{"id":194242,"date":"2017-09-19T23:52:25","date_gmt":"2017-09-19T21:52:25","guid":{"rendered":"http:\/\/www.borncity.com\/blog\/?p=194242"},"modified":"2022-08-22T10:18:42","modified_gmt":"2022-08-22T08:18:42","slug":"microsoft-update-revisionen-september-2017","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2017\/09\/19\/microsoft-update-revisionen-september-2017\/","title":{"rendered":"Microsoft Update-Revisionen September 2017"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" title=\"Update\" style=\"border-left-width: 0px; border-right-width: 0px; border-bottom-width: 0px; float: left; margin: 0px 10px 0px 0px; display: inline; border-top-width: 0px\" border=\"0\" alt=\"Windows Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" width=\"40\" align=\"left\" height=\"40\"\/>Zum 12. September, zum 14. September sowie zum 19. September 2017 hat Microsoft einige Update-Revisionen vorgenommen. Im Blog-Beitrag gebe ich einen \u00dcberblick \u00fcber diese Revisionen.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/8761ab3d130c4bc7957fe3cdb525ae90\" width=\"1\" height=\"1\"\/>********************************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: 12. September 2017<br \/>********************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs and security bulletins have undergone a major revision increment.<\/p>\n<p>* CVE-2016-0165<br \/>* CVE-2016-3238<br \/>* CVE-2016-3326<br \/>* CVE-2016-3376<br \/>* CVE-2017-0213<br \/>* CVE-2017-8529<br \/>* CVE-2017-8599<br \/>* MS16-039<br \/>* MS16-APR<br \/>* MS16-087<br \/>* MS16-JUL<br \/>* MS16-095<br \/>* MS16-AUG<br \/>* MS16-123<br \/>* MS16-OCT<\/p>\n<p>CVE Revision Information:<br \/>=====================<\/p>\n<p>CVE-2016-0165<\/p>\n<p>&#8211; Title: CVE-2016-0165 | Win32k Elevation of Privilege Vulnerability<br \/>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: Revised the Affected Products table to <br \/>&nbsp;&nbsp; include Windows 10 Version 1703 for 32-bit Systems and Windows 10 <br \/>&nbsp;&nbsp; Version 1703 for x64-based Systems because they are affected by <br \/>&nbsp;&nbsp; CVE-2016-0165. Consumers running Windows 10 are automatically <br \/>&nbsp;&nbsp; protected. Microsoft recommends that enterprise customers running <br \/>&nbsp;&nbsp; Windows 10 Version 1703 ensure they have update 4038788 installed <br \/>&nbsp;&nbsp; to be protected from this vulnerability.<br \/>&#8211; Originally posted: April 12, 2016&nbsp; <br \/>&#8211; Updated: September 12, 2017 <br \/>&#8211; CVE Severity Rating: Important<br \/>&#8211; Version: 2.0<\/p>\n<p>CVE-2016-3238<\/p>\n<p>&#8211; Title: CVE-2016-3238 | Windows Print Spooler Remote Code Execution <br \/>&nbsp;&nbsp; Vulnerability<br \/>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: To address known issues with the 3170455 <br \/>&nbsp;&nbsp; update for CVE-2016-3238, Microsoft has made available the <br \/>&nbsp;&nbsp; following updates for currently-supported versions of Microsoft <br \/>&nbsp;&nbsp; Windows: <br \/>&nbsp;&nbsp; &#8211; Rereleased update 3170455 for Windows Server 2008, <br \/>&nbsp;&nbsp; &#8211; Monthly Rollup 4038777 and Security Update 4038779 for Windows 7 <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and Windows Server 2008 R2<br \/>&nbsp;&nbsp; &#8211; Monthly Rollup 4038799 and Security Update 4038786 for <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Windows Server 2012 <br \/>&nbsp;&nbsp;&nbsp; &#8211; Monthly Rollup 4038792 and Security Update 4038793 for Windows 8.1<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; and Windows Server 2012 R2 <br \/>&nbsp;&nbsp;&nbsp; &#8211; Cumulative Update 4038781 for Windows 10 <br \/>&nbsp;&nbsp;&nbsp; &#8211; Cumulative Update 4038781 for Windows 10 Version 1511 <br \/>&nbsp;&nbsp;&nbsp; &#8211; Cumulative Update 4038782 for Windows 10 Version 1607 and Windows Server 2016.<br \/>&nbsp;&nbsp; Microsoft recommends that customers running Windows Server 2008 reinstall <br \/>&nbsp;&nbsp; update 3170455. Microsoft recommends that customers running other <br \/>&nbsp;&nbsp; supported versions of Windows install the appropriate update. See <br \/>&nbsp;&nbsp; Microsoft Knowledge Base Article <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/3170005\" target=\"_blank\" rel=\"noopener noreferrer\">3170005<\/a> for more information.<br \/>&#8211; Originally posted: July 12, 2016<br \/>&#8211; Updated: September 12, 2017<br \/>&#8211; CVE Severity Rating: Critical<br \/>&#8211; Version: 2.0<\/p>\n<p>CVE-2016-3326<\/p>\n<p>&#8211; Title: CVE-2016-3326 | Microsoft Browser Information Disclosure <br \/>&nbsp;&nbsp; Vulnerability<br \/>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: Revised the Affected Products table to include<br \/>&nbsp;&nbsp; Microsoft Edge and Internet Explorer 11 installed on Windows 10 <br \/>&nbsp;&nbsp; Version 1703 for 32-bit Systems, and Microsoft Edge and Internet <br \/>&nbsp;&nbsp; Explorer 11 installed on Windows 10 Version 1703 for x64-based <br \/>&nbsp;&nbsp; Systems because they are affected by CVE-2016-3326. In addition, <br \/>&nbsp;&nbsp; corrected the Affected Products table to include Microsoft Edge <br \/>&nbsp;&nbsp; installed on Windows 10, Windows 10 Version 1511, and Windows 10 <br \/>&nbsp;&nbsp; Version 1607 because they are also affected by this vulnerability. <br \/>&nbsp;&nbsp; Consumers using Windows 10 are automatically protected. Microsoft <br \/>&nbsp;&nbsp; recommends that enterprise customers running Microsoft Edge or <br \/>&nbsp;&nbsp; Internet Explorer on Windows 10 Version 1703 ensure they have update<br \/>&nbsp;&nbsp; 4038788 installed to be protected from this vulnerability. Customers<br \/>&nbsp;&nbsp; who are running other versions of Windows 10 and who have installed <br \/>&nbsp;&nbsp; the August cumulative updates do not need to take any further action.<br \/>&#8211; Originally posted: August 9, 2016<br \/>&#8211; Updated: September 12, 2017<br \/>&#8211; CVE Severity Rating: Important<br \/>&#8211; Version: 3.0<\/p>\n<p>CVE-2016-3376<\/p>\n<p>&#8211; Title: CVE-2016-3376 | Win32k Elevation of Privilege Vulnerability<br \/>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: Revised the Affected Products table to <br \/>&nbsp;&nbsp; include Windows 10 Version 1703 for 32-bit Systems and Windows 10<br \/>&nbsp;&nbsp; Version 1703 for x64-based Systems because they are affected by <br \/>&nbsp;&nbsp; CVE-2016-3376. Consumers using Windows 10 are automatically <br \/>&nbsp;&nbsp; protected. Microsoft recommends that enterprise customers running <br \/>&nbsp;&nbsp; Windows 10 Version 1703 ensure they have update 4038788 installed <br \/>&nbsp;&nbsp; to be protected from this vulnerability.<br \/>&#8211; Originally posted: October 11, 2016<br \/>&#8211; Updated: September 12, 2017<br \/>&#8211; CVE Severity Rating: Important<br \/>&#8211; Version: 3.0<\/p>\n<p>CVE-2017-0213<\/p>\n<p>&#8211; Title: CVE-2017-0213 | Windows COM Elevation of Privilege Vulnerability<br \/>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: To comprehensively address CVE-2017-0213, <br \/>&nbsp;&nbsp; Microsoft has released security update 4038788 for Windows 10 <br \/>&nbsp;&nbsp; Version 1703 for 32-bit Systems and Windows 10 Version 1703 for <br \/>&nbsp;&nbsp; x64-based Systems. Consumers using Windows 10 are automatically <br \/>&nbsp;&nbsp; protected. Microsoft recommends that enterprise customers running<br \/>&nbsp;&nbsp; Windows 10 Version 1703 ensure that they have update 4038788 <br \/>&nbsp;&nbsp; installed to be protected from this vulnerability.<br \/>&#8211; Originally posted: May 8, 2017<br \/>&#8211; Updated: September 12, 2017<br \/>&#8211; CVE Severity Rating: Important<br \/>&#8211; Version: 3.0<\/p>\n<p>CVE-2017-8529<\/p>\n<p>&#8211; Title: CVE-2017-8529 | Microsoft Browser Information Disclosure Vulnerability<br \/>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: To address known print regression issues <br \/>&nbsp;&nbsp; customers may experience when printing from Internet Explorer<br \/>&nbsp;&nbsp; or Microsoft Edge after installing any of the June security <br \/>&nbsp;&nbsp; updates, monthly rollups, or IE cumulative updates, Microsoft has<br \/>&nbsp;&nbsp; released the following September security updates: Internet <br \/>&nbsp;&nbsp; Explorer Cumulative Update 4036586; Monthly Rollups 4038777, <br \/>&nbsp;&nbsp; 4038799, 4038792; Security Updates 4038781, 4038783, 4038782, <br \/>&nbsp;&nbsp; and 4038788 for all affected editions of Microsoft Edge and <br \/>&nbsp;&nbsp; Internet Explorer when installed on supported editions of Windows. <br \/>&nbsp;&nbsp; Please note that with the installation of these updates, the <br \/>&nbsp;&nbsp; solution to CVE-2017-8529 is turned off by default to help <br \/>&nbsp;&nbsp; prevent the risk of further issues with print regressions, and <br \/>&nbsp;&nbsp; must be activated via your Registry. To be fully protected from <br \/>&nbsp;&nbsp; this vulnerability, please see the Update FAQ section for <br \/>&nbsp;&nbsp; instructions to activate the solution.<br \/>&#8211; Originally posted: June 13, 2017<br \/>&#8211; Updated: September 12, 2017<br \/>&#8211; CVE Severity Rating: Moderate<br \/>&#8211; Version: 5.0<\/p>\n<p>CVE-2017-8599<\/p>\n<p>&#8211; Title: CVE-2017-8599 | Microsoft Edge Security Feature <br \/>&nbsp;&nbsp; Bypass Vulnerability<br \/>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: To comprehensively address CVE-2017-8599,&nbsp; <br \/>&nbsp;&nbsp; Microsoft has released September security updates for all affected<br \/>&nbsp;&nbsp; editions of Microsoft Edge installed on supported editions of <br \/>&nbsp;&nbsp; Windows 10. Microsoft strongly recommends that customers install<br \/>&nbsp;&nbsp; the updates to be fully protected from the vulnerability. <br \/>&nbsp;&nbsp; Customers whose systems are configured to receive automatic updates <br \/>&nbsp;&nbsp; do not need to take any further action.<br \/>&#8211; Originally posted: July 11, 2017<br \/>&#8211; Updated: September 12, 2017<br \/>&#8211; CVE Severity Rating: Important<br \/>&#8211; Version: 2.0<\/p>\n<p>Security Bulletin Revision Information:<br \/>=====================<\/p>\n<p>MS16-039<\/p>\n<p>&#8211; Title: Security Update for Microsoft Graphics Component (3148522)<br \/>&#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/security-updates\/SecurityBulletins\/2016\/ms16-039?redirectedfrom=MSDN\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/technet.microsoft.com\/library\/security\/ms16-039.aspx<\/a><br \/>&#8211; Reason for Revision: Revised the Microsoft Windows affected software <br \/>&nbsp;&nbsp; table to include Windows 10 Version 1703 for 32-bit Systems and <br \/>&nbsp;&nbsp; Windows 10 Version 1703 for x64-based Systems because they are <br \/>&nbsp;&nbsp; affected by CVE-2016-0165. Consumers running Windows 10 are <br \/>&nbsp;&nbsp; automatically protected. Microsoft recommends that enterprise <br \/>&nbsp;&nbsp; customers running Windows 10 Version 1703 ensure they have update <br \/>&nbsp;&nbsp; 4038788 installed to be protected from this vulnerability.<br \/>&#8211; Originally posted: April 12, 2016<br \/>&#8211; Updated: September 12, 2017<br \/>&#8211; Bulletin Severity Rating: Critical<br \/>&#8211; Version: 4.0<\/p>\n<p>MS16-APR<\/p>\n<p>&#8211; Title: Microsoft Security Bulletin Summary for April 2016<br \/>&#8211; <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms16-APR.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/technet.microsoft.com\/library\/security\/ms16-APR.aspx<\/a><br \/>&#8211; Reason for Revision: For MS16-039, revised the Windows Operating <br \/>&nbsp;&nbsp; Systems and Components affected software table to include Windows 10<br \/>&nbsp;&nbsp; Version 1703 for 32-bit Systems and Windows 10 Version 1703 for <br \/>&nbsp;&nbsp; x64-based Systems because they are affected by CVE-2016-0165. <br \/>&nbsp;&nbsp; Consumers running Windows 10 are automatically protected. Microsoft <br \/>&nbsp;&nbsp; recommends that enterprise customers running Windows 10 Version <br \/>&nbsp;&nbsp; 1703 ensure they have update 4038788 installed to be protected from <br \/>&nbsp;&nbsp; this vulnerability.<br \/>&#8211; Originally posted: April 12, 2016<br \/>&#8211; Updated: September 12, 2017<br \/>&#8211; Bulletin Severity Rating: N\/A<br \/>&#8211; Version: 4.0<\/p>\n<p>MS16-087<\/p>\n<p>&#8211; Title: Security Update for Windows Print Spooler Components (3170005)<br \/>&#8211; <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms16-087.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/technet.microsoft.com\/library\/security\/ms16-087.aspx<\/a><br \/>&#8211; Reason for Revision: To address known issues with the 3170455 update<br \/>&nbsp;&nbsp; for CVE-2016-3238, Microsoft has made available the following updates<br \/>&nbsp;&nbsp; for currently-supported versions of Microsoft Windows:<br \/>&nbsp;&nbsp; Rereleased update 3170455 for Windows Server 2008<br \/>&nbsp;&nbsp; Monthly Rollup 4038777 and Security Update 4038779 for Windows 7 and <br \/>&nbsp;&nbsp; Windows Server 2008 R2<br \/>&nbsp;&nbsp; Monthly Rollup 4038799 and Security Update 4038786 for Windows Server <br \/>&nbsp;&nbsp; 2012<br \/>&nbsp;&nbsp; Monthly Rollup 4038792 and Security Update 4038793 for Windows 8.1 <br \/>&nbsp;&nbsp; and Windows Server 2012 R2<br \/>&nbsp;&nbsp; Cumulative Update 4038781 for Windows 10<br \/>&nbsp;&nbsp; Cumulative Update 4038781 for Windows 10 Version 1511<br \/>&nbsp;&nbsp; Cumulative Update 4038782 for Windows 10 Version 1607 and Windows <br \/>&nbsp;&nbsp; Server 2016.<br \/>&nbsp;&nbsp; Microsoft recommends that customers running Windows Server 2008 <br \/>&nbsp;&nbsp; reinstall update 3170455. Microsoft recommends that customers running <br \/>&nbsp;&nbsp; other supported versions of Windows install the appropriate update. <br \/>&nbsp;&nbsp; See Microsoft Knowledge Base Article 3170005 for more information.<br \/>&#8211; Originally posted: July 12, 2016<br \/>&#8211; Updated: September 12, 2017<br \/>&#8211; Bulletin Severity Rating: Critical<br \/>&#8211; Version: 2.0<\/p>\n<p>MS16-JUL<\/p>\n<p>&#8211; Title: Microsoft Security Bulletin Summary for July 2016<br \/>&#8211; <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms16-JUL.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/technet.microsoft.com\/library\/security\/ms16-JUL.aspx<\/a><br \/>&#8211; Reason for Revision: For MS16-087, To address known issues with the <br \/>&nbsp;&nbsp; 3170455 update for CVE-2016-3238, Microsoft has made available the <br \/>&nbsp;&nbsp; following updates for currently-supported versions of Microsoft Windows:<br \/>&nbsp;&nbsp; Rereleased update 3170455 for Windows Server 2008<br \/>&nbsp;&nbsp; Monthly Rollup 4038777 and Security Update 4038779 for Windows 7 and <br \/>&nbsp;&nbsp; Windows Server 2008 R2<br \/>&nbsp;&nbsp; Monthly Rollup 4038799 and Security Update 4038786 for Windows Server <br \/>&nbsp;&nbsp; 2012<br \/>&nbsp;&nbsp; Monthly Rollup 4038792 and Security Update 4038793 for Windows 8.1 <br \/>&nbsp;&nbsp; and Windows Server 2012 R2<br \/>&nbsp;&nbsp; Cumulative Update 4038781 for Windows 10<br \/>&nbsp;&nbsp; Cumulative Update 4038781 for Windows 10 Version 1511<br \/>&nbsp;&nbsp; Cumulative Update 4038782 for Windows 10 Version 1607 and Windows <br \/>&nbsp;&nbsp; Server 2016.<br \/>&nbsp;&nbsp; Microsoft recommends that customers running Windows Server 2008 <br \/>&nbsp;&nbsp; reinstall update 3170455. Microsoft recommends that customers running <br \/>&nbsp;&nbsp; other supported versions of Windows install the appropriate update. <br \/>&nbsp;&nbsp; See Microsoft Knowledge Base Article 3170005 for more information.<br \/>&#8211; Originally posted: July 12, 2016<br \/>&#8211; Updated: September 12, 2017<br \/>&#8211; Bulletin Severity Rating: N\/A<br \/>&#8211; Version: 2.0<\/p>\n<p>MS16-095<\/p>\n<p>&#8211; Title: Cumulative Security Update for Internet Explorer (3177356)<br \/>&#8211; <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms16-095.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/technet.microsoft.com\/library\/security\/ms16-095.aspx<\/a><br \/>&#8211; Reason for Revision:&nbsp; Revised the Affected Software table to include <br \/>&nbsp;&nbsp; Internet Explorer 11 installed on Windows 10 Version 1703 for 32-bit<br \/>&nbsp;&nbsp; Systems and Internet Explorer 11 installed on Windows 10 Version 1703<br \/>&nbsp;&nbsp; for x64-based Systems because they are affected by CVE-2016-3326. <br \/>&nbsp;&nbsp; Consumers using Windows 10 are automatically protected. Microsoft <br \/>&nbsp;&nbsp; recommends that enterprise customers running Internet Explorer on <br \/>&nbsp;&nbsp; Windows 10 Version 1703 ensure they have update 4038788 installed <br \/>&nbsp;&nbsp; to be protected from this vulnerability. Customers who are running <br \/>&nbsp;&nbsp; other versions of Windows 10 and who have installed the June <br \/>&nbsp;&nbsp; cumulative updates do not need to take any further action.<br \/>&#8211; Originally posted: August 9, 2016<br \/>&#8211; Updated: September 12, 2017<br \/>&#8211; Bulletin Severity Rating: Critical<br \/>&#8211; Version: 3.0<\/p>\n<p>MS16-AUG<\/p>\n<p>&#8211; Title: Microsoft Security Bulletin Summary for August 2016<br \/>&#8211; <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms16-AUG.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/technet.microsoft.com\/library\/security\/ms16-AUG.aspx<\/a><br \/>&#8211; Reason for Revision: For MS16-095, revised the Windows Operating <br \/>&nbsp;&nbsp; System and Components Affected Software table to include Internet <br \/>&nbsp;&nbsp; Explorer 11 installed on Windows 10 Version 1703 for 32-bit Systems <br \/>&nbsp;&nbsp; and Internet Explorer 11 installed on Windows 10 Version 1703 for <br \/>&nbsp;&nbsp; x64-based Systems because they are affected by CVE-2016-3326. Microsoft<br \/>&nbsp;&nbsp; recommends that customers running Internet Explorer on Windows 10<br \/>Version <br \/>&nbsp;&nbsp; 1703 install update 4038788 to be protected from this vulnerability.<br \/>&#8211; Originally posted: August 9, 2016<br \/>&#8211; Updated: September 12, 2017<br \/>&#8211; Bulletin Severity Rating: N\/A<br \/>&#8211; Version: 3.0<\/p>\n<p>MS16-123<\/p>\n<p>&#8211; Title: Security Update for Windows Kernel-Mode Drivers (3192892)<br \/>&#8211; <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms16-123.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/technet.microsoft.com\/library\/security\/ms16-123.aspx<\/a><br \/>&#8211; Reason for Revision: Revised the Affected Software table to include <br \/>&nbsp;&nbsp; Windows 10 Version 1703 for 32-bit Systems and Windows 10 Version 1703<br \/>&nbsp;&nbsp; for x64-based Systems because they are affected by CVE-2016-3376. <br \/>&nbsp;&nbsp; Consumers using Windows 10 are automatically protected. Microsoft <br \/>&nbsp;&nbsp; recommends that enterprise customers running Windows 10 Version 1703 <br \/>&nbsp;&nbsp; ensure they have update 4038788 installed to be protected from this <br \/>&nbsp;&nbsp; vulnerability.<br \/>&#8211; Originally posted: October 11, 2016<br \/>&#8211; Updated: September 12, 2017<br \/>&#8211; Bulletin Severity Rating: Important<br \/>&#8211; Version: 3.0<\/p>\n<p>MS16-OCT<\/p>\n<p>&#8211; Title: Microsoft Security Bulletin Summary for October 2016<br \/>&#8211; <a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms16-OCT.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/technet.microsoft.com\/library\/security\/ms16-OCT.aspx<\/a><a href=\"https:\/\/technet.microsoft.com\/library\/security\/ms16-OCT.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/technet.microsoft.com\/library\/security\/ms16-OCT.aspx<\/a><br \/>&#8211; Reason for Revision: For MS16-123, revised the Windows Operating <br \/>&nbsp;&nbsp; System and Components affected software table to include Windows 10 <br \/>&nbsp;&nbsp; Version 1703 for 32-bit Systems and Windows 10 Version 1703 for <br \/>&nbsp;&nbsp; x64-based Systems because they are affected by CVE-2016-3376. <br \/>&nbsp;&nbsp; Consumers using Windows 10 are automatically protected. Microsoft <br \/>&nbsp;&nbsp; recommends that enterprise customers running Windows 10 Version 1703<br \/>&nbsp;&nbsp; ensure they have update 4038788 installed to be protected from this <br \/>&nbsp;&nbsp; vulnerability.<br \/>&#8211; Originally posted: October 11, 2016<br \/>&#8211; Updated: September 12, 2017<br \/>&#8211; Bulletin Severity Rating: N\/A<br \/>&#8211; Version: 3.0<\/p>\n<p>********************************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: September 14, 2017<br \/>********************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVE has undergone a major revision increment.<\/p>\n<p>* CVE-2017-11767<\/p>\n<p>CVE Revision Information:<br \/>=====================<\/p>\n<p>CVE-2017-11767<\/p>\n<p>&#8211; Title: CVE-2017-11767 | Scripting Engine Memory Corruption <br \/>&nbsp;&nbsp; Vulnerability<br \/>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: CVE-2017-11767 has been added to the <br \/>&nbsp;&nbsp; September 2017 Security Release in conjunction with the <br \/>&nbsp;&nbsp; publication of the 17-09 ChakraCore servicing release. <br \/>&nbsp;&nbsp; See https:\/\/github.com\/Microsoft\/ChakraCore\/commit\/<br \/>&nbsp;&nbsp;&nbsp; for more information.<br \/>&#8211; Originally posted: August 14, 2017&nbsp; <br \/>&#8211; Updated: N\/A <br \/>&#8211; CVE Severity Rating: Critical<br \/>&#8211; Version: 1.0<\/p>\n<p>********************************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: September 19, 2017<br \/>********************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following Defense in Depth Update has undergone a major <br \/>revision increment.<\/p>\n<p>* ADV170015<\/p>\n<p>Revision Information:<br \/>=====================<\/p>\n<p>ADV170015<\/p>\n<p>&#8211; Title: ADV170015 | Microsoft Office Defense in Depth Update<br \/>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: CVE updated to announce that Microsoft is <br \/>&nbsp;&nbsp; replacing KB4011086 for Microsoft Outlook 2007 Service Pack 3 <br \/>&nbsp;&nbsp; with KB401110. Note that you must first uninstall KB4011086 and <br \/>&nbsp;&nbsp; then install KB401110. For more information, see <br \/>&nbsp;&nbsp; <a href=\"https:\/\/support.microsoft.com\/help\/4011110\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/support.microsoft.com\/help\/4011110<\/a>.<br \/>&#8211; Originally posted: September 12, 2017&nbsp; <br \/>&#8211; Updated: September 19, 2017 <br \/>&#8211; CVE Severity Rating: N\/A<br \/>&#8211; Version: 2.0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zum 12. September, zum 14. September sowie zum 19. September 2017 hat Microsoft einige Update-Revisionen vorgenommen. Im Blog-Beitrag gebe ich einen \u00dcberblick \u00fcber diese Revisionen.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[270,185,301],"tags":[672,4322,4315,4325],"class_list":["post-194242","post","type-post","status-publish","format-standard","hentry","category-office","category-update","category-windows","tag-microsoft","tag-office","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/194242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=194242"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/194242\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=194242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=194242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=194242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}