Microsoft Corrects 59 Patch Errors on Tuesday of July

Η Microsoft released patches for 59 CVEs found in its software, as well as a patch for the flaw που ανακαλύφθηκε από τον κατασκευαστή Hacking Team.

The patch (MS15-065) corrects the Internet Explorer 11 code in Windows 7 and the 8.1 that occurred after the Hacking Team tool leaked.Microsoft patch

Of course, there may be more updates related to the Hacking Team's tools at Patch on Tuesday this month.

Below you can see all the updates as described by the company and it is a good idea to update your system before the hackers get it:

  • MS15-077: The Hacking Team elevation-of-privilege bug in the Windows Adobe Type Manager Font Driver that allows normal programs to gain administrator-level access. The flaw exists in 2003 and in Windows Vista and later for desktops and notebooks. The flaw is listed as "important," although the availability of exploit code in the wild should make patching a top priority.
  • MS15-065: The usual IE patch, this time with 29 CVE-listed flaws in Internet Explorer, including remote code execution vulnerabilities. The bulletin is listed as a "critical" fix, and includes an update to address the other Hacking Team-related bug.
  • MS15-066: A bulletin for remote-code execution in the VBScript Scripting Engine. The bulletin is listed as "critical" for Windows machines running IE 6, 7, and 8. Bo Qu of Palo Alto Networks was credited for the discovery.
  • MS15-067: A remote-code execution flaw in Remote Desktop Protocol servers running on Windows 7, Windows 8, Server 2012, and Server Core. The bulletin is rated "critical" with no discovery credit given.
  • MS15-068: Two CVE-listed remote-code execution vulnerabilities in Hyper-V for Windows Server 2008, Windows 8/8.1, Server 2012, and Server Core. An application running in a guest application can exploit this bug to run code on the host. Nightmare. The bulletin is listed as “critical,” with discovery credit going to Microsoft's Thomas Garner.
  • MS15-058: Remote-code execution flaws in SQL server. Listed as an "important" risk with no discovery credit given.
  • MS15-069: A pair of remote-code execution vulnerabilities involving RTF and DLL files in Windows Server 2003 and 2012, and Windows Vista to Windows 8.1 RT. The bulletin is listed as "important," with discovery credit going to Haifei Li of the McAfee Labs IPS Team and Ashutosh Mehra of the HP Zero Day Initiative.
  • MS15-070: An update for eight CVE-listed flaws in Microsoft Office 2007, 2010, 2013, and Office for Mac. The bulletin is listed as "important," though it is possible to exploit some of the bugs to execute arbitrary code on a vulnerable PC if a malicious Office file is opened.
  • MS15-071: An elevation-of-privilege flaw in Netlogon for Windows Server 2003 and later. The bulletin is listed as "important." Discovery credit was not given.
  • MS15-072: An elevation of privilege flaw in Windows Graphics Component for Windows Server 2003, 2008, 2012, and Server Core as well as Windows Vista, Windows 7, Windows 8, and Windows RT. Vulnerability is listed as "important" and discovery credit was given to Nicolas Joly.
  • MS15-073: Six elevation-of-privilege and disclosure flaws in the Windows kernel-mode driver for Windows Server 2003 and later and Windows Vista and later. The bulletin is listed as “important,” with credit going to Nils Sommer of zytegeist and Matt Tait of Google Project Zero and enSilo.
  • MS15-074: An elevation of privilege vulnerability in Windows Installer for Server 2003 and later, as well as Vista and later. The bulletin is listed as "important" with credit going to Mariusz Mlynsk of the HP Zero Day Initiative.
  • MS15-075: Two elevation-of-privilege flaws in Windows OLE for Server 2003 and later and Windows Vista and later. The flaw is listed as "important." Discovery credit was given to Nicolas Joly.
  • MS15-076: Elevation-of-privilege flaw in systems after Windows Server 2003 and Windows Vista. The bulletin was listed as "important" with no discovery credit given.

Let's also mention that on Tuesday's Patch you will find the latest update for the 2003 Server, as its support stops.

Along with Microsoft's updates, it will you must also inform or disable Adobe Flash, Acrobat, Reader, and Shockwave

Microsoft Security Bulletin Summary for July 2015

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).