Home page logo
/

microsoft logo MS Sec Notification mailing list archives

Microsoft Security Advisory Notification
From: "Microsoft" <securitynotifications () e-mail microsoft com>
Date: Tue, 12 Nov 2013 14:02:04 -0600

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Title: Microsoft Security Advisory Notification
Issued: November 12, 2013
********************************************************************

Security Advisories Updated or Released Today
==============================================

* Microsoft Security Advisory (2755801)
  - Title: Update for Vulnerabilities in Adobe Flash Player in 
    Internet Explorer
  - https://technet.microsoft.com/security/advisory/2755801
  - Revision Note: V16.0 (November 12, 2013): Added the 2898108 
    update to the Current Update section.


* Microsoft Security Advisory (2854544)
  - Title: Updates to Improve Cryptography and Digital Certificate 
    Handling in Windows
  - https://technet.microsoft.com/security/advisory/2854544
  - Revision Note: V1.3 (November 12, 2013): Added the 2868725 
    update and Root Certificates Policy announcement to the 
    Available Updates and Release Notes section.


* Microsoft Security Advisory (2862152)
  - Title: Vulnerability in DirectAccess Could Allow Security 
    Feature Bypass
  - https://technet.microsoft.com/security/advisory/2862152
  - Revision Note: V1.0 (November 12, 2013): Advisory published.


* Microsoft Security Advisory (2868725)
  - Title: Update for Disabling RC4
  - https://technet.microsoft.com/security/advisory/2868725
  - Revision Note: V1.0 (November 12, 2013): Advisory published.


* Microsoft Security Advisory (2880823)
  - Title: Deprecation of SHA-1 Hashing Algorithm for Microsoft 
    Root Certificate Program
  - https://technet.microsoft.com/security/advisory/2880823
  - Revision Note: V1.0 (November 12, 2013): Advisory published.


* Microsoft Security Advisory (2896666)
  - Title: Vulnerability in Microsoft Graphics Component Could 
    Allow Remote Code Execution
  - https://technet.microsoft.com/security/advisory/2896666
  - Revision Note: V1.1 (November 12, 2013): Clarified the scope of
    the active attacks, clarified affected software configurations, 
    and revised workarounds. These are informational changes only. 
    Customers should re-evaluate the applicability of the suggested 
    actions for their environments based on the updated information.


Other Information
=================

Follow us on Twitter for the latest information and updates:
http://twitter.com/msftsecresponse 

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, it is not required to read
security notifications, security bulletins, security advisories, or
install security updates. You can obtain the MSRC public PGP key at
https://technet.microsoft.com/security/bulletin/pgp.

To receive automatic notifications whenever Microsoft Security 
Bulletins and Microsoft Security Advisories are issued or revised,
subscribe to Microsoft Technical Security Notifications on
http://technet.microsoft.com/security/dd252948.


********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

To manage or cancel your subscription to this newsletter,
visit the Microsoft.com Profile Center at
<http://go.microsoft.com/fwlink/?LinkId=245953> and then
click Manage Communications under My Subscriptions in the 
Quicklinks section.

For more information, see the Communications Preferences section
of the Microsoft Online Privacy Statement at:
<http://go.microsoft.com/fwlink/?LinkId=92781>.

For the complete Microsoft Online Privacy Statement, see:
<http://go.microsoft.com/fwlink/?LinkId=81184>.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052


-----BEGIN PGP SIGNATURE-----
Version: PGP Desktop 10.2.0 (Build 1950)
Charset: utf-8

wsFVAwUBUoKGdxWqSyu+jsPhAQivCBAAqv5Lu6cLyxaLLeDVb4RI8bPC/AWoptCc
C3O6wiqQHPERKUXILtT0ElReii/Af9pDsDczyL2gFPfqKh6vWh8gAfImweCU34qy
11cZI9nwar3jljSc5o2ZmdjPrGzY7JwkFSyhNQCBe4EOuUzE2YuEQ1iTXh2qg3a5
VcCCqTQlgUrxx8iYCZyc542HgwDlD/TpR10F5o6YpmeJ58lWMdcmgO//ipc+9Dn3
SsR9MY1uqH7OLDszV6R9yv3ogN6l7BrSdzsIPCeHqRRXNMdNs3KmF37m2tyLKOOr
0MnjOPfFCX2A8ardszMt7R7Qz1FZoqNEyelRkg1rG1MPisl5tap7a7VaNTdw6rke
6Cwg4jj12KtJpLLw7BZ0IbV90gvNhWEAyDWDPqonDusHKmvHDNIkHIvNKeip4tR2
27hnBvHDtjCOaHWCM1++PGtZpZrvf6e0QR44xhli5a6Tgq1fUJCVDKOSBG8I4eke
dr053DDykjgP2NqErLWHh7PLCRxvB2kARY6SlNZzg2F2tzUBSAhnmnkj3VuMt+EC
9dBWEFBYkj1wy8E8XBkSm9HyL1YVS8x460gjwZNd44vrS8qxXYTiuyOUbNnFVLqC
PmxIt46B9tZ4uo8tPmSKv5zu/zwjtXrIh4Yt+2qQyQunTFGjcJXQQHQuSeWQ8Fuu
j7d329u4sNo=
=7S2L
-----END PGP SIGNATURE-----


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]