{"id":199992,"date":"2018-01-22T11:04:31","date_gmt":"2018-01-22T10:04:31","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=199992"},"modified":"2022-08-22T10:20:17","modified_gmt":"2022-08-22T08:20:17","slug":"nachtrag-microsoft-security-update-releases","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/01\/22\/nachtrag-microsoft-security-update-releases\/","title":{"rendered":"Nachtrag: Microsoft Security Update Releases"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\"\/>Zum Wochenstart noch ein kleiner Nachtrag. Microsoft hat Ende letzter Woche mehrere Security Update Releases (also Beschreibungs\u00e4nderungen zu Sicherheitsupdates) freigegeben. Hatte bisher keine Zeit, diese im Blog einzustellen. <\/p>\n<p><!--more--><\/p>\n<h2>Update f\u00fcr AMD wieder verf\u00fcgbar<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/6deebdfc082c4338ba88c4937330f66c\" width=\"1\" height=\"1\"\/>Microsoft hatte die Sicherheitsupdate f\u00fcr AMD-Prozessoren wegen massiver Probleme ja zur\u00fcckgezogen. Das hat sich nun ge\u00e4ndert. Hier die betreffende Meldung.<\/p>\n<p>Title: Microsoft Security Update Releases<br \/>Issued: January 19, 2018<br \/>********************************************************************<\/p>\n<p>Summary<br \/>======= <\/p>\n<p>Security Advisories Updated on January 19<br \/>===================================================================<\/p>\n<p>* Microsoft Security Advisory ADV180002<\/p>\n<p>&#8211; Title: Guidance to mitigate speculative execution side-channel<br \/>&nbsp;&nbsp; vulnerabilities<br \/>&#8211; Link<br \/>&#8211; Reason for Revision: 1 &#8211; Updated FAQ #10 to announce that <br \/>&nbsp;&nbsp; Microsoft has resumed updating all AMD devices with the Windows<br \/>&nbsp;&nbsp; operating system security update to help protect against the <br \/>&nbsp;&nbsp; chipset vulnerabilities known as Spectre and Meltdown. See the <br \/>&nbsp;&nbsp; FAQ for links to information on how to download the update for <br \/>&nbsp;&nbsp; your operating system. Customers with AMD-based devices should <br \/>&nbsp;&nbsp; install the updates to be protected from the vulnerabilities <br \/>&nbsp;&nbsp; discussed in this advisory. 2 &#8211; Added an update to FAQ #7 that <br \/>&nbsp;&nbsp; security update 4073291 is available to provide additional <br \/>&nbsp;&nbsp; protections for the 32-bit (x86) version of Windows 10 Version <br \/>&nbsp;&nbsp; 1709 related to CVE 2017-5754 (Meltdown).<br \/>&#8211; Originally posted: January 3, 2018<br \/>&#8211; Updated: January 19, 2018<br \/>&#8211; Version: 9.0<\/p>\n<h2>Microsoft Office 2016 for Mac<\/h2>\n<p>F\u00fcr Microsoft Office 2016 for Mac wurden einige Sicherheitshinweise \u00fcberarbeitet<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2018-0793<br \/>* CVE-2018-0794<br \/>* CVE-2018-0819<br \/>&nbsp; <br \/>Revision Information:<br \/>=====================<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Microsoft is announcing the availability of the<br \/>&nbsp;&nbsp; 16.9.18011602 update for Microsoft Office 2016 for Mac. Customers<br \/>&nbsp;&nbsp; running affected Mac software should install the update for their<br \/>&nbsp;&nbsp; product to be protected from this vulnerability. Customers running<br \/>&nbsp;&nbsp; other Microsoft Office software do not need to take any action.<br \/>&nbsp;&nbsp; See the Release Notes (https:\/\/go.microsoft.com\/fwlink\/p\/?linkid=831049)<br \/>&nbsp;&nbsp; for more information and download links.<br \/>&#8211; Originally posted: January 9, 2018<br \/>&#8211; Updated: January 18, 2018<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2018-0792<br \/>* CVE-2018-0797<br \/>&nbsp; <br \/>Revision Information:<br \/>=====================<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: To address a known issue with installing security<br \/>&nbsp;&nbsp; update 4011021, Microsoft is announcing the availability of security<br \/>&nbsp;&nbsp; update 4011022 as a replacement. Customers who experienced problems<br \/>&nbsp;&nbsp; installing 4011021 should install 4011022.<br \/>&#8211; Originally posted: January 9, 2018<br \/>&#8211; Updated: January 18, 2018<br \/>&#8211; Aggregate CVE Severity Rating: Critical<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2018-0792<br \/>* CVE-2018-0797<br \/>&nbsp; <br \/>Revision Information:<br \/>=====================<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Version: 3.0<br \/>&#8211; Reason for Revision: Microsoft is announcing the availability of the<br \/>&nbsp;&nbsp; 16.9.18011602 update for Microsoft Office 2016 for Mac. Customers<br \/>&nbsp;&nbsp; running affected Mac software should install the update for their<br \/>&nbsp;&nbsp; product to be protected from this vulnerability. Customers running<br \/>&nbsp;&nbsp; other Microsoft Office software do not need to take any action.<br \/>&nbsp;&nbsp; See the Release Notes (https:\/\/go.microsoft.com\/fwlink\/p\/?linkid=831049)<br \/>&nbsp;&nbsp; for more information and download links.<br \/>&#8211; Originally posted: January 9, 2018<br \/>&#8211; Updated: January 18, 2018<br \/>&#8211; Aggregate CVE Severity Rating: Critical<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zum Wochenstart noch ein kleiner Nachtrag. Microsoft hat Ende letzter Woche mehrere Security Update Releases (also Beschreibungs\u00e4nderungen zu Sicherheitsupdates) freigegeben. Hatte bisher keine Zeit, diese im Blog einzustellen.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-199992","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/199992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=199992"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/199992\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=199992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=199992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=199992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}