{"id":170339,"date":"2015-11-10T20:37:41","date_gmt":"2015-11-10T19:37:41","guid":{"rendered":"http:\/\/www.borncity.com\/blog\/?p=170339"},"modified":"2024-09-24T15:15:56","modified_gmt":"2024-09-24T13:15:56","slug":"november-2015-patchday-mit-updates-fr-office-und-windows","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2015\/11\/10\/november-2015-patchday-mit-updates-fr-office-und-windows\/","title":{"rendered":"November 2015-Patchday mit Updates f&uuml;r Office und Windows"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Amazon\" width=\"40\" height=\"40\" align=\"left\" border=\"0\" \/>Am heutigen Patchday hat Microsoft eine Sammlung an Updates f\u00fcr Microsoft Office und Windows freigegeben, die Sicherheitsl\u00fccken schlie\u00dfen sollen.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/69944cc77b374b5780277c43ef73434f\" alt=\"\" width=\"1\" height=\"1\" \/>Das Microsoft Security Bulletin November 2015 l\u00e4sst sich <a href=\"https:\/\/web.archive.org\/web\/20170904030046\/https:\/\/technet.microsoft.com\/library\/security\/ms15-Nov\" target=\"_blank\" rel=\"noopener noreferrer\">hier abrufen<\/a> und enth\u00e4lt folgende Sicherheits-Updates.<\/p>\n<ul>\n<li><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=690584\" target=\"_blank\" rel=\"noopener noreferrer\">MS15-112<\/a>: <strong>Cumulative Security Update for Internet Explorer (3104517)<\/strong><br \/>\nThis security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Kritisch, Remote Code Execution-L\u00fccke, erfordert einen Neustart<\/li>\n<li><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=690585\" target=\"_blank\" rel=\"noopener noreferrer\">MS15-113<\/a>: <strong>Cumulative Security Update for Microsoft Edge (3104519)<br \/>\n<\/strong>This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Kritisch, Remote Code Execution-L\u00fccke, erfordert einen Neustart<\/li>\n<li><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=690570\">MS1:5-114<\/a>: <strong>Security Update for Windows Journal to Address Remote Code Execution (3100213)<br \/>\n<\/strong>This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted Journal file. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Kritisch, Remote Code Execution-L\u00fccke, erfordert ggf. einen Neustart<\/li>\n<li><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=691032\" target=\"_blank\" rel=\"noopener noreferrer\">MS15-115<\/a>: <strong>Security Update for Microsoft Windows to Address Remote Code Execution (3105864)<br \/>\n<\/strong>This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker convinces a user to open a specially crafted document or to visit an untrusted webpage that contains embedded fonts. Windows, Kritisch, Remote Code Execution-L\u00fccke, erfordert einen Neustart<\/li>\n<li><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=690594\" target=\"_blank\" rel=\"noopener noreferrer\">MS15-116<\/a>: <strong>Security Update for Microsoft Office to Address Remote Code Execution (3104540)<br \/>\n<\/strong>This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. Wichtig, Remote Code Execution-L\u00fccke, erfordert einen Neustart, Microsoft Office, Microsoft Office Services and Web Apps,\u00a0 Microsoft Lync, Skype for Business<\/li>\n<li><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=690723\" target=\"_blank\" rel=\"noopener noreferrer\">MS15-117<\/a>: <strong>Security Update for NDIS to Address Elevation of Privilege (3101722)<br \/>\n<\/strong>This security update resolves a vulnerability in Microsoft Windows NDIS. The vulnerability could allow elevation of privilege if an attacker logs on to a system and runs a specially crafted application. Wichtig, Elevation of Privilege, Windows<\/li>\n<li><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=690565\" target=\"_blank\" rel=\"noopener noreferrer\">MS15-118<\/a>: <strong>Security Update for .NET Framework to Address Elevation of Privilege (3104507)<br \/>\n<\/strong>This security update resolves vulnerabilities in Microsoft .NET Framework. The most severe of the vulnerabilities could allow elevation of privilege if an attacker convinces a user to navigate to a compromised website or open a link in a specially crafted email that is designed to inject client-side code into the user's browser. Wichtig, Elevation of Privilege, Microsoft Windows, Microsoft .NET Framework<\/li>\n<li>MS15-119: <strong>Security Update for Winsock to Address Elevation of Privilege (3104521)<br \/>\n<\/strong>This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs specially crafted code that is designed to exploit the vulnerability. Wichtig, Elevation of Privilege, Neustart erforderlich, Microsoft Windows<\/li>\n<li><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=690724\" target=\"_blank\" rel=\"noopener noreferrer\">MS15-120<\/a>: <strong>Security Update for IPSec to Address Denial of Service (3102939)<br \/>\n<\/strong>This security update resolves a denial of service vulnerability in Microsoft Windows. An attacker who successfully exploited the vulnerability could cause the server to become nonresponsive. To exploit the vulnerability an attacker must have valid credentials. Wichtig, Denial of Service, Neustart ggf. erforderlich, Microsoft Windows<\/li>\n<li><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=690884\" target=\"_blank\" rel=\"noopener noreferrer\">MS15-121<\/a>: <strong>Security Update for Schannel to Address Spoofing (3081320)<br \/>\n<\/strong>This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow spoofing if an attacker performs a man-in-the-middle (MiTM) attack between a client and a legitimate server. Wichtig, Spoofing, erfordert Neustart, Windows<\/li>\n<li><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=690720\" target=\"_blank\" rel=\"noopener noreferrer\">MS15-122<\/a>: <strong>Security Update for Kerberos to Address Security Feature Bypass (3105256)<br \/>\n<\/strong>This security update resolves a security feature bypass in Microsoft Windows. An attacker could bypass Kerberos authentication on a target machine and decrypt drives protected by BitLocker. The bypass can be exploited only if the target system has BitLocker enabled without a PIN or USB key, the computer is domain-joined, and the attacker has physical access to the computer. Wichtig, Security Feature Bypass, erfordert Neustart, Windows<\/li>\n<li><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=691035\" target=\"_blank\" rel=\"noopener noreferrer\">MS15-123<\/a>: <strong>Security Update for Skype for Business and Microsoft Lync to Address Information Disclosure (3105872)<\/strong><br \/>\nThis security update resolves a vulnerability in Skype for Business and Microsoft Lync. The vulnerability could allow information disclosure if an attacker invites a target user to an instant message session and then sends that user a message containing specially crafted JavaScript content. Wichtig, Information Disclosure, erfordert ggf. Neustart, Microsoft Lync, Skype for Business<\/li>\n<\/ul>\n<p><strong>\u00c4hnliche Artikel:<\/strong><br \/>\nFirmware-Update f\u00fcr Surface 3 und Surface 3 LTE<br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2015\/11\/10\/windows10-1511-update-kb3103688-und-kb3105211\/\">Windows 10 (V 1511): Update KB3103688 und KB3105211<\/a><br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20231225063402\/https:\/\/borncity.com\/blog\/2015\/11\/10\/november-2015-patchday-mit-updates-fr-office-und-windows\/\">November 2015-Patchday mit Updates f\u00fcr Office und Windows<\/a><br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20210512152408\/https:\/\/borncity.com\/blog\/2015\/11\/10\/office-update-revisionen-microsoft-november-2015\/\">Office Update-Revisionen Microsoft November 2015<br \/>\n<\/a><a href=\"https:\/\/borncity.com\/blog\/2015\/11\/11\/november-2015-patchday-fix-fr-outlook-absturz-c0000374-kb3097877\/\" rel=\"bookmark\">November 2015 Patchday: Fix f\u00fcr Outlook-Absturz C0000374 (KB3097877)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Am heutigen Patchday hat Microsoft eine Sammlung an Updates f\u00fcr Microsoft Office und Windows freigegeben, die Sicherheitsl\u00fccken schlie\u00dfen sollen.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185],"tags":[4315,4325],"class_list":["post-170339","post","type-post","status-publish","format-standard","hentry","category-update","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/170339","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=170339"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/170339\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=170339"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=170339"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=170339"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}