{"id":192891,"date":"2017-08-08T20:32:31","date_gmt":"2017-08-08T18:32:31","guid":{"rendered":"http:\/\/www.borncity.com\/blog\/?p=192891"},"modified":"2023-05-26T23:59:23","modified_gmt":"2023-05-26T21:59:23","slug":"microsoft-august-2017-patchday-summary","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2017\/08\/08\/microsoft-august-2017-patchday-summary\/","title":{"rendered":"Microsoft August 2017 Patchday Summary"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Windows Update\" width=\"40\" height=\"40\" align=\"left\" border=\"0\" \/>Am heutigen 8. August 2017 hat Microsoft einen Reihe an Sicherheitsupdates f\u00fcr diverse Produkte wie Windows bereitgestellt. Nachfolgend findet sich das Patchday Summary zur ersten Orientierung.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/41c9bc8e4712478980face30eb92eed5\" alt=\"\" width=\"1\" height=\"1\" \/>Details zu den Sicherheitsupdates lassen sich im in <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">Security TechCenter<\/a> sowie in meinen diversen Blog-Beitr\u00e4gen nachlesen.<\/p>\n<p>Critical Security Updates<br \/>\n============================<\/p>\n<p>Adobe Flash Player<br \/>\nInternet Explorer 9<br \/>\nInternet Explorer 11<br \/>\nMicrosoft Edge<br \/>\nWindows 7 for 32-bit Systems Service Pack 1<br \/>\nWindows 7 for x64-based Systems Service Pack 1<br \/>\nWindows 8.1 for 32-bit systems<br \/>\nWindows 8.1 for x64-based systems<br \/>\nWindows RT 8.1<br \/>\nWindows 10 for 32-bit Systems<br \/>\nWindows 10 for x64-based Systems<br \/>\nWindows 10 Version 1511 for 32-bit Systems<br \/>\nWindows 10 Version 1511 for x64-based Systems<br \/>\nWindows 10 Version 1607 for 32-bit Systems<br \/>\nWindows 10 Version 1607 for x64-based Systems<br \/>\nWindows 10 Version 1703 for 32-bit Systems<br \/>\nWindows 10 Version 1703 for x64-based Systems<br \/>\nWindows Server 2008 for 32-bit Systems Service Pack 2<br \/>\nWindows Server 2008 for 32-bit Systems Service Pack 2<br \/>\n(Server Core installation)<br \/>\nWindows Server 2008 for Itanium-Based Systems Service Pack 2<br \/>\nWindows Server 2008 for x64-based Systems Service Pack 2<br \/>\nWindows Server 2008 for x64-based Systems Service Pack 2<br \/>\n(Server Core installation)<br \/>\nWindows Server 2008 R2 for Itanium-Based Systems Service Pack 1<br \/>\nWindows Server 2008 R2 for x64-based Systems Service Pack 1<br \/>\nWindows Server 2008 R2 for x64-based Systems Service Pack 1<br \/>\n(Server Core installation)<br \/>\nWindows Server 2012<br \/>\nWindows Server 2012 (Server Core installation)<br \/>\nWindows Server 2012 R2<br \/>\nWindows Server 2012 R2 (Server Core installation)<br \/>\nWindows Server 2016<br \/>\nWindows Server 2016 (Server Core installation)<\/p>\n<p>Important Security Updates<br \/>\n============================<\/p>\n<p>Microsoft SharePoint Server 2010 Service Pack 2<br \/>\nMicrosoft SQL Server 2012 for 32-bit Systems Service Pack 3<br \/>\nMicrosoft SQL Server 2012 for 32-bit Systems Service Pack 3 (CU)<br \/>\nMicrosoft SQL Server 2012 for x64-based Systems Service Pack 3<br \/>\nMicrosoft SQL Server 2012 for x64-based Systems Service Pack 3 (CU)<br \/>\nMicrosoft SQL Server 2014 Service Pack 1 for 32-bit Systems<br \/>\nMicrosoft SQL Server 2014 Service Pack 1 for 32-bit Systems (CU)<br \/>\nMicrosoft SQL Server 2014 Service Pack 1 for x64-based Systems<br \/>\nMicrosoft SQL Server 2014 Service Pack 1 for x64-based Systems (CU)<br \/>\nMicrosoft SQL Server 2014 Service Pack 2 for 32-bit Systems<br \/>\nMicrosoft SQL Server 2014 Service Pack 2 for 32-bit Systems (CU)<br \/>\nMicrosoft SQL Server 2014 Service Pack 2 for x64-based Systems<br \/>\nMicrosoft SQL Server 2014 Service Pack 2 for x64-based Systems (CU)<br \/>\nMicrosoft SQL Server 2016 for x64-based Systems<br \/>\nMicrosoft SQL Server 2016 for x64-based Systems (CU)<br \/>\nMicrosoft SQL Server 2016 for x64-based Systems Service Pack 1<br \/>\nMicrosoft SQL Server 2016 for x64-based Systems Service Pack 1 (CU)<\/p>\n<p>Moderate Security Updates<br \/>\n============================<\/p>\n<p>Internet Explorer 10<\/p>\n<h2>Revidierte CVEs<\/h2>\n<p>Weiterhin hat Microsoft folgende Sicherheits-Bulletins einer Revision unterzogen.<\/p>\n<p>CVE-2017-0071<\/p>\n<p>&#8211; Title: CVE-2017-0071 | Scripting Engine Memory Corruption<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Reason for Revision: To comprehensively address CVE-2017-0071,<br \/>\nMicrosoft released the July security updates for all versions of<br \/>\nWindows 10. Note that Windows 10 for 32-bit Systems, Windows 10<br \/>\nfor x64-based Systems, Windows 10 Version 1703 for 32-bit Systems,<br \/>\nand Windows 10 Version 1703 for x64-based Systems have been added<br \/>\nto the Affected Products table as they are also affected by this<br \/>\nvulnerability. Microsoft recommends that customers who have not<br \/>\nalready done so install the July 2017 security updates to be<br \/>\nfully protected from this vulnerability.<br \/>\n&#8211; Originally posted: March 14, 2017<br \/>\n&#8211; Updated: August 8, 2017<br \/>\n&#8211; CVE Severity Rating: Critical<br \/>\n&#8211; Version: 2.0<\/p>\n<p>CVE-2017-0228<\/p>\n<p>&#8211; Title: CVE-2017-0228| Scripting Engine Memory Corruption<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Reason for Revision: To comprehensively address CVE-2017-0228,<br \/>\nMicrosoft has released August security updates for Internet<br \/>\nExplorer 11 on affected editions of Windows 8.1, Windows Server<br \/>\n2012 R2, Windows 8.1 RT, Windows 10, Windows 10 Version 1511,<br \/>\nWindows 10 Version 1607, and Windows 10 Version 1703; and for<br \/>\nMicrosoft Edge on affected editions of Windows 10, Windows 10<br \/>\nVersion 1511, Windows 10 Version 1607, and Windows 10 Version 1703.<br \/>\nMicrosoft strongly recommends that customers install the updates<br \/>\nto be fully protected from the vulnerability. Customers whose<br \/>\nsystems are configured to receive automatic updates do not need<br \/>\nto take any further action.<br \/>\n&#8211; Originally posted: May 9, 2017<br \/>\n&#8211; Updated: August 8, 2017<br \/>\n&#8211; CVE Severity Rating: Critical<br \/>\n&#8211; Version: 2.0<\/p>\n<p>CVE-2017-0299<\/p>\n<p>&#8211; Title: CVE-2017-0299 | Windows Kernel Information Disclosure<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Reason for Revision: To comprehensively address CVE-2017-0299,<br \/>\nMicrosoft has released August security updates for all affected<br \/>\neditions of Microsoft Windows. Microsoft strongly recommends that<br \/>\ncustomers install the updates to be fully protected from the<br \/>\nvulnerability. Customers whose systems are configured to receive<br \/>\nautomatic updates do not need to take any further action.<br \/>\n&#8211; Originally posted: June 13, 2017<br \/>\n&#8211; Updated: August 8, 2017<br \/>\n&#8211; CVE Severity Rating: Important<br \/>\n&#8211; Version: 5.0<\/p>\n<p>Security Bulletin Revision Information:<br \/>\n=====================<\/p>\n<p>MS17-007<\/p>\n<p>&#8211; Title: Cumulative Security Update for Microsoft Edge (4013071)<br \/>\n&#8211; <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms17-007.aspx\">https:\/\/technet.microsoft.com\/library\/security\/ms17-007.aspx<\/a><br \/>\n&#8211; Reason for Revision: To comprehensively address CVE-2017-0071,<br \/>\nMicrosoft released the July security updates for all versions of<br \/>\nWindows 10. Note that Windows 10 for 32-bit Systems, Windows 10<br \/>\nfor x64-based Systems, Windows 10 Version 1703 for 32-bit Systems,<br \/>\nand Windows 10 Version 1703 for x64-based Systems have been added<br \/>\nto the Affected Products table as they are also affected by this<br \/>\nvulnerability. Microsoft recommends that customers who have not<br \/>\nalready done so install the July 2017 security updates to be fully<br \/>\nprotected from this vulnerability.<br \/>\n&#8211; Originally posted: March 14, 2017<br \/>\n&#8211; Updated: August 8, 2017<br \/>\n&#8211; Bulletin Severity Rating: Critical<br \/>\n&#8211; Version: 2.0<\/p>\n<p>MS17-MAR<\/p>\n<p>&#8211; Title: Microsoft Security Bulletin Summary for March 2017<br \/>\n&#8211; <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms17-MAR.aspx\">https:\/\/technet.microsoft.com\/library\/security\/ms17-MAR.aspx<\/a><br \/>\n&#8211; Reason for Revision: For MS17-007, to comprehensively address<br \/>\nCVE-2017-0071, Microsoft released the July security updates for<br \/>\nall versions of Windows 10. Note that Windows 10 for 32-bit Systems,<br \/>\nWindows 10 for x64-based Systems, Windows 10 Version 1703 for 32-bit<br \/>\nSystems, and Windows 10 Version 1703 for x64-based Systems have been<br \/>\nadded to the Affected Products table as they are also affected by<br \/>\nthis vulnerability. Microsoft recommends that customers who have not<br \/>\nalready done so install the July 2017 security updates to be fully<br \/>\nprotected from this vulnerability.<br \/>\n&#8211; Originally posted: March 14, 2017<br \/>\n&#8211; Updated: August 8, 2017<br \/>\n&#8211; Bulletin Severity Rating: N\/A<br \/>\n&#8211; Version: 4.0<\/p>\n<p><strong>\u00c4hnliche Artikel:<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/08\/08\/microsoft-august-2017-patchday-summary\/\">Microsoft August 2017 Patchday Summar<br \/>\n<\/a><a style=\"background-color: #ffffff;\" href=\"https:\/\/borncity.com\/blog\/2017\/08\/09\/patchday-august-2017-updates-fr-windows-78-1\/\">Patchday August 2017: Updates f\u00fcr Windows 7\/8.1<br \/>\n<\/a><a href=\"https:\/\/borncity.com\/blog\/2017\/08\/08\/windows-10-kritische-updates-kb4035631-kb4035632\/\">Windows 10: Kritische Updates KB4035631 und KB4035632<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/08\/08\/windows-10-august-2017-updates-kb4038220\/\">Windows 10: August 2017 Updates KB4038220, KB4034674, KB4034658, KB4034660<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/08\/03\/microsoft-office-updates-2-august-2017\/\">Microsoft Office-Updates 1. August 2017<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/08\/02\/windows-10-v1703-update-kb4032188-31-juli-2017\/\">Windows 10 V1703: Update KB4032188 (31. Juli 2017)<br \/>\n<\/a>Adobe Flash-Update 26.0.0.151 (August 2017<br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2017\/08\/09\/weitere-microsoft-updates-zum-patchday-8-8-2017\/\">Weitere Microsoft Updates zum Patchday 8.8.201<br \/>\n<\/a><a href=\"https:\/\/borncity.com\/blog\/2017\/08\/10\/microsoft-office-sicherheitsupdates-8-august-2017\/\">Microsoft Office Sicherheitsupdates (8. August 2017)<\/a><a href=\"https:\/\/borncity.com\/blog\/2017\/08\/02\/windows-10-v1703-update-kb4032188-31-juli-2017\/\"> <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Am heutigen 8. August 2017 hat Microsoft einen Reihe an Sicherheitsupdates f\u00fcr diverse Produkte wie Windows bereitgestellt. Nachfolgend findet sich das Patchday Summary zur ersten Orientierung.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185,301],"tags":[4315,3288],"class_list":["post-192891","post","type-post","status-publish","format-standard","hentry","category-update","category-windows","tag-update","tag-windows-en"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/192891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=192891"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/192891\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=192891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=192891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=192891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}