MS Patch Tuesday May 2015

MS Patch Tuesday May 2015

MS Patch Tuesday May 2015

 

This May 2015 Patch Tuesday Microsoft released 13 security bulletins addressing a total of 46 vulnerabilities. This month high priority fix is for Internet Explorer which alone addresses 22 out of 46 vulnerabilities.

This month 3 bulletins are rated as Critical, addressing 30 vulnerabilities and 10 are rated as Important.

Critical security updates addresses security issues in Internet Explorer 6 to Internet Explorer 11, Microsoft Font Drivers and Windows Journal. All of them potentially allow Remote Code Execution and even though Microsoft Office and Microsoft SharePoint Servers are marked as Important they allows Remote Code Execution. Overall 5 out of 13 bulletins allow Remote Code Execution, hence these bulletins are high priority for deploying patches.

The other 8 important security updates address issues in .NET Framework, Silverlight, Service Control Manager, Windows Kernel-Mode Drivers, Windows Kernel, JScript and VBScript Scripting Engines, Microsoft Management Console File Format, Schannel.

 
Microsoft security bulletin summary for May 2015 in order of severity.

MS15-043: Cumulative Security Update for Internet Explorer (3049563)
Severity Rating: Critical
Affected Software: Internet Explorer
Impact: Remote Code Execution

MS15-044: Vulnerabilities in Microsoft Font Drivers Could Allow Remote Code Execution (3057110)
Severity Rating: Critical
Affected Software: Microsoft Font Drivers
Impact: Remote Code Execution, Information Disclosure

MS15-045: Vulnerability in Windows Journal Could Allow Remote Code Execution (3046002)
Severity Rating: Critical
Affected Software: Windows Journal
Impact: Remote Code Execution

MS15-046: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3057181)
Severity Rating: Important
Affected Software: Microsoft Office, Microsoft SharePoint Foundation, Microsoft SharePoint Server
Impact: Remote Code Execution

MS15-047: Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (3058083)
Severity Rating: Important
Affected Software: Microsoft SharePoint Server
Impact: Remote Code Execution

MS15-048: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (3057134)
Severity Rating: Important
Affected Software: .NET Framework
Impact: Elevation of Privilege, Denial of Service

MS15-049: Vulnerability in Silverlight Could Allow Elevation of Privilege (3058985)
Severity Rating: Important
Affected Software: Silverlight
Impact: Elevation of Privilege

MS15-050: Vulnerability in Service Control Manager Could Allow Elevation of Privilege (3055642)
Severity Rating: Important
Affected Software: Service Control Manager
Impact: Elevation of Privilege

MS15-051: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057191)
Severity Rating: Important
Affected Software: Windows Kernel-Mode Drivers
Impact: Elevation of Privilege

MS15-052: Vulnerability in Windows Kernel Could Allow Security Feature Bypass (3050514)
Severity Rating: Important
Affected Software: Windows Kernel
Impact: Security Feature Bypass

MS15-053: Vulnerabilities in JScript and VBScript Scripting Engines Could Allow Security Feature Bypass (3057263)
Severity Rating: Important
Affected Software: JScript and VBScript Scripting Engines
Impact: Security Feature Bypass

MS15-054: Vulnerability in Microsoft Management Console File Format Could Allow Denial of Service (3051768)
Severity Rating: Important
Affected Software: Microsoft Management Console File Format
Impact: Denial of Service

MS15-055: Vulnerability in Schannel Could Allow Information Disclosure (3061518)
Severity Rating: Important
Affected Software: Schannel
Impact: Information Disclosure

 
SecPod Saner detects these vulnerabilities and automatically fixes by applying security updates. Download Saner now and keep your systems updated and secure.

~ Veerendra GG

Loading Facebook Comments ...

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>