{"id":207193,"date":"2018-08-02T08:07:19","date_gmt":"2018-08-02T06:07:19","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=207193"},"modified":"2022-08-22T10:19:38","modified_gmt":"2022-08-22T08:19:38","slug":"microsoft-security-update-releases-notifications-2-8-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/08\/02\/microsoft-security-update-releases-notifications-2-8-2018\/","title":{"rendered":"Microsoft Security Update Releases\/Notifications (1.8.2018)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/win\/2018\/08\/02\/microsoft-security-update-releases-notifications-08-01-2018\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Zum 1. August 2018 hat Microsoft die Revision-Mitteilungen <em>Microsoft Security Update Releases<\/em> f\u00fcr CVE-2018-8172 und CVE-2018-8202 sowie <em>Microsoft Security Advisory Notification<\/em> (mit Hinweisen zu Spectre-Patches)ver\u00f6ffentlicht. Hier die Details.<\/p>\n<p><!--more--><\/p>\n<p>********************************************************************<br \/>\nTitle: Microsoft Security Update <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/3794ba6b73bf45169bb54e122e32ab29\" alt=\"\" width=\"1\" height=\"1\" \/>Releases<br \/>\nIssued: August 1, 2018<br \/>\n********************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2018-8172<br \/>\n* CVE-2018-8202<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>&#8211; CVE-2018-8172 | Visual Studio Remote Code Execution<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Reason for Revision: Revised the Affected Products table to<br \/>\ninclude Expression Blend 3 Service Pack 1 and Expression Blend<br \/>\n2 Service Pack 2 because they are also affected by this<br \/>\nvulnerability. Microsoft recommends that customers running<br \/>\neither of these versions of Expression Blend install the<br \/>\nupdate to be fully protected from this vulnerability.<br \/>\n&#8211; Originally posted: July 10, 2018<br \/>\n&#8211; Updated: July 31, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<br \/>\n&#8211; Version: 2.0<\/p>\n<p>&#8211; CVE-2018-8202 | .NET Framework Elevation of Privilege<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Reason for Revision: Microsoft is announcing the release of<br \/>\nupdates, available via the Microsoft Update catalog, to resolve<br \/>\nknown issues some customers experienced after installing the<br \/>\nJuly 2018 security updates for .NET Framework. Microsoft<br \/>\nrecommends that customers who experienced application errors as<br \/>\ndescribed in KB4345913<br \/>\n(https:\/\/support.microsoft.com\/en-us\/help\/4345913) install the<br \/>\napplicable Standalone update for your system. Customers running<br \/>\nWindow 10 Version 1607 or Windows Server 2016 should install<br \/>\nCumulative update 4346877 to resolve application errors. See<br \/>\nthe Affected Products table for links to download and install<br \/>\nthe updates.<br \/>\n&#8211; Originally posted: July 10, 2018<br \/>\n&#8211; Updated: July 31, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<br \/>\n&#8211; Version: 4.0<\/p>\n<p>\u00dcber den letztgenannten Punkt hatte ich im Beitrag <a href=\"https:\/\/borncity.com\/blog\/2018\/07\/31\/net-framework-updates-30-juli-2018-mit-fixes\/\">.NET-Framework-Updates 30. Juli 2018 mit Fixes<\/a> berichtet. Das zweite Dokument betrifft Hinweise f\u00fcr die Spectre-Patches:<\/p>\n<p>********************************************************************<br \/>\nTitle: Microsoft Security Advisory Notification<br \/>\nIssued: August 1, 2018<br \/>\n********************************************************************<\/p>\n<p>Security Advisories Released or Updated on August 1, 2018<br \/>\n===================================================================<\/p>\n<p>* Microsoft Security Advisory ADV180002<\/p>\n<p>&#8211; Title: Guidance to mitigate speculative execution side-channel<br \/>\nvulnerabilities<br \/>\n&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201012150049\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180002\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180002<\/a><br \/>\n&#8211; Reason for Revision: Added FAQ #18 to address a high CPU<br \/>\nutilization issue some customers with an AMD-based device are<br \/>\nexperiencing after installing the June or July Windows security<br \/>\nupdates or after installing a BIOS update.<br \/>\n&#8211; Originally posted: January 3, 2018<br \/>\n&#8211; Updated: August 1, 2018<br \/>\n&#8211; Version: 23.0<\/p>\n<p>Hier gibt es Probleme (hohe CPU-Auslastung) mit\u00a0Spectre v3a und v4 bei AMD-Prozessoren.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Zum 1. August 2018 hat Microsoft die Revision-Mitteilungen Microsoft Security Update Releases f\u00fcr CVE-2018-8172 und CVE-2018-8202 sowie Microsoft Security Advisory Notification (mit Hinweisen zu Spectre-Patches)ver\u00f6ffentlicht. Hier die Details.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,185],"tags":[672,4328,4315],"class_list":["post-207193","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-update","tag-microsoft","tag-sicherheit","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/207193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=207193"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/207193\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=207193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=207193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=207193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}