-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
******************************************************************************* *****
Title: Microsoft Security Update Revisions
Issued: January 14, 2022 ****************************************************** ******************************
Summary
=======
The following CVEs have undergone revision increments. ======================== ==============================================================
* CVE-2022-21840
* CVE-2022-21841
* CVE-2022-21880
* CVE-2022-21882
* CVE-2022-21893
* CVE-2022-21907
* CVE-2022-21913
- CVE-2022-21840 | Microsoft Office Remote Code Execution Vulnerability
-
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21840
- Version: 2.0
- Reason for Revision: Microsoft is announcing the availability of the security
updates for Microsoft Office for Mac. Customers running affected Mac software
should install the update for their product to be protected from this vulnerability.
Customers running other Microsoft Office software do not need to take any action.
See the Release Notes for more information and download links.
- Originally posted: January 11, 2022
- Updated: January 13, 2022
- Aggregate CVE Severity Rating: Critical
- CVE-2022-21841 | Microsoft Excel Remote Code Execution Vulnerability
-
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21841
- Version: 2.0
- Reason for Revision: Microsoft is announcing the availability of the security
updates for Microsoft Office for Mac. Customers running affected Mac software
should install the update for their product to be protected from this vulnerability.
Customers running other Microsoft Office software do not need to take any action.
See the Release Notes for more information and download links.
- Originally posted: January 11, 2022
- Updated: January 13, 2022
- Aggregate CVE Severity Rating: Important
- CVE-2022-21880 | Windows GDI+ Information Disclosure Vulnerability
-
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21880
- Version: 1.1
- Reason for Revision: Updated FAQ information. This is an informational change
only.
- Originally posted: January 11, 2022
- Updated: January 14, 2022
- Aggregate CVE Severity Rating: Important
- CVE-2022-21882 | Win32k Elevation of Privilege Vulnerability
-
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21882
- Version: 1.1
- Reason for Revision: Corrected Active Attack entry to Yes. When this
information was originally released, Microsoft was aware of limited,
targeted attacks that attempt to exploit this vulnerability.
- Originally posted: January 11, 2022
- Updated: January 13, 2022
- Aggregate CVE Severity Rating: Important
- CVE-2022-21893 | Remote Desktop Protocol Remote Code Execution Vulnerability
-
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21893
- Version: 1.1
- Reason for Revision: Updated one or more CVSS scores for the affected products.
This is an informational change only.
- Originally posted: January 11, 2022
- Updated: January 13, 2022
- Aggregate CVE Severity Rating: Important
- CVE-2022-21907 | HTTP Protocol Stack Remote Code Execution Vulnerability
-
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21907
- Version: 1.1
- Reason for Revision: Clarified the mitigation and added FAQs. This in an
informational change only.
- Originally posted: January 11, 2022
- Updated: January 12, 2022
- Aggregate CVE Severity Rating: Critical
- CVE-2022-21913 | Local Security Authority (Domain Policy) Remote Protocol
Security Feature Bypass
-
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21913
- Version: 1.1
- Reason for Revision: Added an FAQ. This is an information change only.
- Originally posted: January 11, 2022
- Updated: January 13, 2022
- Aggregate CVE Severity Rating: Important
Other Information
=================
Recognize and avoid fraudulent email to Microsoft customers: =============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.
The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, PGP is not required for
reading security notifications, reading security bulletins, or
installing security updates. You can obtain the MSRC public PGP key
at <
https://technet.microsoft.com/security/dn753714>.
********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY. ********************************************************************
IMPORTANT ANNOUNCEMENT: In the coming months we will be moving to a new, more user-friendly and flexible system for delivering Microsoft Technical Security Notifications. See "Coming Soon: New Security Update Guide Notification System" (
https://aka.ms/SUGNotificationProfile) for information about how you can sign up for
and receive these Technical Security Notifications.
Microsoft respects your privacy. Please read our online Privacy
Statement at <
http://go.microsoft.com/fwlink/?LinkId=81184>.
These settings will not affect any newsletters you’ve requested or
any mandatory service communications that are considered part of
certain Microsoft services.
For legal Information, see: <
http://www.microsoft.com/info/legalinfo/default.mspx>.
This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052
We would love to get your feedback on your experience with these
security notifications. Please help us improve your security
notifications experience by filling out the form here:
https://forms.office.co m/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR4ekF0eHYitGhfGrzmE_ydpUQUdMQU kzMFQwQzdYSjFBOTlXTjZWMDRRTi4u
If you would prefer not to receive future technical security
notification alerts by email from Microsoft and its family of
companies please visit the following website to unsubscribe:
https://account.microsoft.com/profile/unsubscribe?CTID=0&ECID=fOe4Gfs8aYU%2BoKR eBG4igucu3ca%2BO881Lbv9rtefRAE%3D&K=0481c0d7-e483-46cd-997b-e7e9111bbb81&CMID=n ull&D=637775207443454703&PID=18015&TID=adfd46f4-992a-45ec-935c-4c9bc4baf506
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEE4Q6SUN6tupDaY1CaExnEoumP1aEFAmHiKP4ACgkQExnEoumP 1aEZsA/+OkSfeB+0QRpctSC5o4sDY3ijm+D4+OL5/4OMbv4f9nazL8yf8fy0mjZM aHYz3gRvYk8C6d9VkilEQn0dR/2aLELa9Woj0XoVVrKRDOXP6mRQjAyR4Xq2KA87 UNe9tVskJzYF3VyZ0xc87A7Db4z8pqgsgw2//rlL06xKs6yw6MDmR3OgSq2TkXoT EaA03XbJHvb8ivHORK3K6ALLLw1GGqua8S2glrBRY9uHWKtyGikkeHkbBwgwgXOM i2bKa4Yp6nG1uDnbUSaoD1G6w4DZBUmcw0jD2nsiLGa1aJJYsm/uzeaL5KCByheg XXVg8nsX87onAVVJ6aUJMN8T7vrAQ9XCf9P917hAW1XWwgTPGkQSDt9rittfG39N /yrfNjp4fcUiA6en6YH9hAIrJzW308Iy+ZJQcPSMfxn8kRaBGMiOUxVawY5tbeN0 z8uf+wUI7VC3z8VtODJKV+uyXeUeF7VHge2trWFUjQt2Csw/lbrOO+d2pAu+qfrh bjThWaSk5UJHNdVCYlGqgOuShSpmUMwYhRfpLdpLQDgDacAHt4+hznLclMY/n0lA VdF8nyU6r9rKQntORSxUrd/K0AMD4I8IADt17gIupEHocvNoHqjMzhoqah5Q0q5Y lXK4NPEn7+V28Vu5ZB5oFjawEzikSwgEcK8uw/Vxr/SiKj9Jago=
=hB7m
-----END PGP SIGNATURE-----
If you would prefer not to receive future technical security
notification alerts by email from Microsoft and its family of
companies please visit the following website to unsubscribe:
https://account.microsoft.com/profile/unsubscribe?CTID=0&ECID=fOe4Gfs8aYU%2BoKR eBG4igucu3ca%2BO881Lbv9rtefRAE%3D&K=0481c0d7-e483-46cd-997b-e7e9111bbb81&CMID=n ull&D=637775207443454703&PID=18015&TID=adfd46f4-992a-45ec-935c-4c9bc4baf506
---
Synchronet Time Warp of the Future BBS - Home of League 10 IBBS Games