Sign up for our Newsletters

First Name:
Last Name:
Email:


November 18, 2014

Microsoft Security Bulletin Releases

Summary

=======

The following bulletin has been released.

  * MS14-068 - Critical

The following bulletins have undergone a major revision increment.

  * MS14-066 - Critical

  * MS14-NOV

Bulletin Information:

=====================

MS14-068 - Critical

 - https://technet.microsoft.com/library/security/ms14-068

 - Reason for Revision: V1.0 (November 18, 2014): Bulletin

   published.

 - Originally posted: November 18, 2014

 - Updated: November 18, 2014

 - Bulletin Severity Rating: Critical

 - Version: 1.0

MS14-066 - Critical

 - https://technet.microsoft.com/library/security/ms14-066

 - Reason for Revision: V2.0 (November 18, 2014): Bulletin revised

   to announce the reoffering of the 2992611 update to systems

   running Windows Server 2008 R2 and Windows Server 2012. The

   reoffering addresses known issues that a small number of

   customers experienced with the new TLS cipher suites that were

   included in the original release. Customers running Windows

   Server 2008 R2 or Windows Server 2012 who installed the 2992611

   update prior to the November 18 reoffering should reapply the

   update. See Microsoft Knowledge Base Article 2992611 for more

   information.

 - Originally posted: November 11, 2014

 - Updated: November 18, 2014

 - Bulletin Severity Rating: Critical

 - Version: 2.0

MS14-NOV

 - https://technet.microsoft.com/library/security/ms14-nov

 - Reason for Revision: V2.0 (November 18, 2014): Bulletin Summary

   revised to document the out-of-band release of MS14-068 and,

   for MS14-066, to announce the reoffering of the 2992611 update

   to systems running Windows Server 2008 R2 and Windows Server

   2012. See the respective bulletins for more information.

 - Originally posted: November 11, 2014

 - Updated: November 18, 2014

 - Version: 2.0

Other Information

=================

Recognize and avoid fraudulent email to Microsoft customers:

=============================================================

If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites. Microsoft does not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally sign all security notifications. However, PGP is not required for reading security notifications, reading security bulletins, or installing security updates.

You can obtain the MSRC public PGP key at <https://technet.microsoft.com/security/dn753714>.

********************************************************************

THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS IS"

WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.

********************************************************************

Microsoft respects your privacy. Please read our online Privacy Statement at <http://go.microsoft.com/fwlink/?LinkId=81184>.

If you would prefer not to receive future technical security notification alerts by email from Microsoft and its family of companies please visit the following website to unsubscribe:

<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar

d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.

These settings will not affect any newsletters youb

November, 18 2014