Microsoft Security Bulletins For July 2015

Welcome to the July 2015 patch overview that reviews all security and non-security patches that Microsoft released this month for Microsoft Windows and other company products.

This is the last Patch Tuesday before the release of Microsoft’s new operating system Windows 10.

The guide starts with an executive summary that provides you with a quick overview of the most important information.

It is then followed by information detailing which Microsoft products and versions are affected by security patches, and then the list of security patches and security advisories.

mod apk

Afterwards, we list non-security patches that may be of interest and how to download and deploy the updates.

Executive Summary

  • Microsoft released a total of 14 different security bulletins in July 2015.
  • Four of the bulletins have received the highest aggregate severity rating of critical.
  • All client and server operating systems with the exception of Server Core are affected by at least one critical bulletin.
  • Software affected by vulnerabilities this month include Microsoft Office, Microsoft SharePoint Server and SQL Server.

Operating System Distribution

Windows Vista is affected by two critical bulletins while all other client operating systems are only affected by one. The bulletin that affects Vista but no other client operating system is MS15-066 which patches vulnerabilities in the VBScript Scripting Engine.

The server side shows a similar picture, only that Server 2003 and 2008 are affected by the same vulnerability while newer Server versions are not.

  • Windows Vista: 2 critical, 2 important (MS15-065, MS15-066, MS15-072, MS15-073)
  • Windows 7: 1 critical, 2 important (MS15-065, MS15-072, MS15-073)
  • Windows 8 and 8.1: 1 critical, 2 important (MS15-065, MS15-072, MS15-073)
  • Windows RT and Windows RT 8.1: 1 critical (MS15-065)
  • Windows Server 2003: 1 critical, 2 important, 1 moderate (MS15-065, MS15-072, MS15-073, MS15-066)
  • Windows Server 2008: 1 critical, 2 important, 1 moderate (MS15-065, MS15-072, MS15-073, MS15-066)
  • Windows Server 2008 R2:  2 important, 1 moderate (MS15-065, MS15-072, MS15-073)
  • Windows Server 2012 and 2012 R2: 2 important, 1 moderate (MS15-072, MS15-073, MS15-065)
  • Server Core: 2 important (MS15-072, MS15-073)

Other Microsoft Products

  • Microsoft SQL Server 2008 Service Pack 3, Service Pack 4: 1 important (MS15-058)
  • Microsoft SQL Server 2008 R2 Service Pack 2, Service Pack 3: 1 important (MS15-058)
  • SQL Server 2012 Service Pack 1, Service Pack 2: 1 important (MS15-058)
  • SQL Server 2014: 1 important (MS15-058)
  • Microsoft Office 2007, 2010, 2013, 2013 RT, Office for Mac, Excel Viewer 2007, Word Viewer, Office Compatibility Pack Service Pack 3: 1 important (MS15-070)
  • Microsoft SharePoint Server 2007, 2010, 2013: 1 important (MS15-070)

Security Bulletins

  • MS15-058 – Vulnerabilities in SQL Server Could Allow Remote Code Execution (3065718) – Important – Remote Code Execution
  • MS15-065 – Security Update for Internet Explorer (3076321) – Critical – Remote Code Execution
  • MS15-066 – Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3072604) – Critical – Remote Code Execution
  • MS15-067 – Vulnerability in RDP Could Allow Remote Code Execution (3073094) – Critical – Remote Code Execution
  • MS15-068 – Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution (3072000) – Critical – Remote Code Execution
  • MS15-069 – Vulnerabilities in Windows Could Allow Remote Code Execution (3072631) – Important – Remote Code Execution
  • MS15-070 – Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3072620) – Important – Remote Code Execution
  • MS15-071 – Vulnerability in Netlogon Could Allow Elevation of Privilege (3068457) – Important – Elevation of Privilege
  • MS15-072 – Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege (3069392) – Important – Elevation of Privilege
  • MS15-073 – Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (3070102) – Important – Elevation of Privilege
  • MS15-074 – Vulnerability in Windows Installer Service Could Allow Elevation of Privilege (3072630) – Important – Elevation of Privilege
  • MS15-075 – Vulnerabilities in OLE Could Allow Elevation of Privilege (3072633) – Important – Elevation of Privilege
  • MS15-076 – Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege (3067505) – Important – Elevation of Privilege
  • MS15-077 – Vulnerability in ATM Font Driver Could Allow Elevation of Privilege (3077657) – Important – Elevation of Privilege

Security Advisories and updates

  • Security Update for Internet Explorer Flash Player for Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows 8, Windows RT, and Windows Server 2012 (KB3065823) – Microsoft security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer: July 8, 2015
  • Security Update for Internet Explorer Flash Player for Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows 8, Windows RT, and Windows Server 2012 (KB3074219) – Microsoft security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer: June 23, 2015
  • MS15-057: Security Update for WEPOS and POSReady 2009 (KB3033890) – MS15-057: Vulnerability in Windows Media Player could allow remote code execution: June 9, 2015
  •  Microsoft Security Advisory 2974294 – Vulnerability in Microsoft Malicious Software Removal Tool Could Allow Elevation of privilege
  • Microsoft Security Advisory 3057154 – Update to Harden Use of DES Encryption

Non-security related updates

  • Update for Windows 7 (KB2952664) – Compatibility update for upgrading Windows 7
  • Update for Windows 8.1 (KB2976978) – Compatibility update for Windows 8.1 and Windows 8
  • Update for Windows 8.1 and Windows 7 (KB3035583) – Update installs Get Windows 10 app in Windows 8.1 and Windows 7 SP1
  • Update for Windows 7 (KB2977759) – Compatibility update for Windows 7 RTM
  • Update for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2 (KB3065987) – Windows Update Client for Windows 7 and Windows Server 2008 R2: July 2015
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3065988) – Windows Update Client for Windows 8.1 and Windows Server 2012 R2: July 2015
  • Update for Windows 8.1 and Windows Server 2012 R2 (KB3013791) – “DPC_WATCHDOG_VIOLATION (0x133)” Stop error when there’s faulty hardware in Windows 8.1 or Windows Server 2012 R2
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3018467) – Items in the navigation pane of File Explorer may disappear in Windows
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3029438) – Can’t open Windows Store applications in Windows 8.1 or Windows Server 2012 R2
  • Update for Windows 8.1 and Windows RT 8.1 (KB3029606) – Update to improve Bluetooth driver diagnosis in Windows 8.1
  • Update for Windows 7 and Windows Server 2008 R2 (KB3040272) – Start time increases after another language pack is added to Windows
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3049989) – HKSCS characters are displayed incorrectly by PDF APIs in Windows
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3053863) – Windows 8.1 can’t discover Samsung TV as wireless display device
  • Update for Windows Server 2012 R2 (KB3054203) – Update for SIP to enable WinVerifyTrust function in Windows Server 2012 R2 to work with a later version of Windows
  • Update for Windows Server 2012 (KB3054204) – Update lets the WinVerifyTrust function in Windows Server 2012 work with a later version of Windows
  • Update for Windows Server 2008 R2 (KB3054205) – Update for SIP to enable WinVerifyTrust function in Windows Server 2008 R2 SP1 to work with a later version of Windows
  • Update for Windows Server 2008 (KB3054206) – Update for SIP to enable WinVerifyTrust function in Windows Server 2008 SP2 to work with a later version of Windows
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3054256) – Reliability improvements for Windows 8.1: June 2015
  • Update for Windows 8.1 and Windows RT 8.1 (KB3056347) – Location feature is not turned off after you enable “Turn off location” policy setting in Windows RT 8.1 or Windows 8.1
  • Update for Windows 8, Windows RT, and Windows Server 2012 (KB3058163) – Activation doesn’t work if the sppsvc.exe process doesn’t start automatically in Windows 8 or Windows Server 2012
  • Update for Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows 8, Windows RT, and Windows Server 2012 (KB3058168) – Update that enables Windows 8.1 and Windows 8 KMS hosts to activate a later version of Windows
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3059316) – You cannot move the scrollbar on Windows by dragging the mouse
  • Update for Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows 8, Windows RT, and Windows Server 2012 (KB3060383) – Decimal symbol and digit grouping symbol are incorrect for the Swiss language locale in Windows
  • Update for Windows Server 2012 R2 (KB3060681) – SIL hourly task fails to forward complete data over https in Windows Server 2012 R2
  • Update for Windows 8.1 and Windows Server 2012 R2 (KB3060793) – “0x0000001E” or “0x00000133” Stop error when you transfer data through a USB-based RNDIS device on Windows
  • Update for Windows 8.1, Windows RT 8.1, Windows 8, and Windows RT (KB3061421) – Updated APN database entry for Northern Michigan University (NMU) for Windows 8.1 and 8
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3061468) – June 2015 compatibility update for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3063843) – System takes too long time to log on to a computer because of large numbers of WNF state name registrations in Windows
  • Update for Windows 8.1 and Windows RT 8.1 (KB3064059) – Explorer.exe process crashes after File History item in Control Panel is opened in Windows 8.1
  • Update for Windows 8.1, Windows Server 2012 R2, Windows 8, Windows Server 2012, Windows 7, and Windows Server 2008 R2 (KB3064209) – June 2015 Intel CPU microcode update for Windows
  • Update for Windows Embedded Standard 7, Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows Vista, Windows Server 2003, and Windows XP Embedded (KB3065979) – “GsDraw error (1): GenericError” error occurs and application crashes when you create text outline in Windows
  • Update for Windows 8.1 (KB3064683) – Windows 8.1 OOBE modifications to reserve Windows 10

How to download and install the July 2015 security updates

windows updates july 2015

Updates are provided via Windows Update if automatic updates are enabled. Updates are not picked up in real-time by Windows which is why you may want to run a manual check for updates to download and deploy them as soon as possible.

  1. Tap on the Windows-key.
  2. Type Windows Update and select the right result.
  3. When the new window opens, click on “check for updates” to run a manual check.

Windows users who don’t want to download updates automatically find them listed on Microsoft’s Download Center as well.

There they are offered as individual downloads and as a monthly security ISO image.

Last but not least, several third-party programs exist that you can use to download all patches in one operation without using Windows Update.

Additional information

Summary

Article Name

Microsoft Security Bulletins For July 2015

Author

Martin Brinkmann

Description

The article provides an overview of all security and non-security bulletins and patches that Microsoft released in July 2015.

About Martin Brinkmann

Martin Brinkmann is a journalist from Germany who founded Ghacks Technology News Back in 2005. He is passionate about all things tech and knows the Internet and computers like the back of his hand. You can follow Martin on Facebook, Twitter or Google+

This entry passed through the Full-Text RSS service – if this is your content and you’re reading it on someone else’s site, please read the FAQ at fivefilters.org/content-only/faq.php#publishers.