsof...repoint-2013-service-pack-1-kb-2817429-239969
Apr 07, 2014

- http://support.microsoft.com/kb/2817429
Last Review: April 3, 2014 - Rev: 4.0
"Notice: We have recently uncovered an issue with this Service Pack 1 package that may prevent customers who have Service Pack 1 from deploying future public or cumulative updates. As a precautionary measure, we have deactivated the download page until a new package is published."

:fear: :confused:
 
Last edited:
April 2014 Office Update - Visio 2013 ...

FYI...

April 2014 Office Update ...
- http://blogs.technet.com/b/office_s...4/04/08/april-2014-office-update-release.aspx
"... Update for Microsoft Visio 2013 (KB2837632)*
*NOTE: Visio 2013 KB http://support.microsoft.com/kb/2837632 has been updated to correct a targeting issue. -Prior- to April 11 the update incorrectly targeted Visio 2013 -and- Office 2013. The update has now been corrected and will only target Visio 2013 installs. We apologize for any inconvenience this may have caused..."

- http://support.microsoft.com/kb/2837632
Last Review: April 11, 2014 Rev: 1.0 (?)
Applies to
• Microsoft Visio Professional 2013
• Microsoft Visio Standard 2013
___

481MB Visio 2013 patch ... ?
- http://www.infoworld.com/t/patch-management/windows-updates-huge-visio-2013-patch-joke-240140
April 09, 2014

:fear::fear:
 
Last edited:
MS update for Win 8.1

FYI...

MS info regarding the latest Update for Win 8.1
- http://blogs.technet.com/b/gladiato...arding-the-latest-update-for-windows-8-1.aspx
12 Apr 2014 - "Microsoft has been listening to customer feedback. Much of this feedback has been received and some of the results are being given back to our users of Windows 8.1 in the form of updates. Recently, a very big update for Windows 8.1 was released... Since Microsoft wants to ensure that customers benefit from the best support and servicing experience and to coordinate and simplify servicing across both Windows Server 2012 R2, Windows 8.1 RT and Windows 8.1, this update will be considered a new servicing/support baseline. What this means is those users who have elected to install updates manually will have 30 days to install Windows 8.1 Update on Windows 8.1 devices; after this 30-day window - and beginning with the May Patch Tuesday, Windows 8.1 user's devices without the update installed will no longer receive security updates. This means that Windows 8.1 users - starting patch Tuesday in May 2014 and beyond - will require this update to be installed. If the Windows 8.1 Update is not installed, those newer updates will be considered “not applicable”..."

- http://support.microsoft.com/kb/2919355
Last Review: April 14, 2014 - Rev: 10.0
___

- http://www.infoworld.com/t/microsof...nfirms-its-dropping-windows-81-support-240407
April 14, 2014

:fear::fear:
 
MS14-018 - Rev. 3.0 ...

FYI...

MS14-018 ...
- http://support.microsoft.com/kb/2936068
Last Review: April 16, 2014 - Rev: 3.0
___

Microsoft fixes Windows 8.1 Update for corporate WSUS servers
- http://www.infoworld.com/t/microsof...ndows-81-update-corporate-wsus-servers-240654
April 16, 2014 - "... it will continue to make Windows 8.1 security patches available to WSUS customers until August's Patch Tuesday. Previous announcements said that patches to Windows 8.1 would be cut off in May. This stay of execution for this patch applies only to those who receive security patches through WSUS. Windows 8.1 customers who get their patches through Windows Update (or Microsoft Update) have to install the Windows 8.1 Update/KB 2919355 patch by May 13 if they wish to continue receiving security patches for their machines..."

- http://blogs.technet.com/b/wsus/arc...nting-interaction-with-wsus-3-2-over-ssl.aspx
16 Apr 2014

- https://support.microsoft.com/kb/2919355
Apr 16, 2014 - Rev: 11.0
Apr 17, 2014 - Rev: 12.0
Apr 18, 2014 - Rev: 13.0
Last Review: Apr 25, 2014 - Rev: 16.0

- https://support.microsoft.com/kb/2959977
Last Review: April 17, 2014 - Rev: 3.0

:confused:
 
Last edited:
IE0-day - 4.26.2014 ...

FYI...

Microsoft Security Advisory 2963983
Vulnerability in Internet Explorer Could Allow Remote Code Execution
- https://technet.microsoft.com/en-US/library/security/2963983
April 26, 2014 8:25 PM - "Microsoft is aware of limited, targeted attacks that attempt to exploit a vulnerability in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11. The vulnerability is a remote code execution vulnerability. The vulnerability exists in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated. The vulnerability may corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user within Internet Explorer. An attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer and then convince a user to view the website. On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.
Suggested Actions: Apply Workarounds... Deploy the Enhanced Mitigation Experience Toolkit 4.1 ...

- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1776 - 10.0 (HIGH)
Last revised: 04/28/2014 - "... Use-after-free vulnerability in VGX.DLL... as exploited in the wild in April 2014"

- https://www.us-cert.gov/ncas/curren...t-Explorer-Use-After-Free-Vulnerability-Being
April 28, 2014 - "... consider employing an alternative web browser until an official update is available..."

- http://www.fireeye.com/blog/uncateg...hrough-11-identified-in-targeted-attacks.html
April 26, 2014 - "... exploit leverages a previously unknown use-after-free vulnerability, and uses a well-known Flash exploitation technique* to achieve arbitrary memory access and bypass Windows’ ASLR and DEP protections..."
* http://www.fireeye.com/blog/technic...s-apocalypse-in-lately-zero-day-exploits.html

- http://blog.trendmicro.com/trendlab...t-explorer-zero-day-hits-all-versions-in-use/
Apr 27, 2014 - "... some workarounds have been provided by Microsoft as part of their advisory; of these enabling Enhanced Protected Mode (an IE10 and IE11-only feature) is the easiest to do. In addition, the exploit code requires Adobe Flash to work, so disabling or removing the Flash Player from IE also reduces the risk from this vulnerability as well..."

- http://blogs.technet.com/b/msrc/archive/2014/04/26/microsoft-releases-security-advisory.aspx
Tags: Advisory, Zero-Day Exploit, Security, Internet Explorer (IE), Vulnerability"

:fear::fear:
 
Last edited:
MS Security Advisory 2755801

FYI...

MS Security Advisory 2755801
Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
- https://technet.microsoft.com/en-us/library/security/2755801
V23.0 (April 28, 2014): Added the 2961887 update to the Current Update section.
On April 28, 2014, Microsoft released an update (2961887) for Internet Explorer 10 on Windows 8, Windows Server 2012, and Windows RT, and for Internet Explorer 11 on Windows 8.1, Windows Server 2012 R2, and Windows RT 8.1. The update addresses the vulnerabilities described in Adobe Security bulletin APSB14-13*. For more information about this update, including download links, see Microsoft Knowledge Base Article 2961887** ...
* http://helpx.adobe.com/security/products/flash-player/apsb14-13.html

** https://support.microsoft.com/kb/2961887
Last Review: April 28, 2014 - Rev: 1.0

- https://technet.microsoft.com/en-us/library/security/2963983
V1.1 (April 29, 2014): Updated advisory to clarify workarounds to help prevent exploitation of the vulnerability described in this advisory. See Advisory FAQ for details.

:fear::fear:
 
Last edited:
V23.1 MS Security Advisory 2755801

FYI...

Microsoft Security Advisory 2755801
Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
- https://technet.microsoft.com/en-us/library/security/2755801
V23.1 (April 30, 2014): Revised advisory to clarify that the 2961887* update is -not- cumulative and requires that the 2942844** update be installed for affected systems to be offered the update.

* https://support.microsoft.com/kb/2961887
Last Review: Apr 8, 2014 - Rev: 1.0

** https://support.microsoft.com/kb/2942844
Last Review: Apr 8, 2014 - Rev: 1.0
___

An update is available for EMET Certificate Trust default rules
- https://support.microsoft.com/kb/2961016
Last Review: Apr 29, 2014 - Rev: 1.0
Applies to: Enhanced Mitigation Experience Toolkit 4.1

Enhanced Mitigation Experience Toolkit
- https://support.microsoft.com/kb/2458544
Last Review: Apr 30, 2014 - Rev: 9.0

:confused:
___

Microsoft Security Advisory 2963983
Vulnerability in Internet Explorer Could Allow Remote Code Execution
- https://technet.microsoft.com/en-us/library/security/2963983
Updated: May 1, 2014 Ver: 2.0 - "Microsoft has completed the investigation into a public report of this vulnerability. We have issued MS14-021* to address this issue..."
* https://technet.microsoft.com/library/security/ms14-021
May 1, 2014

- https://support.microsoft.com/kb/2965111
Last Review: May 1, 2014 - Rev: 1.2

> http://update.microsoft.com/

:spider:
 
Last edited:
MS14-021 IE - Critical

FYI...

MS14-021 - Critical / Security Update for Internet Explorer (2965111)
- https://technet.microsoft.com/library/security/ms14-021
May 1, 2014 - "This security update resolves a publicly disclosed vulnerability in Internet Explorer. The vulnerability could allow remote code execution if a user views a specially crafted webpage using an affected version of Internet Explorer. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. This security update is rated Critical for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers... Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service*..."
* http://update.microsoft.com/microsoftupdate

- https://support.microsoft.com/kb/2965111
Last Review: May 1, 2014 - Rev: 1.2
___

- http://www.securitytracker.com/id/1030154
CVE Reference: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1776 - 10.0 (HIGH)
May 1 2014
Impact: Execution of arbitrary code via network, User access via network
Fix Available: Yes Vendor Confirmed: Yes
Version(s): 6, 7, 8, 9, 10, 11
Description: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the target user. This vulnerability is being actively exploited in targeted attacks.
Solution: The vendor has issued a fix (2965111)...
Vendor URL: https://technet.microsoft.com/library/security/ms14-021
___

- http://atlas.arbor.net/briefs/index#1200596255
Extreme Severity
May 01, 2014
... IE 0-day vulnerability currently being exploited in targeted attacks... out-of-band patch for this vulnerability should be applied immediately.

:fear:
 
Last edited:
Last edited:
MS Security Advisory 2962393

FYI...

Microsoft Security Advisory 2962393
Update for Vulnerability in Juniper Networks Windows In-Box Junos Pulse Client
- https://technet.microsoft.com/en-us/library/security/2962393
May 5, 2014 - "Microsoft is announcing the availability of an update for the Juniper Networks Windows In-Box Junos Pulse Client for Windows 8.1 and Windows RT 8.1. The update addresses a vulnerability in the Juniper VPN client by updating the affected Juniper VPN client libraries contained in affected versions of Microsoft Windows... Microsoft released an update for the Juniper Networks Windows In-Box Junos Pulse VPN client. The update addresses the vulnerability described in Juniper Security Advisory JSA10623*. For more information about this update, including download links, see Microsoft Knowledge Base Article 2962393**.
Note: Updates for Windows RT 8.1 are available via Windows Update."

* https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10623
Last Updated: 30 Apr 2014
Version: 43.0

** https://support.microsoft.com/kb/2962393
Last Review: May 5, 2014 - Rev: 1.1

:fear:
 
MS SIRv16: Jul 2013 to Dec 2013

FYI...

MS SIR Volume 16: July 2013 to December 2013
- http://www.microsoft.com/security/sir/default.aspx

- http://blogs.technet.com/b/mmpc/arc...-tactics-trend-toward-deceptive-measures.aspx
7 May 2014 - "Microsoft’s Security Intelligence Report volume 16 (SIRv16) was released today, providing threat trends on malware encounter rates, infection rates, vulnerabilities, exploits, and more for 110 countries/regions worldwide. The report is designed to help IT and security professionals better protect themselves and their organizations from cyberattacks. Malware data is gathered from the Malicious Software Removal Tool (MSRT), which is used to calculate the infection rate (Computers Cleaned per Mille (CCM), and our real-time protection products are used to derive the encounter rate. One of the more notable findings included in the report was an increase in worldwide infection rates and encounter rates. About 21.2 percent of reporting computers encountered malware each quarter in 2013. We also saw an infection rate of 11.7 CCM. More specifically, the infection rate increased from a CCM rate of 5.6 in the third quarter of 2013 to 17.8 in the fourth—a threefold increase, and the largest infection rate increase ever measured by the MSRT between two consecutive quarters. This rise was predominantly affected by malware using deceptive tactics, influenced by three families not unfamiliar to readers of this blog: Sefnit, and its related families Rotbrow and Brantall..."
___

Malware infections tripled in late 2013, Microsoft finds
- https://www.computerworld.com/s/art...fections_tripled_in_late_2013_Microsoft_finds
May 7, 2014

- http://www.infoworld.com/t/malware/flash-and-java-still-vulnerable-ever-says-microsoft-242130
May 08, 2014

:fear::fear:
 
Last edited:
Win8.1 update Rev ...

FYI...

Win8.1 update ...
- https://support.microsoft.com/kb/2919355
Apr 16, 2014 - Rev: 11.0
Apr 17, 2014 - Rev: 12.0
Apr 18, 2014 - Rev: 13.0
Apr 25, 2014 - Rev: 16.0
May 4, 2014 - Rev: 17.0
May 5, 2014 - Rev: 18.0
May 7, 2014 - Rev: 19.0
Last Review: May 9, 2014 - Rev: 20.0

- http://www.infoworld.com/t/microsof...1-update-causes-more-problems-it-fixes-242016
May 06, 2014

- http://www.infoworld.com/t/microsof...-the-kb-2919355-windows-81-update-dogs-242213
May 09, 2014
___

- https://www.computerworld.com/s/art..._Microsoft_gives_Windows_8.1_users_a_reprieve
May 12, 2014 - "For the third time in the last four weeks, Microsoft today backed away from a customer cutoff as it postponed enforcement of the Windows 8.1 Update migration deadline until June 10. On Monday - and just a day before its May Patch Tuesday slate of security fixes - Microsoft said consumers have four more weeks to move from Windows 8.1 to Windows 8.1 Update before their devices would be barred from receiving further patches. The deadline change was the third in the past month, following an earlier Windows 8.1 Update extension for business users... When Microsoft launched Windows 8.1 Update (Win8.1U) on April 8, it told all customers using Windows 8.1 that they had to upgrade to the new refresh within five weeks, or by May 13. Failure to do so, Microsoft said, would block devices running Windows 8.1 from receiving security updates scheduled to ship that day, as well as all future security and non-security updates to the OS. Business customers howled, calling the mandate a repudiation of Microsoft's long-standing policy of giving customers 24 months to upgrade to a service pack. Although Win8.1U was not labeled as such, many saw similarities to Microsoft's service packs and believed Win8.1U should hew to that policy. Within a week, Microsoft changed its tune, and gave companies a three-month extension. Enterprises and other organizations that rely on WSUS (Windows Server Update Services), Windows Intune or System Center Configuration Manager to obtain and deploy patches have until August 12 to migrate from Windows 8.1 to Win8.1U..."

- http://www.infoworld.com/t/microsof...s-windows-81-updatekb-2919355-deadline-242339
May 12, 2014

:fear::fear::fear:
 
Last edited:
MS Security Bulletin Summary - May 2014

FYI...

- https://technet.microsoft.com/library/security/ms14-may
May 13, 2014 Ver: 2.0 - "This bulletin summary lists security bulletins released for May 2014...
(Total of -8-)

Microsoft Security Bulletin MS14-029 - Critical
Security Update for Internet Explorer (2962482)
- https://technet.microsoft.com/library/security/ms14-029
Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0310 - 9.3 (HIGH)
- https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1815 - 9.3 (HIGH)
Last revised: 05/14/2014 - "... as exploited in the wild in May 2014..."

Microsoft Security Bulletin MS14-022 - Critical
Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2952166)
- https://technet.microsoft.com/library/security/ms14-022
Critical - Remote Code Execution - May require restart - Microsoft Server Software, Productivity Software

Microsoft Security Bulletin MS14-023 - Important
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2961037)
- https://technet.microsoft.com/library/security/ms14-023
Important - Remote Code Execution - May require restart - Microsoft Office

Microsoft Security Bulletin MS14-025 - Important
Vulnerability in Group Policy Preferences Could Allow Elevation of Privilege (2962486)
- https://technet.microsoft.com/library/security/ms14-025
Important - Elevation of Privilege - May require restart - Microsoft Windows

Microsoft Security Bulletin MS14-026 - Important
Vulnerability in .NET Framework Could Allow Elevation of Privilege (2958732)
- https://technet.microsoft.com/library/security/ms14-026
Important - Elevation of Privilege - May require restart - Microsoft Windows, Microsoft .NET Framework

Microsoft Security Bulletin MS14-027 - Important
Vulnerability in Windows Shell Handler Could Allow Elevation of Privilege (2962488)
- https://technet.microsoft.com/library/security/ms14-027
Important - Elevation of Privilege - Requires restart - Microsoft Windows

Microsoft Security Bulletin MS14-028 - Important
Vulnerabilities in iSCSI Could Allow Denial of Service (2962485)
- https://technet.microsoft.com/library/security/ms14-028
Important - Denial of Service - May require restart - Microsoft Windows

Microsoft Security Bulletin MS14-024 - Important
Vulnerability in a Microsoft Common Control Could Allow Security Feature Bypass (2961033)
- https://technet.microsoft.com/library/security/ms14-024
Important - Security Feature Bypass - May require restart - Microsoft Office
___

- http://blogs.technet.com/b/msrc/archive/2014/05/13/the-may-2014-security-updates.aspx
13 May 2014

Assessing risk for the May 2014 security updates
- http://blogs.technet.com/b/srd/arch...g-risk-for-the-may-2014-security-updates.aspx
13 May 2014
___

May 2014 Office Update
- http://blogs.technet.com/b/office_s...014/05/13/may-2014-office-update-release.aspx
13 May 2014 - "There are 31 security updates (3 bulletins*) and 30 non-security updates..."
* MS14-022, MS14-023, MS14-024
___

- http://www.securitytracker.com/id/1030227 - MS14-022
- http://www.securitytracker.com/id/1030230 - MS14-023
- http://www.securitytracker.com/id/1030235 - MS14-024
- http://www.securitytracker.com/id/1030231 - MS14-025
- http://www.securitytracker.com/id/1030232 - MS14-026
- http://www.securitytracker.com/id/1030233 - MS14-027
- http://www.securitytracker.com/id/1030234 - MS14-028
- http://www.securitytracker.com/id/1030224 - MS14-029
___

ISC Analysis
- https://isc.sans.edu/diary.html?storyid=18113
Last Updated: 2014-05-13 17:23:09 UTC
___

Patch Tuesday Updates: Microsoft, Adobe
... Malicious actors often use security updates to write their own exploits targeting unpatched systems
- http://atlas.arbor.net/briefs/
Extreme Severity
May 16, 2014

.
 
Last edited:
Back
Top