{"id":191373,"date":"2017-06-14T00:22:46","date_gmt":"2017-06-13T22:22:46","guid":{"rendered":"http:\/\/www.borncity.com\/blog\/?p=191373"},"modified":"2023-04-11T07:14:07","modified_gmt":"2023-04-11T05:14:07","slug":"microsoft-sicherheits-advisory-juni-2017","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2017\/06\/14\/microsoft-sicherheits-advisory-juni-2017\/","title":{"rendered":"Microsoft Sicherheits-Advisory Juni 2017"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>Zum 13. Juni 2017 hat Microsoft ein <a href=\"https:\/\/technet.microsoft.com\/library\/security\/4025685\" target=\"_blank\" rel=\"noopener\">Sicherheits-Advisory<\/a> herausgegeben, welches \u00fcber 15 kritische Sicherheitsl\u00fccken informiert, die beim Patchday geschlossen wurden.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/8b0863fb0084413f83197a5b653a5215\" alt=\"\" width=\"1\" height=\"1\" \/>Die ben\u00f6tigten Updates kommen per Windows Update, per WSUS oder SCCM oder lassen sich aus dem Microsoft Update Catalog herunterladen. Nachfolgend findet sich aber nur die Liste der Sicherheitsl\u00fccken, die im Juni 2017 adressiert wurden.<\/p>\n<p><a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms08-067\" target=\"_blank\" rel=\"noopener\">MS08-067<\/a>: <strong>Vulnerability in Server Service Could Allow Remote Code Execution (958644)<\/strong><br \/>\nThis security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft, Windows XP and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit.<\/p>\n<p>Critical &#8211; Remote Code Execution &#8211; Restart required<br \/>\nMicrosoft Windows<\/p>\n<p><a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms09-050\" target=\"_blank\" rel=\"noopener\">MS09-050<\/a>: <strong>Vulnerabilities in SMBv2 Could Allow Remote Code Execution (975517)<\/strong><br \/>\nThis security update resolves one publicly disclosed and two privately reported vulnerabilities in Server Message Block Version 2 (SMBv2). The most severe of the vulnerabilities could allow remote code execution if an attacker sent a specially crafted SMB packet to a computer running the Server service.<\/p>\n<p>Critical &#8211; Remote Code Execution &#8211; Restart required<br \/>\nMicrosoft Windows<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20161111140156\/https:\/\/technet.microsoft.com\/library\/security\/ms10-061\" target=\"_blank\" rel=\"noopener\">MS10-061<\/a>: <strong>Vulnerability in Print Spooler Service Could Allow Remote Code Execution (2347290)<\/strong><br \/>\nThis security update resolves a publicly disclosed vulnerability in the Print Spooler service. The vulnerability could allow remote code execution if an attacker sends a specially crafted print request to a vulnerable system that has a print spooler interface exposed over RPC. By default, printers are not shared on any currently supported Windows operating system.<\/p>\n<p>Critical -Remote Code Execution &#8211; Restart required<br \/>\nMicrosoft Windows<\/p>\n<p><a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms14-068\" target=\"_blank\" rel=\"noopener\">MS14-068<\/a>: <strong>Vulnerability in Kerberos Could Allow Elevation of Privilege (3011780)<\/strong><br \/>\nThis security update resolves a privately reported vulnerability in Microsoft Windows Kerberos KDC that could allow an attacker to elevate unprivileged domain user account privileges to those of the domain administrator account. An attacker could use these elevated privileges to compromise any computer in the domain, including domain controllers. An attacker must have valid domain credentials to exploit this vulnerability. The affected component is available remotely to users who have standard user accounts with domain credentials; this is not the case for users with local account credentials only.<\/p>\n<p>Critical &#8211; Elevation of Privilege &#8211; Restart required<br \/>\nMicrosoft Windows<\/p>\n<p><a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms17-010\" target=\"_blank\" rel=\"noopener\">MS17-010<\/a>: <strong>Security Update for Microsoft Windows SMB Server (4013389)<\/strong><br \/>\nThis security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an attacker sends specially crafted messages to a Microsoft Server Message Block 1.0 (SMBv1) server.<\/p>\n<p>Critical &#8211; Remote Code Execution &#8211; Restart required<br \/>\nMicrosoft Windows<\/p>\n<p><a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms17-013\" target=\"_blank\" rel=\"noopener\">MS17-013<\/a>: <strong>Security Update for Microsoft Graphics Component (4013075)<br \/>\n<\/strong>This security update resolves vulnerabilities in Microsoft Windows, Microsoft Office, Skype for Business, Microsoft Lync, and Microsoft Silverlight. The most severe of these vulnerabilities could allow remote code execution if a user either visits a specially crafted website or opens a specially crafted document.<\/p>\n<p>Critical &#8211; Remote Code Execution &#8211; Restart required<br \/>\nMicrosoft Windows<\/p>\n<p>CVE-2017-0176: <strong>Remote Desktop Protocol Remote Code Execution Vulnerability (CVE-2017-0176 )<br \/>\n<\/strong>A remote code execution vulnerability exists in Remote Desktop Protocol (RDP) if the RDP server has Smart Card authentication enabled. An attacker who successfully exploited this vulnerability could execute code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.<\/p>\n<p>Critical &#8211; Remote Code Execution &#8211; Restart required<br \/>\nMicrosoft Windows<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20200621134839\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-0222\" target=\"_blank\" rel=\"noopener\">CVE-2017-0222<\/a>: <strong>Internet Explorer Memory Corruption Vulnerability (CVE-2017-0222)<br \/>\n<\/strong>A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, the attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.<\/p>\n<p>Critical &#8211; Remote Code Execution &#8211; Restart required<\/p>\n<p>Microsoft Internet Explorer<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20200618230604\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-0267\" target=\"_blank\" rel=\"noopener\">CVE-2017-0267 &#8211; CVE-2017-0280<\/a>: <strong>Security Update for Microsoft Windows SMB (CVEs 2017-0267 through 2017-0280<\/strong><br \/>\nSecurity updates exist in Microsoft Windows SMB. The most severe of the vulnerabilities could allow remote code execution if an attacker sends specially crafted packets to a Microsoft Server Message Block 1.0 (SMBv1) server.<\/p>\n<p>Critical &#8211; Remote Code Execution &#8211; Restart required<br \/>\nMicrosoft Windows<\/p>\n<p>CVE-2017-7269: <strong>WebDAV Remote Code Execution Vulnerability (CVE-2017-7269)<br \/>\n<\/strong>A vulnerability exists in IIS when WebDAV improperly handles objects in memory, which could allow an attacker to run arbitrary code on the user's system. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user.<\/p>\n<p>Critical &#8211; Remote Code Execution &#8211; Restart required<br \/>\nMicrosoft Windows<\/p>\n<p>CVE-2017-8461: <strong>Windows RPC Remote Code Execution Vulnerability (CVE-2017-8461)<\/strong><br \/>\nA remote code execution vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could execute code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.<\/p>\n<p>Critical &#8211; Remote Code Execution &#8211; Restart required<br \/>\nMicrosoft Windows<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20200517054036\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2017-8464\" target=\"_blank\" rel=\"noopener\">CVE-2017-8464<\/a>: <strong>LNK Remote Code Execution Vulnerability (CVE-2017-8464)<\/strong><br \/>\nA remote code execution exists in Microsoft Windows that could allow remote code execution if the icon of a specially crafted shortcut is displayed. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.<\/p>\n<p>Critical &#8211; Remote Code Execution &#8211; Restart required<br \/>\nMicrosoft Windows<\/p>\n<p>CVE-2017-8487: <strong>Windows olecnv32.dll Remote Code Execution Vulnerability (CVE-2017-8487)<br \/>\n<\/strong>A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input. An attacker could exploit the vulnerability to execute malicious code.<\/p>\n<p>Critical &#8211; Remote Code Execution &#8211; Restart required<br \/>\nMicrosoft Windows<\/p>\n<p>CVE-2017-8543: <strong>Windows Search Remote Code Execution Vulnerability (CVE-2017-8543)<br \/>\n<\/strong>A remote code execution vulnerability exists when Windows Search handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.<\/p>\n<p>Critical &#8211; Remote Code Execution &#8211; Restart required<br \/>\nMicrosoft Windows<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20200621005017\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2017-8552\" target=\"_blank\" rel=\"noopener\">CVE-2017-8552<\/a>: <strong>Win32k Elevation of Privilege Vulnerability<\/strong><br \/>\nAn elevation of privilege vulnerability exists when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.<\/p>\n<p>Important\u00a0 &#8211; Remote Code Execution &#8211; Restart required<br \/>\nMicrosoft Windows<\/p>\n<p>Details zu den Updates finden sich in folgenden Blog-Beitr\u00e4gen.<\/p>\n<p><strong>\u00c4hnliche Artikel:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/blog\/2017\/06\/13\/juni-2017-patchday-kurzbersicht\/\">Microsoft Juni 2017 Patchday Kurz\u00fcbersicht<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/06\/14\/microsoft-sicherheits-advisory-juni-2017\/\">Microsoft Sicherheits-Advisory Juni 2017<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/06\/14\/patchday-juni-2017-updates-fr-windows-78-1\/\">Patchday Juni 2017: Updates f\u00fcr Windows 7\/8.1<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/06\/13\/patchday-juni-2017-updates-fr-windows10\/\">Patchday Juni 2017: Updates f\u00fcr Windows 10<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/06\/14\/office-sicherheits-updates-13-juni-2017\/\">Office Sicherheits-Updates (13. Juni 2017)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/06\/14\/weitere-sicherheits-updates-13-juni-2017\/\" rel=\"bookmark\">Weitere Sicherheits-Updates 13. Juni 2017<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zum 13. Juni 2017 hat Microsoft ein Sicherheits-Advisory herausgegeben, welches \u00fcber 15 kritische Sicherheitsl\u00fccken informiert, die beim Patchday geschlossen wurden.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,301],"tags":[672,4328,3288],"class_list":["post-191373","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-windows","tag-microsoft","tag-sicherheit","tag-windows-en"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/191373","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=191373"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/191373\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=191373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=191373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=191373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}