Microsoft Security Bulletins For May 2015

Martin Brinkmann
May 12, 2015
Updated • Jan 4, 2018
Companies, Microsoft
|
16

This page offers an overview of Microsoft's May 2015 patch day. The guide provides you with information about each security bulletin that was released today as part of the the update day.

It lists all security bulletins released by the company today and all non-security updates released by Microsoft since the last Patch Tuesday which happened on April 14, 2015.

It starts with an executive summary highlighting the most important information about this month's update.

This is followed by a detailed operating system distribution which covers both client and server operating systems, other affected Microsoft products, all bulletins, security advisories and non-security updates released by Microsoft, and finally information on how to obtain the updates.

Executive Summary

  • Microsoft released 13 security bulletins in this month's security update.
  • Updates affect all client and server operating systems including both Windows 10 Technical Preview releases.
  • All operating systems with the exception of Server Core are affected by at least one critical bulletin.
  • Other affected software includes Microsoft Silverlight, Microsoft Office and Microsoft SharePoint Server.

Operating System Distribution

On the client side, Windows 7 is the least affected operating system this month with 2 critical and 1 important bulletin while all other supported client operating systems are affected by 2 critical and 2 important bulletins. The bulletins that does not affect Windows 7 but the other operating systems is MS15-053 (Windows Vista) and MS15-052 (Windows 8 and newer).

The server side shares that. Windows Server 2008 R2 is the least affected this month and not affected by MS15-053 (pre-Server 2008 R2) or Ms15-52 (post-Server 2008 R2).

Windows Technical Preview and Windows Server Technical Preview are affected by MS15-053 and MS15-054.

Other Microsoft Products

  • Microsoft SharePoint Server 2007, 2010, 2013: 2 important (MS15-046 and MS15-047)
  • Microsoft Office 2007, 2010: 1 critical, 1 important (MS15-044, MS15-046)
  • Microsoft Office 2013, Office 2013 RT, Office for Mac, PowerPoint Viewer: 1 important (Ms15-046)
  • Microsoft Office Web Apps 2010, 2013: 1 important (MS14-046)
  • Microsoft Live Meeting 2007, Lync 2010, Lync 2013: 1 critical (MS14-044)
  • Microsoft Silverlight: 1 critical, 1 important (MS15-044 and MS15-049)

Security Bulletins

  • MS15-043 - Cumulative Security Update for Internet Explorer (3049563) - Critical - Remote Code Execution
  • MS15-044 - Vulnerabilities in Microsoft Font Drivers Could Allow Remote Code Execution (3057110) - Critical - Remote Code Execution
  • MS15-045 - Vulnerability in Windows Journal Could Allow Remote Code Execution (3046002) - Critical - Remote Code Execution
  • MS15-046 - Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3057181) - Important - Remote Code Execution
  • MS15-047 - Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (3058083) - Important - Remote Code Execution
  • MS15-048 - Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (3057134) - Important - Elevation of Privilege
  • MS15-049 - Vulnerability in Silverlight Could Allow Elevation of Privilege (3058985) - Important - Elevation of Privilege
  • MS15-050 - Vulnerability in Service Control Manager Could Allow Elevation of Privilege (3055642) - Important - Elevation of Privilege
  • MS15-051 - Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (3057191) - Important - Elevation of Privilege
  • MS15-052 - Vulnerability in Windows Kernel Could Allow Security Feature Bypass (3050514) - Important - Security Bypass Feature
  • MS15-053 - Vulnerabilities in JScript and VBScript Scripting Engines Could Allow Security Feature Bypass (3057263) - Important - Security Bypass Feature
  • MS15-054 - Vulnerability in Microsoft Management Console File Format Could Allow Denial of Service (3051768) - Important - Denial of Service
  • MS15-055 - Vulnerability in Schannel Could Allow Information Disclosure (3061518) - Important - Information Disclosure

Security Advisories and updates

  • Microsoft Security Advisory 3042058 (new): Update to Default Cipher Suite Priority Order
  • Microsoft Security Advisory 2755801 (revised): Update for Vulnerabilities in Adobe Flash Player in Internet Explorer
  • MS15-035: Security Update for Windows Embedded Standard 7, Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows Vista, Windows Server 2003 and Windows XP Embedded (KB3046306) - MS15-035: Vulnerability in Microsoft graphics component could allow remote code execution: April 14, 2015
  • Security Update for Internet Explorer Flash Player for Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows 8, Windows RT, and Windows Server 2012 (KB3049508) - Microsoft security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer: April 15, 2015
  • Security Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3045755) - Microsoft Security Advisory 3045755: Update to improve PKU2U authentication

Non-security related updates

  • Update for Windows 8.1 and Windows Server 2012 R2 (KB3022345) - Update to enable the Diagnostics Tracking Service in Windows (see: disable the Diagnostics Tracking Service for instructions to turn it off)
    Update for Windows 8, Windows RT, and Windows Server 2012 (KB3003729) - April 2015 servicing stack update for Windows 8 and Windows Server 2012
  • Update for Windows 7 and Windows Server 2008 R2 (KB3020369) - Update 2819745 installation fails on a read-only domain controller (RODC) in Windows Server 2008 R2
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3021910) - April 2015 servicing stack update for Windows 8.1 and Windows Server 2012 R2
  • Update for Windows 8, Windows RT, Windows Server 2012, Windows 7, and Windows Server 2008 R2 (KB3045645) - Update to force a UAC prompt when a customized .sdb file is created in Windows
  • Update for Windows 8.1 and Windows 7 (KB3046480) - Update helps to determine whether to migrate the .NET Framework 1.1 when you upgrade Windows 8.1 or Windows 7
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3048043) - Screen flickers or becomes blank when you drag tiles on the Start screen in Windows
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3048097) - Compatibility update for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2: April 2015
  • Update for Windows 8.1, Windows RT 8.1, Windows 8, and Windows RT (KB3047276) - Update APN database entry for Cubic Mobile (Liechtenstein) and Verizon Wireless (US) in Windows 8.1 and Windows 8
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3054169) - Update to add more information to minidump files that helps OCA servers categorize failures correctly in Windows
  • List of additional patches released in April

How to download and install the May 2015 security updates

microsoft security-bulletins updates may 2015

Updates are already available via Windows Update. Since update checks are not run in real-time, you may want to run a manual check for updates to find and install the updates as soon as possible on your system.

To do that, tap on the Windows-key, type Windows Update, hit the enter-key and click on check for updates in the window that opens.

Cautious users may want to wait with the installation as updates may have unforeseen consequences on systems as the past has shown.

Updates can be downloaded individually from Microsoft's Download Center or via monthly released security images.

You may also find third-party tools like WSUS helpful in this regard.

Additional information

Summary
Microsoft Security Bulletins For May 2015
Article Name
Microsoft Security Bulletins For May 2015
Description
An overview of all Microsoft security bulletins, security advisories and non-security patches the company released in May 2015.
Author
Advertisement

Tutorials & Tips


Previous Post: «
Next Post: «

Comments

  1. The Dark Lady said on July 9, 2023 at 11:19 am
    Reply

    Martin, I would appreciate that you do not censor this post, as it’s informative writing.

    Onur, there is a misleading statement “[…] GIFs are animated images …”. No, obviously you don’t seem to have take much notice of what you were told back in March regarding; Graphics Interchange Format (GIF).

    For example, https://www.ghacks.net/2023/03/31/whats-gif-explanation-and-how-to-use-it/#comment-4562919 (if you had read my replies within that thread, you might have learnt something useful). I even mentioned, “GIF intrinsically supports animated images (GIF89a)”.

    You linked to said article, [Related: …] within this article, but have somehow failed to take onboard what support you were given by several more knowledgeable people.

    If you used AI to help write this article, it has failed miserably.

  2. KeZa said on August 17, 2023 at 5:58 pm
    Reply

    AI is stupid, and it will not get any better if we really know how this all works. Prove me wrong.. https://www.youtube.com/watch?v=4IYl1sTIOHI

  3. Database failure said on August 18, 2023 at 5:21 pm
    Reply

    Martin, [#comment-4569908] is only meant to be in: [https://www.ghacks.net/2023/07/09/how-to-send-gifs-on-iphone-two-different-ways/]. Whereas it appears duplicated in several recent random low-quality non relevant articles.

    Obviously it [#comment-4569908] was posted: 9 July 2023. Long before this thread even existed… your database is falling over. Those comments are supposed to have unique ID values. It shouldn’t be possible to duplicate the post ID, if the database had referential integrity.

  4. Howard Pearce said on August 25, 2023 at 12:24 pm
    Reply

    Don’t tell me!

    Ghacks wants the state to step in for STATE-MANDATED associations to save jobs!!!

    Bring in the dictatorship!!!

    And screw Rreedom of Association – too radical for Ghacks maybe

  5. Howard Allan Pearce said on September 7, 2023 at 9:13 am
    Reply

    GateKeeper ?

    That’s called “appointing” businesses to do the state’s dirty work!!!!!

    But the article says itself that those appointed were not happy – implying they had not choice!!!!!!

  6. owl said on September 7, 2023 at 9:50 am
    Reply

    @The Dark Lady,
    @KeZa,
    @Database failure,
    @Howard Pearce,
    @Howard Allan Pearce,

    Note: I replaced the quoted URI scheme: https:// with “>>” and posted.

    The current ghacks.net is owned by “Softonic International S.A.” (sold by Martin in October 2019), and due to the fate of M&A, ghacks.net has changed in quality.
    >> ghacks.net/2023/09/02/microsoft-is-removing-wordpad-from-windows/#comment-4573130
    Many Authors of bloggers and advertisers certified by Softonic have joined the site, and the site is full of articles aimed at advertising and clickbait.
    >> ghacks.net/2023/08/31/in-windows-11-the-line-between-legitimate-and-adware-becomes-increasingly-blurred/#comment-4573117
    As it stands, except for articles by Martin Brinkmann, Mike Turcotte, and Ashwin, they are low quality, unhelpful, and even vicious. It is better not to read those articles.
    How to display only articles by a specific author:
    Added line to My filters in uBlock Origin: ghacks.net##.hentry,.home-posts,.home-category-post:not(:has-text(/Martin Brinkmann|Mike Turcotte|Ashwin/))
    >> ghacks.net/2023/09/01/windows-11-development-overview-of-the-august-2023-changes/#comment-4573033

    By the way, if you use an RSS reader, you can track exactly where your comments are (I’m an iPad user, so I use “Feedly Classic”, but for Windows I prefer the desktop app “RSS Guard”).
    RSS Guard: Feed reader which supports RSS/ATOM/JSON and many web-based feed services.
    >> github.com/martinrotter/rssguard#readme

  7. Anonymous said on September 14, 2023 at 6:41 pm
    Reply

    We all live in digital surveillance glass houses under scrutiny of evil people because of people like Musk. It’s only fair that he takes his turn.

  8. Anonymous said on September 18, 2023 at 1:31 pm
    Reply

    “Operating systems will be required to let the user choose the browser, virtual assistant and search engine of their choice. Microsoft cannot force users to use Bing or Edge. Apple will have to open up its iOS operating system to allow third-party app stores, aka allow sideloading of apps. Google, on the other hand, will need to provide users with the ability to uninstall preloaded apps (bloatware) from Android devices. Online services will need to allow users to unsubscribe from their platform easily. Gatekeepers need to provide interoperability with third-parties that offer similar services.”

    Wonderful ! Let’s hope they’ll comply with that law more than they are doing with the GDPR.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.