{"id":175442,"date":"2016-03-09T00:34:00","date_gmt":"2016-03-08T23:34:00","guid":{"rendered":"http:\/\/www.borncity.com\/blog\/?p=175442"},"modified":"2021-04-05T20:53:49","modified_gmt":"2021-04-05T18:53:49","slug":"microsoft-patchday-8-mrz-2016","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2016\/03\/09\/microsoft-patchday-8-mrz-2016\/","title":{"rendered":"Microsoft Patchday 8. M&auml;rz 2016 &#8211; Sicherheits-Updates"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Windows Update\" width=\"40\" height=\"40\" align=\"left\" border=\"0\" \/>Am 8. M\u00e4rz 2016 hat Microsoft insgesamt 13 Sicherheits-Updates f\u00fcr Windows, den Internet Explorer, f\u00fcr Edge, f\u00fcr Office und f\u00fcr .NET Framework freigegeben.<\/p>\n<p><!--more--><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/8b13b01290454d4d94143891bf439699\" alt=\"\" width=\"1\" height=\"1\" \/>Die Sicherheits-Updates der Security Bulletins MS16-023 bis MS16-35 sind auf <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms16-mar\" target=\"_blank\" rel=\"noopener noreferrer\">dieser Microsoft-Webseite<\/a> beschrieben. Hier eine Kurz\u00fcbersicht der betroffenen Software.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/web.archive.org\/web\/20170324184720\/http:\/\/r87.imgup.net\/Update-03-8b57.jpg\" alt=\"\" \/><\/p>\n<p><strong>Kritische Sicherheits-Updates<\/strong><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=733245\" target=\"_blank\" rel=\"noopener noreferrer\">MS16-023<\/a>: <strong>Kumulatives Sicherheitsupdate f\u00fcr Internet Explorer (3142015)<br \/>\n<\/strong>Dieses Sicherheitsupdate behebt Sicherheitsanf\u00e4lligkeiten in Internet Explorer. Die schwerwiegendste dieser Sicherheitsanf\u00e4lligkeiten kann Remotecodeausf\u00fchrung erm\u00f6glichen, wenn ein Benutzer eine speziell gestaltete Webseite mit Internet Explorer anzeigt. Ein Angreifer, der diese Sicherheitsanf\u00e4lligkeit erfolgreich ausnutzt, kann die gleichen Benutzerrechte wie der aktuelle Benutzer erlangen. Wenn der aktuelle Benutzer mit administrativen Benutzerrechten angemeldet ist, kann ein Angreifer, der diese Sicherheitsanf\u00e4lligkeit erfolgreich ausnutzt, Kontrolle \u00fcber ein betroffenes System erlangen. Der Angreifer k\u00f6nnte dann Programme installieren, Daten anzeigen, \u00e4ndern oder l\u00f6schen oder neue Benutzerkonten mit Vollzugriffsrechten erstellen.<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/en-us\/kb\/3139929\" target=\"_blank\" rel=\"noopener noreferrer\">KB3139929<\/a> (Windows 10: <a href=\"https:\/\/support.microsoft.com\/en-us\/kb\/3140745\" target=\"_blank\" rel=\"noopener noreferrer\">KB3140745<\/a> oder <a href=\"https:\/\/support.microsoft.com\/en-us\/kb\/3140768\" target=\"_blank\" rel=\"noopener noreferrer\">KB3140768<\/a>):<br \/>\nKritisch, Remotecodeausf\u00fchrung, Erfordert Neustart<\/p>\n<p>&#8211; Affected Software:<br \/>\n&#8211; Windows Vista Service Pack 2:<br \/>\n&#8211; Internet Explorer 9<br \/>\n&#8211; Windows Vista x64 Edition Service Pack 2:<br \/>\n&#8211; Internet Explorer 9<br \/>\n&#8211; Windows Server 2008 for 32-bit Systems Service Pack 2:<br \/>\n&#8211; Internet Explorer 9<br \/>\n(Windows Server 2008 Server Core installation not affected)<br \/>\n&#8211; Windows Server 2008 for x64-based Systems Service Pack 2:<br \/>\n&#8211; Internet Explorer 9<br \/>\n(Windows Server 2008 Server Core installation not affected)<br \/>\n&#8211; Windows 7 for 32-bit Systems Service Pack 1:<br \/>\n&#8211; Internet Explorer 11<br \/>\n&#8211; Windows 7 for x64-based Systems Service Pack 1:<br \/>\n&#8211; Internet Explorer 11<br \/>\n&#8211; Windows Server 2008 R2 for x64-based Systems<br \/>\nService Pack 1:<br \/>\n&#8211; Internet Explorer 11<br \/>\n(Windows Server 2008 R2 Server Core installation<br \/>\nnot affected)<br \/>\n&#8211; Windows 8.1 for 32-bit Systems:<br \/>\n&#8211; Internet Explorer 11<br \/>\n&#8211; Windows 8.1 for x64-based Systems:<br \/>\n&#8211; Internet Explorer 11<br \/>\n&#8211; Windows Server 2012:<br \/>\n&#8211; Internet Explorer 10<br \/>\n(Windows Server 2012 Server Core installation not affected)<br \/>\n&#8211; Windows Server 2012 R2:<br \/>\n&#8211; Internet Explorer 11<br \/>\n(Windows Server 2012 R2 Server Core installation not affected)<br \/>\n&#8211; Windows RT 8.1:<br \/>\n&#8211; Internet Explorer 11<br \/>\n&#8211; Windows 10 for 32-bit Systems:<br \/>\n&#8211; Internet Explorer 11<br \/>\n&#8211; Windows 10 for x64-based Systems:<br \/>\n&#8211; Internet Explorer 11<br \/>\n&#8211; Windows 10 Version 1511 for 32-bit Systems:<br \/>\n&#8211; Internet Explorer 11<br \/>\n&#8211; Windows 10 Version 1511 for x64-based Systems:<br \/>\n&#8211; Internet Explorer 11<br \/>\n&#8211; Impact: Remote Code Execution<br \/>\n&#8211; Version Number: 1.0<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=733246\" target=\"_blank\" rel=\"noopener noreferrer\">MS16-024<\/a>: <strong>Kumulatives Sicherheitsupdate f\u00fcr Microsoft Edge (3142019)<br \/>\n<\/strong>Dieses Sicherheitsupdate behebt Sicherheitsanf\u00e4lligkeiten in Microsoft Edge. Die schwerwiegendste dieser Sicherheitsanf\u00e4lligkeiten kann Remotecodeausf\u00fchrung erm\u00f6glichen, wenn ein Benutzer eine speziell gestaltete Webseite mit Microsoft Edge anzeigt. Ein Angreifer, der die Sicherheitsanf\u00e4lligkeiten erfolgreich ausnutzt, kann die gleichen Benutzerrechte erlangen wie der aktuelle Benutzer. F\u00fcr Endbenutzer, deren Konten mit weniger Benutzerrechten konfiguriert sind, kann dies geringere Auswirkungen haben als f\u00fcr Benutzer, die mit administrativen Benutzerrechten arbeiten.<\/p>\n<p>Kritisch, Remotecodeausf\u00fchrung, Erfordert Neustart<\/p>\n<p>&#8211; Affected Software:<br \/>\n&#8211; Windows 10 for 32-bit Systems<br \/>\n&#8211; Microsoft Edge<br \/>\n&#8211; Windows 10 for x64-based Systems<br \/>\n&#8211; Microsoft Edge<br \/>\n&#8211; Windows 10 Version 1511 for 32-bit Systems<br \/>\n&#8211; Microsoft Edge<br \/>\n&#8211; Windows 10 Version 1511 for x64-based Systems<br \/>\n&#8211; Microsoft Edge<br \/>\n&#8211; Impact: Remote Code Execution<br \/>\n&#8211; Version Number: 1.0<\/p>\n<p>MS16-026: <strong>Sicherheitsupdate f\u00fcr Grafikschriften zum Unterbinden von Remotecodeausf\u00fchrung (3143148)<\/strong><br \/>\nDieses Sicherheitsupdate behebt Sicherheitsanf\u00e4lligkeiten in Microsoft Windows. Die schwerwiegendste dieser Sicherheitsanf\u00e4lligkeiten kann Remotecodeausf\u00fchrung erm\u00f6glichen, wenn ein Angreifer einen Benutzer dazu verleitet, ein speziell gestaltetes Dokument zu \u00f6ffnen oder eine Webseite zu besuchen, in das bzw. die OpenType-Schriftarten eingebettet sind.<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/en-us\/kb\/894199\" target=\"_blank\" rel=\"noopener noreferrer\">KB3140735<\/a>: Kritisch, Remotecodeausf\u00fchrung, Erfordert Neustart<\/p>\n<p>&#8211; Affected Software:<br \/>\n&#8211; Windows Vista Service Pack 2<br \/>\n&#8211; Windows Vista x64 Edition Service Pack 2<br \/>\n&#8211; Windows Server 2008 for 32-bit Systems Service Pack 2<br \/>\n(Windows Server 2008 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 for x64-based Systems Service Pack 2<br \/>\n(Windows Server 2008 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 for Itanium-based Systems Service Pack 2<br \/>\n&#8211; Windows 7 for 32-bit Systems Service Pack 1<br \/>\n&#8211; Windows 7 for x64-based Systems Service Pack 1<br \/>\n&#8211; Windows Server 2008 R2 for x64-based Systems Service Pack 1<br \/>\n(Windows Server 2008 R2 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 R2 for Itanium-based Systems Service<br \/>\nPack 1<br \/>\n&#8211; Windows 8.1 for 32-bit Systems<br \/>\n&#8211; Windows 8.1 for x64-based Systems<br \/>\n&#8211; Windows Server 2012<br \/>\n(Windows Server 2012 Server Core installation affected)<br \/>\n&#8211; Windows Server 2012 R2<br \/>\n(Windows Server 2012 R2 Server Core installation affected)<br \/>\n&#8211; Windows RT 8.1<br \/>\n&#8211; Windows 10 for 32-bit Systems<br \/>\n&#8211; Windows 10 for x64-based Systems<br \/>\n&#8211; Windows 10 Version 1511 for 32-bit Systems<br \/>\n&#8211; Windows 10 Version 1511 for x64-based Systems<br \/>\n&#8211; Impact: Remote Code Execution<br \/>\n&#8211; Version Number: 1.0<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=733470\" target=\"_blank\" rel=\"noopener noreferrer\">MS16-027<\/a>: <strong>Sicherheitsupdate f\u00fcr Windows-Medien Unterbinden von Remotecodeausf\u00fchrung (3143146)<\/strong><br \/>\nDieses Sicherheitsupdate behebt Sicherheitsanf\u00e4lligkeiten in Microsoft Windows. Die Sicherheitsanf\u00e4lligkeiten k\u00f6nnen Remotecodeausf\u00fchrung erm\u00f6glichen, wenn ein Benutzer speziell gestaltete Medieninhalte \u00f6ffnet, die auf einer Website gehostet werden.<\/p>\n<p><a title=\"https:\/\/support.microsoft.com\/en-us\/kb\/894199\" href=\"https:\/\/support.microsoft.com\/en-us\/kb\/894199\" target=\"_blank\" rel=\"noopener noreferrer\">KB894199<\/a> und <a href=\"https:\/\/support.microsoft.com\/kb\/3138962\" target=\"_blank\" rel=\"noopener noreferrer\">KB313896<\/a>: Kritisch, Remotecodeausf\u00fchrung, Erfordert u.U. Neustart<\/p>\n<p>&#8211; Affected Software:<br \/>\n&#8211; Windows 7 for 32-bit Systems Service Pack 1<br \/>\n&#8211; Windows 7 for x64-based Systems Service Pack 1<br \/>\n&#8211; Windows Server 2008 R2 for x64-based Systems Service Pack 1<br \/>\n(Windows Server 2008 R2 Server Core installation not affected)<br \/>\n&#8211; Windows 8.1 for 32-bit Systems<br \/>\n&#8211; Windows 8.1 for x64-based Systems<br \/>\n&#8211; Windows Server 2012<br \/>\n(Windows Server 2012 Server Core installation not affected)<br \/>\n&#8211; Windows Server 2012 R2<br \/>\n(Windows Server 2012 R2 Server Core installation not affected)<br \/>\n&#8211; Windows RT 8.1<br \/>\n&#8211; Windows 10 for 32-bit Systems<br \/>\n&#8211; Windows 10 for x64-based Systems<br \/>\n&#8211; Windows 10 Version 1511 for 32-bit Systems<br \/>\n&#8211; Windows 10 Version 1511 for x64-based Systems<br \/>\n&#8211; Impact: Remote Code Execution<br \/>\n&#8211; Version Number: 1.0<\/p>\n<p><a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms16-028.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">MS16-028<\/a>: <strong>Sicherheitsupdate f\u00fcr Microsoft Windows-PDF-Bibliothek zum Unterbinden von Remotecodeausf\u00fchrung (3143081)<\/strong><br \/>\nDieses Sicherheitsupdate behebt Sicherheitsanf\u00e4lligkeiten in Microsoft Windows. Diese Sicherheitsanf\u00e4lligkeiten k\u00f6nnen Remotecodeausf\u00fchrung erm\u00f6glichen, wenn ein Benutzer eine speziell gestaltete PDF-Datei \u00f6ffnet.<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/kb\/3137513\" target=\"_blank\" rel=\"noopener noreferrer\">KB3137513<\/a>: Kritisch, Remotecodeausf\u00fchrung, Erfordert u.U. Neustart<\/p>\n<p>&#8211; Affected Software:<br \/>\n&#8211; Windows 8.1 for 32-bit Systems<br \/>\n&#8211; Windows 8.1 for x64-based Systems<br \/>\n&#8211; Windows Server 2012<br \/>\n(Windows Server 2012 Server Core installation affected)<br \/>\n&#8211; Windows Server 2012 R2<br \/>\n(Windows Server 2012 R2 Server Core installation affected)<br \/>\n&#8211; Windows RT 8.1<br \/>\n&#8211; Windows 10 for 32-bit Systems<br \/>\n&#8211; Windows 10 for x64-based Systems<br \/>\n&#8211; Windows 10 Version 1511 for 32-bit Systems<br \/>\n&#8211; Windows 10 Version 1511 for x64-based Systems<br \/>\n&#8211; Impact: Remote Code Execution<br \/>\n&#8211; Version Number: 1.0<br \/>\n<strong>Wichtige Sicherheits-Updates<\/strong><\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=733940\" target=\"_blank\" rel=\"noopener noreferrer\">MS16-025<\/a>: <strong>Sicherheitsupdate f\u00fcr das Laden von Windows-Bibliotheken zum Unterbinden von Remotecodeausf\u00fchrung (3140709)<\/strong><br \/>\nDieses Sicherheitsupdate behebt eine Sicherheitsanf\u00e4lligkeit in Microsoft Windows. Die Sicherheitsanf\u00e4lligkeit kann Remotecodeausf\u00fchrung erm\u00f6glichen, wenn Microsoft Windows Eingaben vor dem Laden bestimmter Bibliotheken nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft. Ein Angreifer muss aber zun\u00e4chst auf das lokale System zugreifen und eine sch\u00e4dliche Anwendung auf dem System ausf\u00fchren k\u00f6nnen.<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/en-us\/kb\/3140709\" target=\"_blank\" rel=\"noopener noreferrer\">KB3140709<\/a>: Hoch, Remotecodeausf\u00fchrung, Erfordert u.U. Neustart<\/p>\n<p>&#8211; Affected Software:<br \/>\n&#8211; Windows Vista Service Pack 2<br \/>\n&#8211; Windows Vista x64 Edition Service Pack 2<br \/>\n&#8211; Windows Server 2008 for 32-bit Systems Service Pack 2<br \/>\n(Windows Server 2008 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 for x64-based Systems Service Pack 2<br \/>\n(Windows Server 2008 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 for Itanium-based Systems Service Pack 2<br \/>\n&#8211; Impact: Remote Code Execution<br \/>\n&#8211; Version Number: 1.0<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=733083\" target=\"_blank\" rel=\"noopener noreferrer\">MS16-029<\/a>: <strong>Sicherheitsupdate f\u00fcr Microsoft Office zum Unterbinden von Remotecodeausf\u00fchrung (3141806)<\/strong><br \/>\nDieses Sicherheitsupdate behebt Sicherheitsanf\u00e4lligkeiten in Microsoft Office. Die schwerwiegendste dieser Sicherheitsanf\u00e4lligkeiten kann Remotecodeausf\u00fchrung erm\u00f6glichen, wenn ein Benutzer eine speziell gestaltete Microsoft Office-Datei \u00f6ffnet. Ein Angreifer, der die Sicherheitsanf\u00e4lligkeiten erfolgreich ausnutzt, kann beliebigen Code im Kontext des aktuellen Benutzers ausf\u00fchren. F\u00fcr Endbenutzer, deren Konten mit weniger Benutzerrechten konfiguriert sind, kann dies geringere Auswirkungen haben als f\u00fcr Benutzer, die mit administrativen Benutzerrechten arbeiten.<\/p>\n<p>Hoch, Remotecodeausf\u00fchrung, Erfordert u.U. Neustart<\/p>\n<p>&#8211; Affected Software:<br \/>\n&#8211; Microsoft Office 2007 Service Pack 3<br \/>\n&#8211; Microsoft InfoPath 2007 Service Pack 3<br \/>\n&#8211; Microsoft Outlook 2007 Service Pack 3<br \/>\n&#8211; Microsoft Word 2007 Service Pack 3<br \/>\n&#8211; Microsoft Office 2010 Service Pack 2 (32-bit editions)<br \/>\n&#8211; Microsoft Office 2010 Service Pack 2 (64-bit editions)<br \/>\n&#8211; Microsoft InfoPath 2010 Service Pack 2 (32-bit editions)<br \/>\n&#8211; Microsoft InfoPath 2010 Service Pack 2 (64-bit editions)<br \/>\n&#8211; Microsoft Outlook 2010 Service Pack 2 (32-bit editions)<br \/>\n&#8211; Microsoft Outlook 2010 Service Pack 2 (64-bit editions)<br \/>\n&#8211; Microsoft Word 2010 Service Pack 2 (32-bit editions)<br \/>\n&#8211; Microsoft Word 2010 Service Pack 2 (64-bit editions)<br \/>\n&#8211; Microsoft Office 2013 Service Pack 1 (32-bit editions)<br \/>\n&#8211; Microsoft InfoPath 2013 Service Pack 1 (32-bit editions)<br \/>\n&#8211; Microsoft InfoPath 2013 Service Pack 1 (64-bit editions)<br \/>\n&#8211; Microsoft Outlook 2013 Service Pack 1 (32-bit editions)<br \/>\n&#8211; Microsoft Outlook 2013 Service Pack 1 (64-bit editions)<br \/>\n&#8211; Microsoft Word 2013 Service Pack 1 (32-bit editions)<br \/>\n&#8211; Microsoft Word 2013 Service Pack 1 (64-bit editions)<br \/>\n&#8211; Microsoft Outlook 2013 RT Service Pack 1<br \/>\n&#8211; Microsoft Word 2013 RT Service Pack 1<br \/>\n&#8211; Microsoft Office 2016 (32-bit edition)<br \/>\n&#8211; Microsoft Outlook 2016 (32-bit edition)<br \/>\n&#8211; Microsoft Outlook 2016 (64-bit edition)<br \/>\n&#8211; Microsoft Word 2016 (32-bit edition)<br \/>\n&#8211; Microsoft Word 2016 (64-bit edition)<br \/>\n&#8211; Microsoft Word for Mac 2011<br \/>\n&#8211; Microsoft Word 2016 for Mac<br \/>\n&#8211; Microsoft Office Compatibility Pack Service Pack 3<br \/>\n&#8211; Microsoft Word Viewer<br \/>\n&#8211; Word Automation Services on Microsoft SharePoint Server 2010<br \/>\nService Pack 2<br \/>\n&#8211; Word Automation Services on Microsoft SharePoint Server 2013<br \/>\nService Pack 1<br \/>\n&#8211; Microsoft Office Web Apps 2010 Service Pack 2<br \/>\n&#8211; Microsoft Office Web Apps Server 2013 Service Pack 1<br \/>\n&#8211; Impact: Remote Code Execution<br \/>\n&#8211; Version Number: 1.0<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=733465\" target=\"_blank\" rel=\"noopener noreferrer\">MS16-030<\/a>: <strong>Sicherheitsupdate f\u00fcr Windows OLE zum Unterbinden von Remotecodeausf\u00fchrung (3143136)<\/strong><br \/>\nDieses Sicherheitsupdate behebt Sicherheitsanf\u00e4lligkeiten in Microsoft Windows. Die Sicherheitsanf\u00e4lligkeiten k\u00f6nnen Remotecodeausf\u00fchrung erm\u00f6glichen, wenn Windows OLE Benutzereingaben nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft. Angreifer k\u00f6nnen die Sicherheitsanf\u00e4lligkeiten ausnutzen, um sch\u00e4dlichen Code auszuf\u00fchren. Allerdings muss ein Angreifer einen Benutzer zun\u00e4chst dazu verleiten, eine speziell gestaltete Datei oder ein speziell gestaltetes Programm auf einer Webseite oder in einer E-Mail-Nachricht zu \u00f6ffnen.<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/kb\/3139940\" target=\"_blank\" rel=\"noopener noreferrer\">KB3139940<\/a>: Hoch, Remotecodeausf\u00fchrung, Erfordert Neustart<\/p>\n<p>&#8211; Affected Software:<br \/>\n&#8211; Windows Vista Service Pack 2<br \/>\n&#8211; Windows Vista x64 Edition Service Pack 2<br \/>\n&#8211; Windows Server 2008 for 32-bit Systems Service Pack 2<br \/>\n(Windows Server 2008 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 for x64-based Systems Service Pack 2<br \/>\n(Windows Server 2008 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 for Itanium-based Systems Service Pack 2<br \/>\n&#8211; Windows 7 for 32-bit Systems Service Pack 1<br \/>\n&#8211; Windows 7 for x64-based Systems Service Pack 1<br \/>\n&#8211; Windows Server 2008 R2 for x64-based Systems Service Pack 1<br \/>\n(Windows Server 2008 R2 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 R2 for Itanium-based Systems Service<br \/>\nPack 1<br \/>\n&#8211; Windows 8.1 for 32-bit Systems<br \/>\n&#8211; Windows 8.1 for x64-based Systems<br \/>\n&#8211; Windows Server 2012<br \/>\n(Windows Server 2012 Server Core installation affected)<br \/>\n&#8211; Windows Server 2012 R2<br \/>\n(Windows Server 2012 R2 Server Core installation affected)<br \/>\n&#8211; Windows RT 8.1<br \/>\n&#8211; Windows 10 for 32-bit Systems<br \/>\n&#8211; Windows 10 for x64-based Systems<br \/>\n&#8211; Windows 10 Version 1511 for 32-bit Systems<br \/>\n&#8211; Windows 10 Version 1511 for x64-based Systems<br \/>\n&#8211; Impact: Remote Code Execution<br \/>\n&#8211; Version Number: 1.0<\/p>\n<p>MS16-031: <strong>Sicherheitsupdate f\u00fcr Microsoft Windows zum Unterbinden einer Erh\u00f6hung von Berechtigungen (3140410)<\/strong><br \/>\nDieses Sicherheitsupdate behebt eine Sicherheitsanf\u00e4lligkeit in Microsoft Windows. Die Sicherheitsanf\u00e4lligkeit kann eine Erh\u00f6hung von Berechtigungen erm\u00f6glichen, wenn sich ein Angreifer bei einem Zielsystem anmelden und eine speziell gestaltete Anwendung ausf\u00fchren kann.<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/kb\/3140410\" target=\"_blank\" rel=\"noopener noreferrer\">KB3140410<\/a>: Hoch, Erh\u00f6hung von Berechtigungen, Erfordert Neustart<\/p>\n<p>&#8211; Affected Software:<br \/>\n&#8211; Windows Vista Service Pack 2<br \/>\n&#8211; Windows Vista x64 Edition Service Pack 2<br \/>\n&#8211; Windows Server 2008 for 32-bit Systems Service Pack 2<br \/>\n(Windows Server 2008 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 for x64-based Systems Service Pack 2<br \/>\n(Windows Server 2008 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 for Itanium-based Systems Service Pack 2<br \/>\n&#8211; Windows 7 for 32-bit Systems Service Pack 1<br \/>\n&#8211; Windows 7 for x64-based Systems Service Pack 1<br \/>\n&#8211; Windows Server 2008 R2 for x64-based Systems Service Pack 1<br \/>\n(Windows Server 2008 R2 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 R2 for Itanium-based Systems Service<br \/>\nPack 1<br \/>\n&#8211; Impact: Elevation of Privilege<br \/>\n&#8211; Version Number: 1.0<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=733467\" target=\"_blank\" rel=\"noopener noreferrer\">MS16-032<\/a>: <strong>Sicherheitsupdate f\u00fcr sekund\u00e4ren Anmeldedienst zum Unterbinden einer Erh\u00f6hung von Berechtigungen (3143141)<\/strong><br \/>\nDieses Sicherheitsupdate behebt eine Sicherheitsanf\u00e4lligkeit in Microsoft Windows. Die Sicherheitsanf\u00e4lligkeit kann eine Erh\u00f6hung von Berechtigungen erm\u00f6glichen, wenn der sekund\u00e4re Windows-Anmeldedienst Handles im Speicher nicht ordnungsgem\u00e4\u00df verarbeitet.<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/kb\/3139914\" target=\"_blank\" rel=\"noopener noreferrer\">KB3139914<\/a>: Hoch, Erh\u00f6hung von Berechtigungen, Erfordert Neustart<\/p>\n<p>&#8211; Affected Software:<br \/>\n&#8211; Windows Vista Service Pack 2<br \/>\n&#8211; Windows Vista x64 Edition Service Pack 2<br \/>\n&#8211; Windows Server 2008 for 32-bit Systems Service Pack 2<br \/>\n(Windows Server 2008 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 for x64-based Systems Service Pack 2<br \/>\n(Windows Server 2008 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 for Itanium-based Systems Service Pack 2<br \/>\n&#8211; Windows 7 for 32-bit Systems Service Pack 1<br \/>\n&#8211; Windows 7 for x64-based Systems Service Pack 1<br \/>\n&#8211; Windows Server 2008 R2 for x64-based Systems Service Pack 1<br \/>\n(Windows Server 2008 R2 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 R2 for Itanium-based Systems Service<br \/>\nPack 1<br \/>\n&#8211; Windows 8.1 for 32-bit Systems<br \/>\n&#8211; Windows 8.1 for x64-based Systems<br \/>\n&#8211; Windows Server 2012<br \/>\n(Windows Server 2012 Server Core installation affected)<br \/>\n&#8211; Windows Server 2012 R2<br \/>\n(Windows Server 2012 R2 Server Core installation affected)<br \/>\n&#8211; Windows RT 8.1<br \/>\n&#8211; Windows 10 for 32-bit Systems<br \/>\n&#8211; Windows 10 for x64-based Systems<br \/>\n&#8211; Windows 10 Version 1511 for 32-bit Systems<br \/>\n&#8211; Windows 10 Version 1511 for x64-based Systems<br \/>\n&#8211; Impact: Elevation of Privilege<br \/>\n&#8211; Version Number: 1.0<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=733468\" target=\"_blank\" rel=\"noopener noreferrer\">MS16-033<\/a>: <strong>Sicherheitsupdate f\u00fcr Windows USB-Massenspeicherger\u00e4t-Klassentreiber zum Unterbinden einer Erh\u00f6hung von Berechtigungen (3143142)<br \/>\n<\/strong>Dieses Sicherheitsupdate behebt eine Sicherheitsanf\u00e4lligkeit in Microsoft Windows. Die Sicherheitsanf\u00e4lligkeit kann die Erh\u00f6hung von Berechtigungen erm\u00f6glichen, wenn ein Angreifer mit physischem Zugang zum System ein speziell gestaltetes USB-Ger\u00e4t in das System einf\u00fcgt.<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/kb\/3139398\" target=\"_blank\" rel=\"noopener noreferrer\">KB3139398<\/a>: Hoch, Erh\u00f6hung von Berechtigungen, Erfordert Neustart<\/p>\n<p>&#8211; Affected Software:<br \/>\n&#8211; Windows Vista Service Pack 2<br \/>\n&#8211; Windows Vista x64 Edition Service Pack 2<br \/>\n&#8211; Windows Server 2008 for 32-bit Systems Service Pack 2<br \/>\n(Windows Server 2008 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 for x64-based Systems Service Pack 2<br \/>\n(Windows Server 2008 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 for Itanium-based Systems Service Pack 2<br \/>\n&#8211; Windows 7 for 32-bit Systems Service Pack 1<br \/>\n&#8211; Windows 7 for x64-based Systems Service Pack 1<br \/>\n&#8211; Windows Server 2008 R2 for x64-based Systems Service Pack 1<br \/>\n(Windows Server 2008 R2 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 R2 for Itanium-based Systems Service<br \/>\nPack 1<br \/>\n&#8211; Windows 8.1 for 32-bit Systems<br \/>\n&#8211; Windows 8.1 for x64-based Systems<br \/>\n&#8211; Windows Server 2012<br \/>\n(Windows Server 2012 Server Core installation affected)<br \/>\n&#8211; Windows Server 2012 R2<br \/>\n(Windows Server 2012 R2 Server Core installation affected)<br \/>\n&#8211; Windows RT 8.1<br \/>\n&#8211; Windows 10 for 32-bit Systems<br \/>\n&#8211; Windows 10 for x64-based Systems<br \/>\n&#8211; Windows 10 Version 1511 for 32-bit Systems<br \/>\n&#8211; Windows 10 Version 1511 for x64-based Systems<br \/>\n&#8211; Impact: Elevation of Privilege<br \/>\n&#8211; Version Number: 1.0<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=733469\" target=\"_blank\" rel=\"noopener noreferrer\">MS16-034<\/a>: <strong>Sicherheitsupdate f\u00fcr Windows-Kernelmodustreiber zum Unterbinden einer Erh\u00f6hung von Berechtigungen (3143145)<br \/>\n<\/strong>Dieses Sicherheitsupdate behebt Sicherheitsanf\u00e4lligkeiten in Microsoft Windows. Die Sicherheitsanf\u00e4lligkeiten k\u00f6nnen Rechteeweiterungen erm\u00f6glichen, wenn sich ein Angreifer bei einem System anmeldet und eine speziell gestaltete Anwendung ausf\u00fchrt.<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/kb\/3139852\" target=\"_blank\" rel=\"noopener noreferrer\">KB3139852<\/a>: Hoch, Erh\u00f6hung von Berechtigungen, Erfordert Neustart<\/p>\n<p>&#8211; Affected Software:<br \/>\n&#8211; Windows Vista Service Pack 2<br \/>\n&#8211; Windows Vista x64 Edition Service Pack 2<br \/>\n&#8211; Windows Server 2008 for 32-bit Systems Service Pack 2<br \/>\n(Windows Server 2008 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 for x64-based Systems Service Pack 2<br \/>\n(Windows Server 2008 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 for Itanium-based Systems Service Pack 2<br \/>\n&#8211; Windows 7 for 32-bit Systems Service Pack 1<br \/>\n&#8211; Windows 7 for x64-based Systems Service Pack 1<br \/>\n&#8211; Windows Server 2008 R2 for x64-based Systems Service Pack 1<br \/>\n(Windows Server 2008 R2 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 R2 for Itanium-based Systems Service<br \/>\nPack 1<br \/>\n&#8211; Windows 8.1 for 32-bit Systems<br \/>\n&#8211; Windows 8.1 for x64-based Systems<br \/>\n&#8211; Windows Server 2012<br \/>\n(Windows Server 2012 Server Core installation affected)<br \/>\n&#8211; Windows Server 2012 R2<br \/>\n(Windows Server 2012 R2 Server Core installation affected)<br \/>\n&#8211; Windows RT 8.1<br \/>\n&#8211; Windows 10 for 32-bit Systems<br \/>\n&#8211; Windows 10 for x64-based Systems<br \/>\n&#8211; Windows 10 Version 1511 for 32-bit Systems<br \/>\n&#8211; Windows 10 Version 1511 for x64-based Systems<br \/>\n&#8211; Impact: Elevation of Privilege<br \/>\n&#8211; Version Number: 1.0<\/p>\n<p><a href=\"http:\/\/go.microsoft.com\/fwlink\/?LinkId=730728\" target=\"_blank\" rel=\"noopener noreferrer\">MS16-035<\/a>: <strong>Sicherheitsupdate f\u00fcr .NET Framework zum Unterbinden einer Umgehung von Sicherheitsfunktionen (3141780)<\/strong><br \/>\nDieses Sicherheitsupdate behebt eine Sicherheitsanf\u00e4lligkeit in Microsoft .NET Framework. Die Umgehung von Sicherheitsfunktionen wird durch eine .NET Framework-Komponente erm\u00f6glicht, welche bestimmte Elemente signierter XML-Dokumente nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft.<\/p>\n<p>KB3135982, <a href=\"https:\/\/support.microsoft.com\/kb\/3135983\" target=\"_blank\" rel=\"noopener noreferrer\">KB3135983<\/a>, <a href=\"https:\/\/support.microsoft.com\/kb\/3135984\" target=\"_blank\" rel=\"noopener noreferrer\">KB3135984<\/a>, <a href=\"https:\/\/support.microsoft.com\/kb\/3135985\" target=\"_blank\" rel=\"noopener noreferrer\">KB3135985<\/a>, KB3135987, KB3135988,<br \/>\n<a href=\"https:\/\/support.microsoft.com\/kb\/3135989\" target=\"_blank\" rel=\"noopener noreferrer\">KB3135989<\/a>; <a href=\"https:\/\/support.microsoft.com\/kb\/3135991\" target=\"_blank\" rel=\"noopener noreferrer\">KB3135991<\/a>, <a href=\"https:\/\/support.microsoft.com\/kb\/3135994\" target=\"_blank\" rel=\"noopener noreferrer\">KB3135994<\/a>; <a href=\"https:\/\/support.microsoft.com\/kb\/3135995\" target=\"_blank\" rel=\"noopener noreferrer\">KB3135995<\/a>, <a href=\"https:\/\/support.microsoft.com\/kb\/3135996\" target=\"_blank\" rel=\"noopener noreferrer\">KB3135996<\/a>, <a href=\"https:\/\/support.microsoft.com\/kb\/3135997\" target=\"_blank\" rel=\"noopener noreferrer\">KB3135997<\/a>,<br \/>\n<a href=\"https:\/\/support.microsoft.com\/kb\/3135998\" target=\"_blank\" rel=\"noopener noreferrer\">KB3135998<\/a>; <a href=\"https:\/\/support.microsoft.com\/kb\/3136000\" target=\"_blank\" rel=\"noopener noreferrer\">KB3136000<\/a>:<br \/>\nHoch, Umgehung von Sicherheitsfunktionen, Erfordert u.U.Neustart<\/p>\n<p>&#8211; Affected Software:<br \/>\n&#8211; Windows Vista Service Pack 2:<br \/>\n&#8211; Microsoft .NET Framework 2.0 Service Pack 2<br \/>\n&#8211; Microsoft .NET Framework 3.0 Service Pack 2<br \/>\n&#8211; Microsoft .NET Framework 4.5.2<br \/>\n&#8211; Microsoft .NET Framework 4.6<br \/>\n&#8211; Windows Vista x64 Edition Service Pack 2:<br \/>\n&#8211; Microsoft .NET Framework 2.0 Service Pack 2<br \/>\n&#8211; Microsoft .NET Framework 3.0 Service Pack 2<br \/>\n&#8211; Microsoft .NET Framework 4.5.2<br \/>\n&#8211; Microsoft .NET Framework 4.6<br \/>\n&#8211; Windows Server 2008 for 32-bit Systems Service Pack 2:<br \/>\n&#8211; Microsoft .NET Framework 2.0 Service Pack 2<br \/>\n&#8211; Microsoft .NET Framework 3.0 Service Pack 2<br \/>\n&#8211; Microsoft .NET Framework 4.5.2<br \/>\n&#8211; Microsoft .NET Framework 4.6<br \/>\n(Windows Server 2008 Server Core installation not affected)<br \/>\n&#8211; Windows Server 2008 for x64-based Systems Service Pack 2:<br \/>\n&#8211; Microsoft .NET Framework 2.0 Service Pack 2<br \/>\n&#8211; Microsoft .NET Framework 3.0 Service Pack 2<br \/>\n&#8211; Microsoft .NET Framework 4.5.2<br \/>\n&#8211; Microsoft .NET Framework 4.6<br \/>\n(Windows Server 2008 Server Core installation not affected)<br \/>\n&#8211; Windows Server 2008 for Itanium-based Systems Service Pack 2:<br \/>\n&#8211; Microsoft .NET Framework 2.0 Service Pack 2<br \/>\n&#8211; Windows 7 for 32-bit Systems Service Pack 1:<br \/>\n&#8211; Microsoft .NET Framework 3.5.1<br \/>\n&#8211; Microsoft .NET Framework 4.5.2<br \/>\n&#8211; Microsoft .NET Framework 4.6\/4.6.1<br \/>\n&#8211; Windows 7 for x64-based Systems Service Pack 1:<br \/>\n&#8211; Microsoft .NET Framework 3.5.1<br \/>\n&#8211; Microsoft .NET Framework 4.5.2<br \/>\n&#8211; Microsoft .NET Framework 4.6\/4.6.1<br \/>\n&#8211; Windows Server 2008 R2 for x64-based Systems Service Pack 1:<br \/>\n&#8211; Microsoft .NET Framework 3.5.1<br \/>\n&#8211; Microsoft .NET Framework 4.5.2<br \/>\n(Windows Server 2008 R2 Server Core installation affected)<br \/>\n&#8211; Windows Server 2008 R2 for Itanium-based Systems Service<br \/>\nPack 1:<br \/>\n&#8211; Microsoft .NET Framework 3.5.1<br \/>\n&#8211; Windows 8.1 for 32-bit Systems:<br \/>\n&#8211; Microsoft .NET Framework 3.5<br \/>\n&#8211; Microsoft .NET Framework 4.5.2<br \/>\n&#8211; Microsoft .NET Framework 4.6\/4.6.1<br \/>\n&#8211; Windows 8.1 for x64-based Systems:<br \/>\n&#8211; Microsoft .NET Framework 3.5<br \/>\n&#8211; Microsoft .NET Framework 4.5.2<br \/>\n&#8211; Microsoft .NET Framework 4.6\/4.6.1<br \/>\n&#8211; Windows Server 2012:<br \/>\n&#8211; Microsoft .NET Framework 3.5<br \/>\n&#8211; Microsoft .NET Framework 4.5.2<br \/>\n&#8211; Microsoft .NET Framework 4.6\/4.6.1<br \/>\n(Windows Server 2012 Server Core installation affected)<br \/>\n&#8211; Windows Server 2012 R2:<br \/>\n&#8211; Microsoft .NET Framework 3.5<br \/>\n&#8211; Microsoft .NET Framework 4.5.2<br \/>\n&#8211; Microsoft .NET Framework 4.6\/4.6.1<br \/>\n(Windows Server 2012 R2 Server Core installation affected)<br \/>\n&#8211; Windows RT 8.1:<br \/>\n&#8211; Microsoft .NET Framework 4.5.2<br \/>\n&#8211; Microsoft .NET Framework 4.6\/4.6.1<br \/>\n&#8211; Windows 10 for 32-bit Systems:<br \/>\n&#8211; Microsoft .NET Framework 3.5<br \/>\n&#8211; Microsoft .NET Framework 4.6\/4.6.1<br \/>\n&#8211; Windows 10 for x64-based Systems:<br \/>\n&#8211; Microsoft .NET Framework 3.5<br \/>\n&#8211; Microsoft .NET Framework 4.6\/4.6.1<br \/>\n&#8211; Windows 10 Version 1511 for 32-bit Systems:<br \/>\n&#8211; Microsoft .NET Framework 3.5<br \/>\n&#8211; Microsoft .NET Framework 4.6.1<br \/>\n&#8211; Windows 10 Version 1511 for x64-based Systems:<br \/>\n&#8211; Microsoft .NET Framework 3.5<br \/>\n&#8211; Microsoft .NET Framework 4.6.1<br \/>\n&#8211; Impact: Security Feature Bypass<br \/>\n&#8211; Version Number: 1.0<\/p>\n<p>Einige Hinweise gibt es zudem in <a href=\"http:\/\/www.heise.de\/newsticker\/meldung\/Microsoft-Patchday-Fuenf-kritische-Luecken-alle-Windows-Versionen-betroffen-3131122.html\" target=\"_blank\" rel=\"noopener noreferrer\">diesem heise.de-Artikel<\/a>. Ich gehe mal davon aus, dass eine PDF-Programme wie Chrystal-Reports Probleme wegen der ge\u00e4nderten PDF-Bibliotheken machen k\u00f6nnen &#8211; mag mich aber t\u00e4uschen.<\/p>\n<p><strong>\u00c4hnliche Artikel:<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2016\/03\/09\/microsoft-mrz-2016-patchday-killt-logitech-firstpilot-mouseusb\/\" rel=\"bookmark\">Microsoft M\u00e4rz 2016-Patchday killt Logitech First\/Pilot Mouse+(USB)<br \/>\n<\/a><a href=\"https:\/\/borncity.com\/blog\/2016\/03\/09\/windows-10-kumulatives-update-kb3140768\/\" rel=\"bookmark\">Windows 10: Kumulatives Update KB3140768 \/ KB3140745<br \/>\n<\/a><a href=\"https:\/\/borncity.com\/blog\/2016\/03\/09\/microsoft-patchday-8-mrz-2016-optionale-updates\/\" rel=\"bookmark\">Microsoft Patchday 8. M\u00e4rz 2016 \u2013 optionale Updates<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Am 8. M\u00e4rz 2016 hat Microsoft insgesamt 13 Sicherheits-Updates f\u00fcr Windows, den Internet Explorer, f\u00fcr Edge, f\u00fcr Office und f\u00fcr .NET Framework freigegeben.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[270,185,301],"tags":[1115,4322,1229,4315,4325],"class_list":["post-175442","post","type-post","status-publish","format-standard","hentry","category-office","category-update","category-windows","tag-net","tag-office","tag-patchday","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/175442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=175442"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/175442\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=175442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=175442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=175442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}