Microsoft Security Update Revisonen – 15. Mai 2018

Noch ein kleiner Nachtrag, bevor es ganz untergeht. Microsoft hat zum 15. Mai 2018 einige Sicherheitsupdate-Beschreibungen revidiert und neu veröffentlicht. Hier eine kurze Übersicht. Nachtrag: Die Update-Revision zum 18. Mai 2018 habe ich nachgetragen.


Anzeige

********************************************************************
Title: Microsoft Security Update Releases
Issued: May 15, 2018
********************************************************************

Summary
=======

The following CVEs have been published or have undergone a major
revision increment:

* CVE-2018-8147
* CVE-2018-8162
* CVE-2018-8176


Anzeige

Revision Information:
=====================

– CVE-2018-8147 | Microsoft Excel Remote Code Execution
Vulnerability
https://portal.msrc.microsoft.com/en-us/security-guidance
– Version: 2.0
– Reason for Revision: Microsoft is announcing the availability
of the 16.13.18051301 update for Microsoft Office 2016 for Mac.
Customers running affected Mac software should install the
update for their product to be protected from this vulnerability.
Customers running other Microsoft Office software do not need to
take any action. See the Release Notes for more information and
download links.
– Originally posted: May 8, 2018
– Updated: May 15, 2018
– Aggregate CVE Severity Rating: Important

– CVE-2018-8162 | Microsoft Excel Remote Code Execution
Vulnerability
https://portal.msrc.microsoft.com/en-us/security-guidance
– Version: 2.0
– Reason for Revision: Revised the Affected Products table to
include Microsoft Office 2016 for Mac because it is affected
by this CVE. Microsoft recommends that customers running
Microsoft Office 2016 for Mac install the update to be protected
from this vulnerability.
– Originally posted: May 8, 2018
– Updated: May 15, 2018
– Aggregate CVE Severity Rating: Important

– CVE-2018-8176 | Microsoft PowerPoint Remote Code Execution
Vulnerability
https://portal.msrc.microsoft.com/en-us/security-guidance
– Version: 2.0
– Reason for Revision: Information published. This CVE has
been added to this month's Security Updates. Microsoft
recommends that customers running Microsoft Office 2016 for Mac
install the update to be protected from this vulnerability.
– Originally posted: May 15, 2018
– Updated: N/A
– Aggregate CVE Severity Rating: Important

The following advisory has undergone a major revision increment:

* ADV180002

Revision Information:
=====================

– ADV180002 | Guidance to mitigate speculative execution
side-channel vulnerabilities
https://portal.msrc.microsoft.com/en-us/security-guidance
– Version: 19.0
– Reason for Revision: Updated FAQ #14 to announce that a
stand-alone update for Windows 10 Version 1803 and Windows
Server, version 1803 is available via the Microsoft Update
Catalog. This update includes microcode updates from Intel.
See Microsoft Knowledge Base Article 4100347 for more
information.
– Originally posted: January 3, 2018
– Updated: May 15, 2018
– Aggregate CVE Severity Rating: Important

*******************************************************************
Title: Microsoft Security Update Releases
Issued: May 18, 2018
********************************************************************

Summary
=======

The following CVE has been published or has undergone a major
revision increment:

* CVE-2018-0886

Revision Information:
=====================

– CVE-2018-0886 | CredSSP Remote Code Execution Vulnerability
https://portal.msrc.microsoft.com/en-us/security-guidance
– Reason for Revision: In the Affected Products table, reverted
the security update entries for Windows 10 Version 1511 back to
the March security update (4088779) because a May 2018 update is
not available for this version. See the FAQ section for more
information about how to be protected from this vulnerability if
you are running Windows 10 Version 1511.
– Originally posted: March 13, 2018
– Updated: May 18, 2018
– Aggregate CVE Severity Rating: Important
– Version: 3.0


Anzeige

Dieser Beitrag wurde unter Sicherheit, Update abgelegt und mit , , , verschlagwortet. Setze ein Lesezeichen auf den Permalink.

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

Hinweis: Bitte beachtet die Regeln zum Kommentieren im Blog (Erstkommentare und Verlinktes landet in der Moderation, gebe ich alle paar Stunden frei, SEO-Posts/SPAM lösche ich rigoros). Kommentare abseits des Themas bitte unter Diskussion.

Du findest den Blog gut, hast aber Werbung geblockt? Du kannst diesen Blog auch durch eine Spende unterstützen.