Microsoft-Patchday Juli 2015

Microsoft Logo

Heute ist wieder Microsoft-Patchday. Mit dem 14. Juli 2015 fällt dieser ungewöhnlich spät aus – naja eben der zweite Dienstag im Monat. Der Juli-Patchday beinhaltet insgesamt 14 Security-Bulletins, wovon vier als „kritisch“ und zehn als „hoch“ eingestuft werden.

Nachfolgend ein grober Überblick der zur Verfügung stehenden sicherheitsrelevanten Updates. Weitere Details stellt Microsoft wie immer im Security TechCenter zur Verfügung.

Bulletin ID Bulletin Title Maximum Severity Rating and Vulnerability Impact Restart Requirement Affected Software
MS15-058  Vulnerabilities in SQL Server Could Allow Remote Code Execution (3065718) Important
Remote Code Execution
May require restart Microsoft SQL Server 2008, SQL Server 2008 R2, SQL Server 2012, and SQL Server 2014.
MS15-065  Security Update for Internet Explorer (3076321) Critical
Remote Code Execution
Requires restart Internet Explorer on affected Microsoft Windows clients and servers.
MS15-066  Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3072604) Critical
Remote Code Execution
May require restart Microsoft Windows Server 2003, Windows Vista, and Windows Server 2008.
MS15-067  Vulnerability in RDP Could Allow Remote Code Execution (3073094) Critical
Remote Code Execution
Requires restart Microsoft Windows 7, Windows 8, and Windows Server 2012.
MS15-068  Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution (3072000) Critical
Remote Code Execution
Requires restart Microsoft Windows Server 2008, Windows Server 2008 R2, Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2.
MS15-069  Vulnerabilities in Windows Could Allow Remote Code Execution (3072631) Important
Remote Code Execution
May require restart Windows Server 2003 (excluding Itanium), Windows Vista, Windows Server 2008 (excluding Itanium), Windows 7, Windows Server 2008 R2 (excluding Itanium), Windows 8.1, Windows 2012 R2, and Windows RT 8.1.
MS15-070  Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3072620) Important
Remote Code Execution
May require restart Microsoft Office 2007, Office 2010, Office 2013, Office 2013 RT, Office for Mac 2011, Excel Viewer 2007, Office Compatibility Pack, Word Viewer, SharePoint Server 2007, SharePoint Server 2010, and SharePoint Server 2013.
MS15-071  Vulnerability in Netlogon Could Allow Elevation of Privilege (3068457) Important
Elevation of Privilege
Requires restart Microsoft Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2.
MS15-072  Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege (3069392) Important
Elevation of Privilege
Requires restart All supported releases of Microsoft Windows.
MS15-073  Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (3070102) Important
Elevation of Privilege
Requires restart All supported releases of Microsoft Windows.
MS15-074  Vulnerability in Windows Installer Service Could Allow Elevation of Privilege (3072630) Important
Elevation of Privilege
Requires restart All supported releases of Microsoft Windows.
MS15-075  Vulnerabilities in OLE Could Allow Elevation of Privilege (3072633) Important
Elevation of Privilege
May require restart All supported releases of Microsoft Windows.
MS15-076  Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege (3067505) Important
Elevation of Privilege
Requires restart All supported releases of Microsoft Windows.
MS15-077  Vulnerability in ATM Font Driver Could Allow Elevation of Privilege (3077657) Important
Elevation of Privilege
Requires restart All supported releases of Microsoft Windows.

Tobi

Hallo, mein Name ist Tobias und ich habe diesen Blog im April 2009 ins Leben gerufen. Seitdem blogge ich hier über Software, Internet, Windows und andere Themen, die mich interessieren. SSDblog ist mein zweiter Blog, indem es rund um das Thema SSDs geht. Ich würde mich freuen, wenn ihr meinen Feed abonniert oder mir auf Twitter, Facebook, Google+ und Google+ (privat) folgt.

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert.