-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
*******************************************************************************
*******
Title: Microsoft Security Update Releases
Issued: March 12, 2019 ********************************************************
******************************
Summary
=======
The following CVEs have undergone a major revision increment:
* CVE-2019-0601
* CVE-2019-0604
* CVE-2019-0624
Revision Information:
=====================
- https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-
0601
- Version: 2.0
- Reason for Revision: CVE re-released to address a regression introduced in
the
original updates. Customers affected by the regression should install the
security
updates released on March 12, 2019.
- Originally posted: February 12, 2019
- Updated: March 12, 2019
- Aggregate CVE Severity Rating: Important
- https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-
0604
- Version: 2.0
- Reason for Revision: To comprehensively address CVE-2019-0604 Microsoft is
releasing
the following security updates: 4462199 for Microsoft SharePoint Server 2019,
4462211 for Microsoft SharePoint Enterprise Server 2016, 4462202 for
Microsoft
SharePoint Foundation 2013 Service Pack 1, and 4462184 for Microsoft
SharePoint
Server 2010 Service Pack 2. Microsoft recommends that customers running these
versions of SharePoint Server install the updates to be protected from this
vulnerability.
- Originally posted: February 12, 2019
- Updated: March 12, 2019
- Aggregate CVE Severity Rating: Critical
- https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-
0624
- Version: 2.0
- Reason for Revision: Added Microsoft Lync Server 2013 July 2018 Update to the
Security Updates table as it addresses this vulnerability.
- Originally posted: January 16, 2019
- Updated: March 12, 2019
- Aggregate CVE Severity Rating: Important
Other Information
=================
Recognize and avoid fraudulent email to Microsoft customers: ==================
====================================================================
If you receive an email message that claims to be distributing a Microsoft
security
update, it is a hoax that may contain malware or pointers to malicious websites.
Microsoft does not distribute security updates via email.
The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all
security
notifications. However, PGP is not required for reading security notifications,
reading security bulletins, or installing security updates. You can obtain the
MSRC
public PGP key at <https://technet.microsoft.com/security/dn753714>.
*******************************************************************************
*******
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS"
WITHOUT
WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR
IMPLIED,
INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES
WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF
BUSINESS
PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE
BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL
OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY. **************
************************************************************************
Microsoft respects your privacy. Please read our online Privacy Statement at
<http://go.microsoft.com/fwlink/?LinkId=81184>.
If you would prefer not to receive future technical security notification alerts
by
email from Microsoft and its family of companies please visit the following
website
to unsubscribe:
<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar
d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.
These settings will not affect any newsletters you've requested or any mandatory
service communications that are considered part of certain Microsoft services.
For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.
This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052
-----BEGIN PGP SIGNATURE-----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=Fv6I
-----END PGP SIGNATURE-----
If you would prefer not to receive future technical security
notification alerts by email from Microsoft and its family of
companies please visit the following website to unsubscribe: https://account.m
icrosoft.com/profile/unsubscribe?CTID=0&ECID=x0sgyEyG5MKnZuebWwF8rC7R%2F4Jv5u5e
eImIHG6HKdM%3D&K=65fc0d5c-fdd3-4b69-82db-3396cbf51b8b&CMID=null&D=6368793956828
71938&PID=18000&TID=adfd46f4-992a-45ec-935c-4c9bc4baf506
---
■ Synchronet ■ Net 340
|