Microsoft Security Bulletins For July 2015

Martin Brinkmann
Jul 14, 2015
Updated • Jan 4, 2018
Companies, Microsoft
|
21

Welcome to the July 2015 patch overview that reviews all security and non-security patches that Microsoft released this month for Microsoft Windows and other company products.

This is the last Patch Tuesday before the release of Microsoft's new operating system Windows 10.

The guide starts with an executive summary that provides you with a quick overview of the most important information.

It is then followed by information detailing which Microsoft products and versions are affected by security patches, and then the list of security patches and security advisories.

Afterwards, we list non-security patches that may be of interest and how to download and deploy the updates.

Executive Summary

  • Microsoft released a total of 14 different security bulletins in July 2015.
  • Four of the bulletins have received the highest aggregate severity rating of critical.
  • All client and server operating systems with the exception of Server Core are affected by at least one critical bulletin.
  • Software affected by vulnerabilities this month include Microsoft Office, Microsoft SharePoint Server and SQL Server.

Operating System Distribution

Windows Vista is affected by two critical bulletins while all other client operating systems are only affected by one. The bulletin that affects Vista but no other client operating system is MS15-066 which patches vulnerabilities in the VBScript Scripting Engine.

The server side shows a similar picture, only that Server 2003 and 2008 are affected by the same vulnerability while newer Server versions are not.

  • Windows Vista: 2 critical, 2 important (MS15-065, MS15-066, MS15-072, MS15-073)
  • Windows 7: 1 critical, 2 important (MS15-065, MS15-072, MS15-073)
  • Windows 8 and 8.1: 1 critical, 2 important (MS15-065, MS15-072, MS15-073)
  • Windows RT and Windows RT 8.1: 1 critical (MS15-065)
  • Windows Server 2003: 1 critical, 2 important, 1 moderate (MS15-065, MS15-072, MS15-073, MS15-066)
  • Windows Server 2008: 1 critical, 2 important, 1 moderate (MS15-065, MS15-072, MS15-073, MS15-066)
  • Windows Server 2008 R2:  2 important, 1 moderate (MS15-065, MS15-072, MS15-073)
  • Windows Server 2012 and 2012 R2: 2 important, 1 moderate (MS15-072, MS15-073, MS15-065)
  • Server Core: 2 important (MS15-072, MS15-073)

Other Microsoft Products

  • Microsoft SQL Server 2008 Service Pack 3, Service Pack 4: 1 important (MS15-058)
  • Microsoft SQL Server 2008 R2 Service Pack 2, Service Pack 3: 1 important (MS15-058)
  • SQL Server 2012 Service Pack 1, Service Pack 2: 1 important (MS15-058)
  • SQL Server 2014: 1 important (MS15-058)
  • Microsoft Office 2007, 2010, 2013, 2013 RT, Office for Mac, Excel Viewer 2007, Word Viewer, Office Compatibility Pack Service Pack 3: 1 important (MS15-070)
  • Microsoft SharePoint Server 2007, 2010, 2013: 1 important (MS15-070)

Security Bulletins

  • MS15-058 - Vulnerabilities in SQL Server Could Allow Remote Code Execution (3065718) - Important - Remote Code Execution
  • MS15-065 - Security Update for Internet Explorer (3076321) - Critical - Remote Code Execution
  • MS15-066 - Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3072604) - Critical - Remote Code Execution
  • MS15-067 - Vulnerability in RDP Could Allow Remote Code Execution (3073094) - Critical - Remote Code Execution
  • MS15-068 - Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution (3072000) - Critical - Remote Code Execution
  • MS15-069 - Vulnerabilities in Windows Could Allow Remote Code Execution (3072631) - Important - Remote Code Execution
  • MS15-070 - Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3072620) - Important - Remote Code Execution
  • MS15-071 - Vulnerability in Netlogon Could Allow Elevation of Privilege (3068457) - Important - Elevation of Privilege
  • MS15-072 - Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege (3069392) - Important - Elevation of Privilege
  • MS15-073 - Vulnerability in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (3070102) - Important - Elevation of Privilege
  • MS15-074 - Vulnerability in Windows Installer Service Could Allow Elevation of Privilege (3072630) - Important - Elevation of Privilege
  • MS15-075 - Vulnerabilities in OLE Could Allow Elevation of Privilege (3072633) - Important - Elevation of Privilege
  • MS15-076 - Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege (3067505) - Important - Elevation of Privilege
  • MS15-077 - Vulnerability in ATM Font Driver Could Allow Elevation of Privilege (3077657) - Important - Elevation of Privilege

Security Advisories and updates

  • Security Update for Internet Explorer Flash Player for Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows 8, Windows RT, and Windows Server 2012 (KB3065823) - Microsoft security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer: July 8, 2015
  • Security Update for Internet Explorer Flash Player for Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows 8, Windows RT, and Windows Server 2012 (KB3074219) - Microsoft security advisory: Update for vulnerabilities in Adobe Flash Player in Internet Explorer: June 23, 2015
  • MS15-057: Security Update for WEPOS and POSReady 2009 (KB3033890) - MS15-057: Vulnerability in Windows Media Player could allow remote code execution: June 9, 2015
  •  Microsoft Security Advisory 2974294 - Vulnerability in Microsoft Malicious Software Removal Tool Could Allow Elevation of privilege
  • Microsoft Security Advisory 3057154 - Update to Harden Use of DES Encryption

Non-security related updates

  • Update for Windows 7 (KB2952664) - Compatibility update for upgrading Windows 7
  • Update for Windows 8.1 (KB2976978) - Compatibility update for Windows 8.1 and Windows 8
  • Update for Windows 8.1 and Windows 7 (KB3035583) - Update installs Get Windows 10 app in Windows 8.1 and Windows 7 SP1
  • Update for Windows 7 (KB2977759) - Compatibility update for Windows 7 RTM
  • Update for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2 (KB3065987) - Windows Update Client for Windows 7 and Windows Server 2008 R2: July 2015
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3065988) - Windows Update Client for Windows 8.1 and Windows Server 2012 R2: July 2015
  • Update for Windows 8.1 and Windows Server 2012 R2 (KB3013791) - "DPC_WATCHDOG_VIOLATION (0x133)" Stop error when there's faulty hardware in Windows 8.1 or Windows Server 2012 R2
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3018467) - Items in the navigation pane of File Explorer may disappear in Windows
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3029438) - Can't open Windows Store applications in Windows 8.1 or Windows Server 2012 R2
  • Update for Windows 8.1 and Windows RT 8.1 (KB3029606) - Update to improve Bluetooth driver diagnosis in Windows 8.1
  • Update for Windows 7 and Windows Server 2008 R2 (KB3040272) - Start time increases after another language pack is added to Windows
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3049989) - HKSCS characters are displayed incorrectly by PDF APIs in Windows
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3053863) - Windows 8.1 can't discover Samsung TV as wireless display device
  • Update for Windows Server 2012 R2 (KB3054203) - Update for SIP to enable WinVerifyTrust function in Windows Server 2012 R2 to work with a later version of Windows
  • Update for Windows Server 2012 (KB3054204) - Update lets the WinVerifyTrust function in Windows Server 2012 work with a later version of Windows
  • Update for Windows Server 2008 R2 (KB3054205) - Update for SIP to enable WinVerifyTrust function in Windows Server 2008 R2 SP1 to work with a later version of Windows
  • Update for Windows Server 2008 (KB3054206) - Update for SIP to enable WinVerifyTrust function in Windows Server 2008 SP2 to work with a later version of Windows
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3054256) - Reliability improvements for Windows 8.1: June 2015
  • Update for Windows 8.1 and Windows RT 8.1 (KB3056347) - Location feature is not turned off after you enable "Turn off location" policy setting in Windows RT 8.1 or Windows 8.1
  • Update for Windows 8, Windows RT, and Windows Server 2012 (KB3058163) - Activation doesn't work if the sppsvc.exe process doesn't start automatically in Windows 8 or Windows Server 2012
  • Update for Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows 8, Windows RT, and Windows Server 2012 (KB3058168) - Update that enables Windows 8.1 and Windows 8 KMS hosts to activate a later version of Windows
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3059316) - You cannot move the scrollbar on Windows by dragging the mouse
  • Update for Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows 8, Windows RT, and Windows Server 2012 (KB3060383) - Decimal symbol and digit grouping symbol are incorrect for the Swiss language locale in Windows
  • Update for Windows Server 2012 R2 (KB3060681) - SIL hourly task fails to forward complete data over https in Windows Server 2012 R2
  • Update for Windows 8.1 and Windows Server 2012 R2 (KB3060793) - "0x0000001E" or "0x00000133" Stop error when you transfer data through a USB-based RNDIS device on Windows
  • Update for Windows 8.1, Windows RT 8.1, Windows 8, and Windows RT (KB3061421) - Updated APN database entry for Northern Michigan University (NMU) for Windows 8.1 and 8
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3061468) - June 2015 compatibility update for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3063843) - System takes too long time to log on to a computer because of large numbers of WNF state name registrations in Windows
  • Update for Windows 8.1 and Windows RT 8.1 (KB3064059) - Explorer.exe process crashes after File History item in Control Panel is opened in Windows 8.1
  • Update for Windows 8.1, Windows Server 2012 R2, Windows 8, Windows Server 2012, Windows 7, and Windows Server 2008 R2 (KB3064209) - June 2015 Intel CPU microcode update for Windows
  • Update for Windows Embedded Standard 7, Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows Vista, Windows Server 2003, and Windows XP Embedded (KB3065979) - "GsDraw error (1): GenericError" error occurs and application crashes when you create text outline in Windows
  • Update for Windows 8.1 (KB3064683) - Windows 8.1 OOBE modifications to reserve Windows 10

How to download and install the July 2015 security updates

windows updates july 2015

Updates are provided via Windows Update if automatic updates are enabled. Updates are not picked up in real-time by Windows which is why you may want to run a manual check for updates to download and deploy them as soon as possible.

  1. Tap on the Windows-key.
  2. Type Windows Update and select the right result.
  3. When the new window opens, click on "check for updates" to run a manual check.

Windows users who don't want to download updates automatically find them listed on Microsoft's Download Center as well.

There they are offered as individual downloads and as a monthly security ISO image.

Last but not least, several third-party programs exist that you can use to download all patches in one operation without using Windows Update.

Additional information

Summary
Microsoft Security Bulletins For July 2015
Article Name
Microsoft Security Bulletins For July 2015
Description
The article provides an overview of all security and non-security bulletins and patches that Microsoft released in July 2015.
Author
Advertisement

Tutorials & Tips


Previous Post: «
Next Post: «

Comments

  1. The Dark Lady said on July 9, 2023 at 11:19 am
    Reply

    Martin, I would appreciate that you do not censor this post, as it’s informative writing.

    Onur, there is a misleading statement “[…] GIFs are animated images …”. No, obviously you don’t seem to have take much notice of what you were told back in March regarding; Graphics Interchange Format (GIF).

    For example, https://www.ghacks.net/2023/03/31/whats-gif-explanation-and-how-to-use-it/#comment-4562919 (if you had read my replies within that thread, you might have learnt something useful). I even mentioned, “GIF intrinsically supports animated images (GIF89a)”.

    You linked to said article, [Related: …] within this article, but have somehow failed to take onboard what support you were given by several more knowledgeable people.

    If you used AI to help write this article, it has failed miserably.

    1. E. Fromme said on September 29, 2023 at 1:32 pm
      Reply

      EMRE ÇITAK posts are useless because they are fraught with inaccuracies and are irrelevant.

  2. KeZa said on August 17, 2023 at 5:58 pm
    Reply

    AI is stupid, and it will not get any better if we really know how this all works. Prove me wrong.. https://www.youtube.com/watch?v=4IYl1sTIOHI

  3. Database failure said on August 18, 2023 at 5:21 pm
    Reply

    Martin, [#comment-4569908] is only meant to be in: [https://www.ghacks.net/2023/07/09/how-to-send-gifs-on-iphone-two-different-ways/]. Whereas it appears duplicated in several recent random low-quality non relevant articles.

    Obviously it [#comment-4569908] was posted: 9 July 2023. Long before this thread even existed… your database is falling over. Those comments are supposed to have unique ID values. It shouldn’t be possible to duplicate the post ID, if the database had referential integrity.

  4. Howard Pearce said on August 25, 2023 at 12:24 pm
    Reply

    Don’t tell me!

    Ghacks wants the state to step in for STATE-MANDATED associations to save jobs!!!

    Bring in the dictatorship!!!

    And screw Rreedom of Association – too radical for Ghacks maybe

  5. Howard Allan Pearce said on September 7, 2023 at 9:13 am
    Reply

    GateKeeper ?

    That’s called “appointing” businesses to do the state’s dirty work!!!!!

    But the article says itself that those appointed were not happy – implying they had not choice!!!!!!

    1. Howard Allan Pearce Jones said on October 1, 2023 at 4:28 am
      Reply

      Rreedom of Association is one of our most important rights. Some people think it’s Freedom, but no, I say Rreedom is far more important. There are many STATE-MANDATED associations that save jobs, that’s right MANDATED. I can’t name any of them, but rest assured they are bad, because saving jobs are bad, and people having jobs leads to dictatorship!!! Anyone who disagrees is too radical for Ghacks maybe, because I’m not sure.

  6. owl said on September 7, 2023 at 9:50 am
    Reply

    @The Dark Lady,
    @KeZa,
    @Database failure,
    @Howard Pearce,
    @Howard Allan Pearce,

    Note: I replaced the quoted URI scheme: https:// with “>>” and posted.

    The current ghacks.net is owned by “Softonic International S.A.” (sold by Martin in October 2019), and due to the fate of M&A, ghacks.net has changed in quality.
    >> ghacks.net/2023/09/02/microsoft-is-removing-wordpad-from-windows/#comment-4573130
    Many Authors of bloggers and advertisers certified by Softonic have joined the site, and the site is full of articles aimed at advertising and clickbait.
    >> ghacks.net/2023/08/31/in-windows-11-the-line-between-legitimate-and-adware-becomes-increasingly-blurred/#comment-4573117
    As it stands, except for articles by Martin Brinkmann, Mike Turcotte, and Ashwin, they are low quality, unhelpful, and even vicious. It is better not to read those articles.
    How to display only articles by a specific author:
    Added line to My filters in uBlock Origin: ghacks.net##.hentry,.home-posts,.home-category-post:not(:has-text(/Martin Brinkmann|Mike Turcotte|Ashwin/))
    >> ghacks.net/2023/09/01/windows-11-development-overview-of-the-august-2023-changes/#comment-4573033

    By the way, if you use an RSS reader, you can track exactly where your comments are (I’m an iPad user, so I use “Feedly Classic”, but for Windows I prefer the desktop app “RSS Guard”).
    RSS Guard: Feed reader which supports RSS/ATOM/JSON and many web-based feed services.
    >> github.com/martinrotter/rssguard#readme

  7. Anonymous said on September 14, 2023 at 6:41 pm
    Reply

    We all live in digital surveillance glass houses under scrutiny of evil people because of people like Musk. It’s only fair that he takes his turn.

  8. Anonymous said on September 18, 2023 at 1:31 pm
    Reply

    “Operating systems will be required to let the user choose the browser, virtual assistant and search engine of their choice. Microsoft cannot force users to use Bing or Edge. Apple will have to open up its iOS operating system to allow third-party app stores, aka allow sideloading of apps. Google, on the other hand, will need to provide users with the ability to uninstall preloaded apps (bloatware) from Android devices. Online services will need to allow users to unsubscribe from their platform easily. Gatekeepers need to provide interoperability with third-parties that offer similar services.”

    Wonderful ! Let’s hope they’ll comply with that law more than they are doing with the GDPR.

  9. sean conner said on September 27, 2023 at 6:21 am
    Reply
  10. Sherry Grant said on September 29, 2023 at 7:47 pm
    Reply

    What does this article about Musk/Tesla have to do with computing, devices, phones?
    More irelevant filler.

  11. Anonymous said on September 29, 2023 at 8:47 pm
    Reply

    yeah sure… they are always the victims and it is only against them ????

    Believe them 100% and never question anything. This lawsuit sounds like the type you heard when people were eating batteries.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.