Revision Note: V2.0 (June 9, 2015): Added the 3062760 update to the Juniper VPN Client Update section.
Summary: Microsoft is announcing the availability of an update for the Juniper Networks Windows In-Box Junos Pulse Client for Windows 8.1 and Windows RT 8.1. The update addresses a vulnerability in the Juniper VPN client by updating the affected Juniper VPN client libraries contained in affected versions of Microsoft Windows.
Category Archives: Microsft
Microsoft
MS15-JUN – Microsoft Security Bulletin Summary for June 2015 – Version: 1.0
Revision Note: V1.0 (June 9, 2015): Bulletin Summary published.
Summary: This bulletin summary lists security bulletins released for June 2015.
MS15-044 – Critical: Vulnerabilities in Microsoft Font Drivers Could Allow Remote Code Execution (3057110) – Version: 1.0
Severity Rating: Critical
Revision Note: V1.0 (May 12, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType fonts.
3042058 – Update to Default Cipher Suite Priority Order – Version: 1.0
Revision Note: V1.0 (May 12, 2015): Advisory published.
Summary: Microsoft is announcing the availability of an update to cryptographic cipher suite prioritization in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2. The update adds additional cipher suites to the default list on affected systems and improves cipher suite priority ordering. The improvements are part of ongoing efforts to bolster the effectiveness of encryption in Windows operating systems.
MS15-052 – Important: Vulnerability in Windows Kernel Could Allow Security Feature Bypass (3050514) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (May 12, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker can log on to an affected system and run a specially crafted application.
MS15-048 – Important: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (3057134) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (May 12, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow elevation of privilege if an attacker sends specially crafted data to a WinForms application running in partial trust.
MS15-047 – Important: Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (3058083) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (May 12, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Office server and productivity software. The vulnerabilities could allow remote code execution if an authenticated attacker sends specially crafted page content to a SharePoint server. An attacker who successfully exploited these vulnerabilities could run arbitrary code in the security context of the W3WP service account on the target SharePoint site.
MS15-051 – Important: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057191) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (May 12, 2015): Bulletin published.
Summary: This security update resolves vulnerabilities in Microsoft Windows. The more severe of these vulnerabilities could allow elevation of privilege if an attacker could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users.
MS15-053 – Important: Vulnerabilities in JScript and VBScript Scripting Engines Could Allow Security Feature Bypass (3057263) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (May 12, 2015): Bulletin published.
Summary: This security update resolves ASLR security feature bypasses in the JScript and VBScript scripting engines in Microsoft Windows. An attacker could use an ASLR bypass in conjunction with another vulnerability, such as a remote code execution vulnerability, that could take advantage of the ASLR bypass to run arbitrary code. For example, a remote code execution vulnerability that is blocked by ASLR could be exploited after a successful ASLR bypass.
MS15-054 – Important: Vulnerability in Microsoft Management Console File Format Could Allow Denial of Service (3051768) – Version: 1.0
Severity Rating: Important
Revision Note: V1.0 (May 12, 2015): Bulletin published.
Summary: This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if a remote, unauthenticated attacker convinces a user to open a share containing a specially crafted .msc file. However, an attacker would have no way of forcing a user to visit the share or view the file.