Microsoft-Patchday Juli 2015

Microsoft Logo

Heute ist wieder Microsoft-Patchday. Mit dem 14. Juli 2015 fällt dieser ungewöhnlich spät aus – naja eben der zweite Dienstag im Monat. Der Juli-Patchday beinhaltet insgesamt 14 Security-Bulletins, wovon vier als „kritisch“ und zehn als „hoch“ eingestuft werden.

Nachfolgend ein grober Überblick der zur Verfügung stehenden sicherheitsrelevanten Updates. Weitere Details stellt Microsoft wie immer im Security TechCenter zur Verfügung.

Bulletin ID Bulletin TitleMaximum Severity Rating and Vulnerability ImpactRestart RequirementAffected Software
MS15-058 Vulnerabilities in SQL Server Could Allow Remote Code Execution (3065718)Important
Remote Code Execution
May require restartMicrosoft SQL Server 2008, SQL Server 2008 R2, SQL Server 2012, and SQL Server 2014.
MS15-065 Security Update for Internet Explorer (3076321)Critical
Remote Code Execution
Requires restartInternet Explorer on affected Microsoft Windows clients and servers.
MS15-066 Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3072604)Critical
Remote Code Execution
May require restartMicrosoft Windows Server 2003, Windows Vista, and Windows Server 2008.
MS15-067 Vulnerability in RDP Could Allow Remote Code Execution (3073094)Critical
Remote Code Execution
Requires restartMicrosoft Windows 7, Windows 8, and Windows Server 2012.
MS15-068 Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution (3072000)Critical
Remote Code Execution
Requires restartMicrosoft Windows Server 2008, Windows Server 2008 R2, Windows 8, Windows 8.1, Windows Server 2012, and Windows Server 2012 R2.
MS15-069 Vulnerabilities in Windows Could Allow Remote Code Execution (3072631)Important
Remote Code Execution
May require restartWindows Server 2003 (excluding Itanium), Windows Vista, Windows Server 2008 (excluding Itanium), Windows 7, Windows Server 2008 R2 (excluding Itanium), Windows 8.1, Windows 2012 R2, and Windows RT 8.1.
MS15-070 Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3072620)Important
Remote Code Execution
May require restartMicrosoft Office 2007, Office 2010, Office 2013, Office 2013 RT, Office for Mac 2011, Excel Viewer 2007, Office Compatibility Pack, Word Viewer, SharePoint Server 2007, SharePoint Server 2010, and SharePoint Server 2013.
MS15-071 Vulnerability in Netlogon Could Allow Elevation of Privilege (3068457)Important
Elevation of Privilege
Requires restartMicrosoft Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2.
MS15-072 Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege (3069392)Important
Elevation of Privilege
Requires restartAll supported releases of Microsoft Windows.
MS15-073 Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (3070102)Important
Elevation of Privilege
Requires restartAll supported releases of Microsoft Windows.
MS15-074 Vulnerability in Windows Installer Service Could Allow Elevation of Privilege (3072630)Important
Elevation of Privilege
Requires restartAll supported releases of Microsoft Windows.
MS15-075 Vulnerabilities in OLE Could Allow Elevation of Privilege (3072633)Important
Elevation of Privilege
May require restartAll supported releases of Microsoft Windows.
MS15-076 Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege (3067505)Important
Elevation of Privilege
Requires restartAll supported releases of Microsoft Windows.
MS15-077 Vulnerability in ATM Font Driver Could Allow Elevation of Privilege (3077657)Important
Elevation of Privilege
Requires restartAll supported releases of Microsoft Windows.

Tobi

Hallo, mein Name ist Tobias und ich habe diesen Blog im April 2009 ins Leben gerufen. Seitdem blogge ich hier über Software, Internet, Windows und andere Themen, die mich interessieren. SSDblog ist mein zweiter Blog, indem es rund um das Thema SSDs geht. Ich würde mich freuen, wenn ihr meinen Feed abonniert oder mir auf Twitter und Facebook folgt.

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert.