Microsoft からメールが
Microsoft からmicrosoft security update minor revisionというメールが届きました。確か1ヶ月程前にもありましたがその時は即ゴミ箱行きで今回と同一かどうか確かではありません。
メールソフトはシュリケンでフォント設定の関係かも知れませんが文字が重なって見えて判別は難しいです。シュリケンの画面の一部を画像添付します。
このメールアドレスに今までmicrosoftからメールが来た記憶はありません。もっともこのアドレスは20年も前から使用していますから昔々はmicrosoftからメールリストを受信していたのかもしれません。
以下にメール文をコピペします。ここの文字数制限から全文を載せることが出来なくて大体2/3くらいのようです。
お聞きしたいのはこのメールは本物ですか。本物でしたらどういう人を対象に送られてくるものですか。
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
********************************************************************
Title: Microsoft Security Update Minor Revisions
Issued: June 22, 2018
********************************************************************
Summary
=======
The following CVE has been revised in the June 2018 Security
Updates.
* CVE-2018-0978
* CVE-2018-8113
* CVE-2018-8249
* CVE-2018-8267
Revision Information:
=====================
CVE-2018-0978
- Title: CVE-2018-0978 | Internet Explorer Memory Corruption
Vulnerability
- https://portal.msrc.microsoft.com/en-us/security-guidance
- Reasons for Revision: This CVE has been revised to announce
a detection change to correct an offering issue for the Internet
Explorer Cumulative update. This is a detection change only.
There were no changes to the update files. Customers who have
already successfully installed the update do not need to take
any action.
- Originally posted: June 12, 2018
- Updated: June 22, 2018
- CVE Severity Rating: Important
- Version: 1.1
CVE-2018-8113
- Title: CVE-2018-8113 | Internet Explorer Security Feature Bypass
Vulnerability
- https://portal.msrc.microsoft.com/en-us/security-guidance
- Reasons for Revision: This CVE has been revised to announce
a detection change to correct an offering issue for the Internet
Explorer Cumulative update. This is a detection change only.
There were no changes to the update files. Customers who have
already successfully installed the update do not need to take
any action.
- Originally posted: June 12, 2018
- Updated: June 22, 2018
- CVE Severity Rating: Important
- Version: 1.1
CVE-2018-8249
- Title: CVE-2018-8249 | Internet Explorer Memory Corruption
Vulnerability
- https://portal.msrc.microsoft.com/en-us/security-guidance
- Reasons for Revision: This CVE has been revised to announce
a detection change to correct an offering issue for the Internet
Explorer Cumulative update. This is a detection change only.
There were no changes to the update files. Customers who have
already successfully installed the update do not need to take
any action.
- Originally posted: June 12, 2018
- Updated: June 22, 2018
- CVE Severity Rating: Critical
- Version: 1.1
CVE-2018-8267
- Title: CVE-2018-8267 | Scripting Engine Memory Corruption
Vulnerability
- https://portal.msrc.microsoft.com/en-us/security-guidance
- Reasons for Revision: This CVE has been revised to announce
a detection change to correct an offering issue for the Internet
Explorer Cumulative update. This is a detection change only.
There were no changes to the update files. Customers who have
already successfully installed the update do not need to take
any action.
- Originally posted: June 12, 2018
- Updated: June 22, 2018
- CVE Severity Rating: Critical
- Version: 1.1
Other Information
=================
Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.
The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, PGP is not required for
reading security notifications, reading security bulletins, or
installing security updates. You can obtain the MSRC public PGP key
at <https://technet.microsoft.com/security/dn753714>.