{"id":200904,"date":"2018-02-14T00:08:00","date_gmt":"2018-02-13T23:08:00","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=200904"},"modified":"2023-05-27T00:04:37","modified_gmt":"2023-05-26T22:04:37","slug":"microsoft-patchday-summary-13-februar-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/02\/14\/microsoft-patchday-summary-13-februar-2018\/","title":{"rendered":"Microsoft Patchday Summary 13. Februar 2018"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Windows Update\" width=\"40\" height=\"40\" align=\"left\" border=\"0\" \/>[<a href=\"https:\/\/borncity.com\/win\/2018\/02\/14\/microsoft-patchday-summary-february-13-2018\/\" target=\"_blank\" rel=\"noopener noreferrer\">English<\/a>]Microsoft hat am 13. Februar 2018 eine Reihe Sicherheits-Updates f\u00fcr Windows und andere Produkte freigegeben. Nachfolgend findet sich eine kurze \u00dcbersicht.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/b593a0eeb69d4af68386cba80ad43d9a\" alt=\"\" width=\"1\" height=\"1\" \/>Details zu diesen Sicherheits-Updates finden sich im Microsoft <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener noreferrer\">Security TechCenter<\/a>. Zudem werde ich die Updates in separaten Blog-Beitr\u00e4gen dokumentieren.<\/p>\n<h2>Critical Security Updates<\/h2>\n<p>ChakraCore<br \/>\nMicrosoft Edge<br \/>\nInternet Explorer 9<br \/>\nInternet Explorer 11<br \/>\nWindows 7 for 32-bit Systems Service Pack 1<br \/>\nWindows 7 for x64-based Systems Service Pack 1<br \/>\nWindows Server 2008 for 32-bit Systems Service Pack 2<br \/>\nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core<br \/>\ninstallation)<br \/>\nWindows Server 2008 for Itanium-Based Systems Service Pack 2<br \/>\nWindows Server 2008 for x64-based Systems Service Pack 2<br \/>\nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core<br \/>\ninstallation)<br \/>\nWindows Server 2008 R2 for Itanium-Based Systems Service Pack 1<br \/>\nWindows Server 2008 R2 for x64-based Systems Service Pack 1<br \/>\nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core<br \/>\ninstallation)<br \/>\nWindows 8.1 for 32-bit systems<br \/>\nWindows 8.1 for x64-based systems<br \/>\nWindows RT 8.1<br \/>\nWindows Server 2012<br \/>\nWindows Server 2012 (Server Core installation)<br \/>\nWindows Server 2012 R2<br \/>\nWindows Server 2012 R2 (Server Core installation)<br \/>\nWindows 10 for 32-bit Systems<br \/>\nWindows 10 for x64-based Systems<br \/>\nWindows 10 Version 1511 for 32-bit Systems<br \/>\nWindows 10 Version 1511 for x64-based Systems<br \/>\nWindows 10 Version 1607 for 32-bit Systems<br \/>\nWindows 10 Version 1607 for x64-based Systems<br \/>\nWindows 10 Version 1703 for 32-bit Systems<br \/>\nWindows 10 Version 1703 for x64-based Systems<br \/>\nWindows 10 Version 1709 for 32-bit Systems<br \/>\nWindows 10 Version 1709 for x64-based Systems<br \/>\nWindows Server 2016<br \/>\nWindows Server 2016 (Server Core installation)<br \/>\nWindows Server, version 1709 (Server Core Installation)<br \/>\nMicrosoft Outlook 2007 Service Pack 3<br \/>\nMicrosoft Outlook 2010 Service Pack 2 (32-bit editions)<br \/>\nMicrosoft Outlook 2010 Service Pack 2 (64-bit editions)<br \/>\nMicrosoft Outlook 2013 RT Service Pack 1<br \/>\nMicrosoft Outlook 2013 Service Pack 1 (32-bit editions)<br \/>\nMicrosoft Outlook 2013 Service Pack 1 (64-bit editions)<br \/>\nMicrosoft Outlook 2016 (32-bit edition)<br \/>\nMicrosoft Outlook 2016 (64-bit edition)<br \/>\nMicrosoft Office 2016 Click-to-Run (C2R) for 32-bit editions<br \/>\nMicrosoft Office 2016 Click-to-Run (C2R) for 64-bit editions<\/p>\n<h2>Important Security Updates<\/h2>\n<p>Microsoft Office Word Viewer<br \/>\nMicrosoft Project Server 2013 Service Pack 1<br \/>\nMicrosoft SharePoint Enterprise Server 2016<\/p>\n<h2>Moderate Security Updates<\/h2>\n<p>Internet Explorer 10<\/p>\n<h2>Liste der geschlossenen Sicherheitsl\u00fccken<\/h2>\n<p>Hier noch die Liste (siehe auch <a href=\"https:\/\/web.archive.org\/web\/20180215031800\/https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-february-patch-tuesday-fixes-50-security-issues\/\" target=\"_blank\" rel=\"noopener noreferrer\">hier<\/a>) aller 50 Sicherheitsl\u00fccken, die geschlossen wurden. Details folgen in separaten Artikeln.<\/p>\n<table id=\"tableOfContents\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<th>Tag<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<\/tr>\n<tr>\n<td>Side-Channel<\/td>\n<td>ADV180002<\/td>\n<td>Guidance to mitigate speculative execution side-channel vulnerabilities<\/td>\n<\/tr>\n<tr>\n<td>Adobe Flash Player<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180004\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ADV180004<\/a><\/td>\n<td>February 2018 Adobe Flash Security Update<\/td>\n<\/tr>\n<tr>\n<td>Common Log File System Driver<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20201005114542\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0844\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0844<\/a><\/td>\n<td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Common Log File System Driver<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0846\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0846<\/a><\/td>\n<td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Device Guard<\/td>\n<td>CVE-2018-0827<\/td>\n<td>Windows Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Graphic Fonts<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132036\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0855\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0855<\/a><\/td>\n<td>Windows EOT Font Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Graphic Fonts<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0755\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0755<\/a><\/td>\n<td>Windows EOT Font Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Graphic Fonts<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-0760\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0760<\/a><\/td>\n<td>Windows EOT Font Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Graphic Fonts<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132039\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0761\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0761<\/a><\/td>\n<td>Windows EOT Font Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0866\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0866<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Browsers<\/td>\n<td>CVE-2018-0840<\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0839\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0839<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20201102114337\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0771\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0771<\/a><\/td>\n<td>Microsoft Edge Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132138\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0763\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0763<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132037\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0869\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0869<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0864\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0864<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0852\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0852<\/a><\/td>\n<td>Microsoft Outlook Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0851\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0851<\/a><\/td>\n<td>Microsoft Office Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200916204330\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0850\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0850<\/a><\/td>\n<td>Microsoft Outlook Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132139\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0853\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0853<\/a><\/td>\n<td>Microsoft Office Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132038\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0841\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0841<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td>CVE-2018-0859<\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200509123931\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0860\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0860<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0861\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0861<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200509145112\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0858\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0858<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0836\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0836<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0835\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0835<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td>CVE-2018-0837<\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132137\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0838\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0838<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0856\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0856<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132139\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0857\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0857<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td>CVE-2018-0834<\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0822\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0822<\/a><\/td>\n<td>Windows NTFS Global Reparse Point Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227131942\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0823\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0823<\/a><\/td>\n<td>Named Pipe File System Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200510184305\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0825\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0825<\/a><\/td>\n<td>StructuredQuery Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0828\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0828<\/a><\/td>\n<td>Windows Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132036\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0826\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0826<\/a><\/td>\n<td>Windows Storage Services Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td>CVE-2018-0821<\/td>\n<td>Windows AppContainer Elevation Of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0847\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0847<\/a><\/td>\n<td>Windows Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20201104070354\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0820\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0820<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0831\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0831<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0832\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0832<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td>CVE-2018-0830<\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20201103234406\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0829\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0829<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-0757\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0757<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-0742\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0742<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0756\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0756<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0809\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0809<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td>CVE-2018-0810<\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0843\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0843<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-0842\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0842<\/a><\/td>\n<td>Windows Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows SMB Server<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0833\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2018-0833<\/a><\/td>\n<td>Windows Denial of Service Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Microsoft Security Advisory Notification 13. Februar 2018<\/h2>\n<p>Microsoft Security Advisory ADV180002 Updated on February 13<\/p>\n<p>&#8211; Title: Guidance to mitigate speculative execution side-channel<br \/>\nvulnerabilities<br \/>\n&#8211; https:<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/\">https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/<\/a><br \/>\nadvisory\/ADV180002<br \/>\n&#8211; Reason for Revision: Microsoft has released security updates to<br \/>\nprovide additional protections for the 32-bit (x86) versions of<br \/>\nWindows 10 as follows: 4074596 for Windows 10, 4074591 for Windows<br \/>\n10 Version 1511, 4074590 for Windows 10 Version 1607, and 4074592<br \/>\nfor Windows 10 Version 1703. Microsoft recommends that customers<br \/>\nrunning 32-bit systems install the applicable update as soon as<br \/>\npossible. Microsoft continues to work to provide 32-bit (x86)<br \/>\nprotections for other supported Windows versions but does not<br \/>\nhave a release schedule at this time. These update will be<br \/>\nincluded in subsequent updates, and do not apply to x64<br \/>\n(64-bit) systems. Added a section under Advisory Details to<br \/>\nannounce that Microsoft has released mitigations for Windows<br \/>\nHolographic to Microsoft HoloLens customers that are provided<br \/>\nautomatically as part of the February 2018 Windows Security<br \/>\nUpdate to Windows 10 Version 1607 for HoloLens. HoloLens<br \/>\ncustomers do not need to take any additional action to update<br \/>\ntheir device firmware. Added FAQ#12 and FAQ#13 to provide<br \/>\nfurther information for installing the February 2018<br \/>\nsecurity updates.<\/p>\n<p><strong>\u00c4hnliche Artikel:<br \/>\n<\/strong><a href=\"https:\/\/web.archive.org\/web\/20220819235442\/https:\/\/borncity.com\/blog\/2018\/02\/05\/flash-player-update-28-0-0-161\/\">Adobe Flash Player Update 28.0.0.161<\/a><br \/>\nUpdate KB4074595 (Flash Player) f\u00fcr Windows<br \/>\nFlash Player in Chrome oder Slimjet aktualisieren<br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/02\/10\/microsoft-patchday-schliet-remote-code-execution-lcken\/\">Microsoft Patchday schlie\u00dft Remote Code Execution-L\u00fccken<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/02\/07\/microsoft-office-patchday-6-februar-2018\/\">Microsoft Office Patchday (6. Februar 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/02\/15\/weitere-updates-zum-microsoft-februar-2018-patchday\/\" rel=\"bookmark\">Weitere Updates zum Microsoft Februar 2018-Patchday<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Microsoft hat am 13. Februar 2018 eine Reihe Sicherheits-Updates f\u00fcr Windows und andere Produkte freigegeben. Nachfolgend findet sich eine kurze \u00dcbersicht.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[270,426,185,301],"tags":[4322,4328,4315,4325],"class_list":["post-200904","post","type-post","status-publish","format-standard","hentry","category-office","category-sicherheit","category-update","category-windows","tag-office","tag-sicherheit","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/200904","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=200904"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/200904\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=200904"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=200904"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=200904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}