Threat Level: green Handler on Duty: Xavier Mertens

SANS ISC: Microsoft Patch Tuesday - SANS Internet Storm Center Microsoft Patch Tuesday


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Microsoft Patch Tuesday 2015-04-14

MS15-032
Title Cumulative Security Update for Internet Explorer
Replaces MS15-018
Affected
KB KB3038314
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-1652 0
MS15-033
Title Vulnerabilities in Microsoft Office Could Allow Remote Code Execution
Replaces MS14-081, MS15-022
Affected
KB KB3048019
Known Exploits Yes
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-1639 0
MS15-034
Title Vulnerability in HTTP.sys Could Allow Remote Code Execution
Replaces
Affected
KB KB3042553
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-1635 0
MS15-035
Title Vulnerability in Microsoft Graphics Component Could Allow Remote Code Execution
Replaces
Affected
KB KB3046306
Known Exploits No
Microsoft Rating Critical
ISC Client Rating Critical
ISC Server Rating Critical
CVE Exploitability
2015-1645 0
MS15-036
Title Vulnerabilities in Microsoft SharePoint Server Could Allow Elevation of Privilege
Replaces MS15-022
Affected
KB KB3052044
Known Exploits No
Microsoft Rating Important
ISC Client Rating N/A
ISC Server Rating N/A
CVE Exploitability
2015-1640 0
MS15-037
Title Vulnerability in Windows Task Scheduler Could Allow Elevation of Privilege
Replaces
Affected
KB KB3046269
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2015-0098 0
MS15-038
Title Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege
Replaces MS15-025, MS15-031
Affected
KB KB3049576
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2015-1643 0
MS15-039
Title Vulnerability in XML Core Services Could Allow Security Feature Bypass
Replaces MS14-067
Affected
KB KB3046482
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2015-1646 0
MS15-040
Title Vulnerability in Active Directory Federation Services Could Allow Information Disclosure
Replaces
Affected
KB KB3045711
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2015-1638 0
MS15-041
Title Vulnerability in .NET Framework Could Allow Information Disclosure
Replaces MS14-009
Affected
KB KB3048010
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2015-1648 0
MS15-042
Title Vulnerability in Windows Hyper-V Could Allow Denial of Service
Replaces
Affected
KB KB3047234
Known Exploits No
Microsoft Rating Important
ISC Client Rating Important
ISC Server Rating Important
CVE Exploitability
2015-1647 0
We will update issues on this page for about a week or so as they evolve. We appreciate your updates!
US based customers can call Microsoft for free patch related support on 1-866-PCSAFETY
(*): ISC rating
  • We use 4 levels:
    • PATCH NOW: Typically used where we see immediate danger of exploitation. Typical environments will want to deploy these patches ASAP. Workarounds are typically not accepted by users or are not possible. This rating is often used when typical deployments make it vulnerable and exploits are being used or easy to obtain or make.
    • Critical: Anything that needs little to become "interesting" for the dark side. Best approach is to test and deploy ASAP. Workarounds can give more time to test.
    • Important: Things where more testing and other measures can help.
    • Less Urgent: practices for servers such as not using outlook, MSIE, word etc. to do traditional office or leisure work.
    • The rating is not a risk analysis as such. It is a rating of importance of the vulnerability and the perceived or even predicted threatatches.