{"id":205533,"date":"2018-06-14T01:00:43","date_gmt":"2018-06-13T23:00:43","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=205533"},"modified":"2022-08-22T10:20:20","modified_gmt":"2022-08-22T08:20:20","slug":"microsoft-security-update-releases-juni-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/06\/14\/microsoft-security-update-releases-juni-2018\/","title":{"rendered":"Microsoft Security Update Releases (Juni 2018)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>Im Rahmen des Juni 2018-Patchdays (12.6.2018) hat Microsoft auch einige Sicherheitswarnungen aktualisiert bzw. neu herausgegeben. Hier eine unkommentierte \u00dcbersicht, was sich ge\u00e4ndert hat.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/f2ee60aacc554f428b96d5ed34724b4d\" alt=\"\" width=\"1\" height=\"1\" \/>********************************************************************<br \/>\nTitle: Microsoft Security Update Releases<br \/>\nIssued: June 12, 2018<br \/>\n********************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2018-0976<br \/>\n* CVE-2018-1003<br \/>\n* CVE-2018-8136<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>&#8211; CVE-2018-0976 | Windows Remote Desktop Protocol (RDP) Denial of<br \/>\nService Vulnerability<br \/>\n&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Reason for Revision: Microsoft is re-releasing security update<br \/>\n4093227 for all supported versions of Windows Server 2008 Service<br \/>\nPack 2 to address a signing issue experienced by some customers.<br \/>\nCustomers should reinstall this new update.<br \/>\n&#8211; Originally posted: April 10, 2018<br \/>\n&#8211; Updated: June 12, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<br \/>\n&#8211; Version: 2.0<\/p>\n<p>&#8211; CVE-2018-1003 | Microsoft JET Database Engine Remote Code<br \/>\nExecution Vulnerability<br \/>\n&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Reason for Revision: Revised the Affected Products table to<br \/>\ninclude Windows 10 Version 1803 for 32-bit System, Windows 10<br \/>\nVersion 1803 for x64-based Systems, and Windows Server<br \/>\nversion 1803 (Server Core installation) because they are<br \/>\naffected by CVE-2018-1003. Microsoft recommends that<br \/>\ncustomers running Windows 10 Version 1803 install update<br \/>\n4284835 to be protected from this vulnerability.<br \/>\n&#8211; Originally posted: April 10, 2018<br \/>\n&#8211; Updated: June 12, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<br \/>\n&#8211; Version: 2.0<\/p>\n<p>&#8211; CVE-2018-8136 | Windows Remote Code Execution Vulnerability<br \/>\n&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Reason for Revision: CVE revised to announce the availability<br \/>\nof security update 4130956 for Windows Server 2008. See<br \/>\nMicrosoft Knowledge Base Article 4130956 for more information.<br \/>\n&#8211; Originally posted: May 5, 2018<br \/>\n&#8211; Updated: June 12, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Low<br \/>\n&#8211; Version: 2.0<\/p>\n<p>********************************************************************<br \/>\nTitle: Microsoft Security Advisory Notification<br \/>\nIssued: June 12, 2018<br \/>\n********************************************************************<\/p>\n<p>Security Advisories Released or Updated on June 12, 2018<br \/>\n===================================================================<\/p>\n<p>* Microsoft Security Advisory 4338110<\/p>\n<p>&#8211; Title: Microsoft guidance for CBC Symmetric Encryption Security<br \/>\nFeature Bypass<br \/>\n&#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/security-updates\/securityadvisories\/2018\/4338110\" target=\"_blank\" rel=\"noopener\">https:\/\/docs.microsoft.com\/en-us\/security-updates\/securityadvisories\/2018\/4338110<\/a><br \/>\n&#8211; Reason for Revision: Information published.<br \/>\n&#8211; Originally posted: June 12, 2018<br \/>\n&#8211; Version: 1.0<\/p>\n<p>* Microsoft Security Advisory 180002<\/p>\n<p>&#8211; Title: Guidance to mitigate speculative execution side-channel<br \/>\nvulnerabilities<br \/>\n&#8211; https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180002<br \/>\n&#8211; Reason for Revision: Updated FAQ #15 to announce that the<br \/>\nfollowing security updates provide addtional mitigations for AMD<br \/>\nprocessors for CVE-2017-5715: 1. Security update 4284874 for<br \/>\nWindows 10 Version 1703 &#8211; see <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4103723\/\" target=\"_blank\" rel=\"noopener\">KB4103723<\/a> for more information.<br \/>\n2. Security update 4284860 for Windows 10 &#8211; see <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4284860\/\" target=\"_blank\" rel=\"noopener\">KB4284860<\/a> for<br \/>\nmore information.<br \/>\n3. Security update 4284826\u00a0\u00a0\u00a0 (monthly rollup) or 4284867<br \/>\n(security only) for Windows 7, Windows Server 2008 R2, or<br \/>\nWindows Server 2008 R2 (Server Core\u00a0 installation) \u2013 see<br \/>\n<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4284826\/\" target=\"_blank\" rel=\"noopener\">KB4284826<\/a> or <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4284867\/\" target=\"_blank\" rel=\"noopener\">KB4284867<\/a> for more information.<br \/>\n&#8211; Originally posted: January 3, 2018<br \/>\n&#8211; Updated: June 12, 2018<br \/>\n&#8211; Version: 20.0<\/p>\n<p>* Microsoft Security Advisory 180012<\/p>\n<p>&#8211; Title: Microsoft Guidance for Speculative Store Bypass<br \/>\n&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV180012\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180012<\/a><br \/>\n&#8211; Reason for Revision: Microsoft is announcing that the Windows<br \/>\nsecurity updates released on June 12, 2018 include support for<br \/>\nSpeculative Store Bypass Disable (SSBD) in Intel processors. This<br \/>\nsupport is available for all supported editions of Windows 10,<br \/>\nWindows Server 2016, Windows 7, and Windows Server 2008 R2. See<br \/>\nthe Affected Products table for the security updates. The<br \/>\nRecommended Actions section of this advisory has been updated<br \/>\nto include steps for applying updates to mitigate CVE-2018-3639 &#8211;<br \/>\nSpeculative Store Bypass (SSB), Variant 4. In addtion, revisions<br \/>\nhave been made to the FAQ section to address questions about<br \/>\nperformance implications of these updates and of SSBD.<br \/>\n&#8211; Originally posted: May 21, 2018<br \/>\n&#8211; Updated: June 12, 2018<br \/>\n&#8211; Version: 2.0<\/p>\n<p>********************************************************************<br \/>\nTitle: Microsoft Security Advisory Notification<br \/>\nIssued: June 13, 2018<br \/>\n********************************************************************<\/p>\n<p>Security Advisories Released or Updated on June 13, 2018<br \/>\n=====================================================<br \/>\n* Microsoft Security Advisory 180016<\/p>\n<p>&#8211; Title: Microsoft Guidance for Lazy FP State Restore<br \/>\n&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV180016\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180016<\/a><br \/>\n&#8211; Reason for Revision: Information published.<br \/>\n&#8211; Originally posted: June 13, 2018<br \/>\n&#8211; Updated: N\/A<br \/>\n&#8211; Version: 1.0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Im Rahmen des Juni 2018-Patchdays (12.6.2018) hat Microsoft auch einige Sicherheitswarnungen aktualisiert bzw. neu herausgegeben. Hier eine unkommentierte \u00dcbersicht, was sich ge\u00e4ndert hat.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-205533","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/205533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=205533"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/205533\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=205533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=205533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=205533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}