- Messages
- 74
Microsoft Security Bulletin(s) for May 12 2015
Note: There may be latency issues due to replication, if the page does not display keep refreshing
Today Microsoft released the following Security Bulletin(s).
Note: www.microsoft.com/technet/security and www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.
Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.
Bulletin Summary:
https://technet.microsoft.com/en-us/library/security/ms15-may.aspx
Critical (3)
Cumulative Security Update for Internet Explorer (3049563)
Microsoft Security Bulletin MS15-043 - Critical
Vulnerabilities in Microsoft Font Drivers Could Allow Remote Code Execution (3057110)
Microsoft Security Bulletin MS15-044 - Critical
Vulnerability in Windows Journal Could Allow Remote Code Execution (3046002)
http://go.microsoft.com/fwlink/?LinkId=533722
Important (10)
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3057181)
http://go.microsoft.com/fwlink/?LinkId=533724
Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (3058083)
http://go.microsoft.com/fwlink/?LinkId=534002
Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (3057134)
http://go.microsoft.com/fwlink/?LinkId=533716
Vulnerability in Silverlight Could Allow Elevation of Privilege (3058985)
http://go.microsoft.com/fwlink/?LinkId=534625
Vulnerability in Service Control Manager Could Allow Elevation of Privilege (3055642)
http://go.microsoft.com/fwlink/?LinkId=534268
Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057191)
http://go.microsoft.com/fwlink/?LinkId=533726
Vulnerability in Windows Kernel Could Allow Security Feature Bypass (3050514)
http://go.microsoft.com/fwlink/?LinkId=533731
Vulnerabilities in JScript and VBScript Scripting Engines Could Allow Security Feature Bypass (3057263)
http://go.microsoft.com/fwlink/?LinkId=533729
Vulnerability in Microsoft Management Console File Format Could Allow Denial of Service (3051768
http://go.microsoft.com/fwlink/?LinkId=533727
Vulnerability in Schannel Could Allow Information Disclosure (3061518
http://go.microsoft.com/fwlink/?LinkId=536690
Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.
If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact For home users, no-charge support for security updates (only!) is available by calling 800-MICROSOFT (800-642-7676) in the US or 877-568-2495 in Canada.
As always, download the updates only from the vendors website - visit Windows Update and Office Update or Microsoft Update websites. You may also get the updates thru Automatic Updates functionality in Windows system.
Security Tool
Find out if you are missing important Microsoft product updates by using MBSA
Note: There may be latency issues due to replication, if the page does not display keep refreshing
Today Microsoft released the following Security Bulletin(s).
Note: www.microsoft.com/technet/security and www.microsoft.com/security are authoritative in all matters concerning Microsoft Security Bulletins! ANY e-mail, web board or newsgroup posting (including this one) should be verified by visiting these sites for official information. Microsoft never sends security or other updates as attachments. These updates must be downloaded from the microsoft.com download center or Windows Update. See the individual bulletins for details.
Because some malicious messages attempt to masquerade as official Microsoft security notices, it is recommended that you physically type the URLs into your web browser and not click on the hyperlinks provided.
Bulletin Summary:
https://technet.microsoft.com/en-us/library/security/ms15-may.aspx
Critical (3)
Cumulative Security Update for Internet Explorer (3049563)
Microsoft Security Bulletin MS15-043 - Critical
Vulnerabilities in Microsoft Font Drivers Could Allow Remote Code Execution (3057110)
Microsoft Security Bulletin MS15-044 - Critical
Vulnerability in Windows Journal Could Allow Remote Code Execution (3046002)
http://go.microsoft.com/fwlink/?LinkId=533722
Important (10)
Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3057181)
http://go.microsoft.com/fwlink/?LinkId=533724
Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (3058083)
http://go.microsoft.com/fwlink/?LinkId=534002
Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (3057134)
http://go.microsoft.com/fwlink/?LinkId=533716
Vulnerability in Silverlight Could Allow Elevation of Privilege (3058985)
http://go.microsoft.com/fwlink/?LinkId=534625
Vulnerability in Service Control Manager Could Allow Elevation of Privilege (3055642)
http://go.microsoft.com/fwlink/?LinkId=534268
Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057191)
http://go.microsoft.com/fwlink/?LinkId=533726
Vulnerability in Windows Kernel Could Allow Security Feature Bypass (3050514)
http://go.microsoft.com/fwlink/?LinkId=533731
Vulnerabilities in JScript and VBScript Scripting Engines Could Allow Security Feature Bypass (3057263)
http://go.microsoft.com/fwlink/?LinkId=533729
Vulnerability in Microsoft Management Console File Format Could Allow Denial of Service (3051768
http://go.microsoft.com/fwlink/?LinkId=533727
Vulnerability in Schannel Could Allow Information Disclosure (3061518
http://go.microsoft.com/fwlink/?LinkId=536690
Please note that Microsoft may release bulletins out side of this schedule if we determine the need to do so.
If you have any questions regarding the patch or its implementation after reading the above listed bulletin you should contact For home users, no-charge support for security updates (only!) is available by calling 800-MICROSOFT (800-642-7676) in the US or 877-568-2495 in Canada.
As always, download the updates only from the vendors website - visit Windows Update and Office Update or Microsoft Update websites. You may also get the updates thru Automatic Updates functionality in Windows system.
Security Tool
Find out if you are missing important Microsoft product updates by using MBSA