{"id":207971,"date":"2018-08-15T13:54:13","date_gmt":"2018-08-15T11:54:13","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=207971"},"modified":"2024-10-04T20:50:15","modified_gmt":"2024-10-04T18:50:15","slug":"microsoft-patchday-weitere-updates-zum-14-august-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/08\/15\/microsoft-patchday-weitere-updates-zum-14-august-2018\/","title":{"rendered":"Microsoft Patchday: Weitere Updates zum 14. August 2018"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Windows Update\" width=\"54\" height=\"54\" align=\"left\" border=\"0\" \/>[English]Zum 14. August 2018 (Patchday) hat Microsoft weitere Updates f\u00fcr den Internet Explorer, Windows Server, etc. freigegeben. In diesem Blog-Beitrag sind Details zu ausgew\u00e4hlten Patches nachgetragen, die in den restlichen, am Artikelende verlinkten, Beitr\u00e4gen nicht enthalten sind.<\/p>\n<p><!--more--><\/p>\n<h2>Allgemeine Hinweise<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/68ffeccc3bd043baaec0aa763ec359d1\" alt=\"\" width=\"1\" height=\"1\" \/>Mit dem August 2018-Patchday hat Microsoft 60 Sicherheitsl\u00fccken (20 sind kritisch, 38 sind als hoch eingestuft) in Windows, Office und anderen Microsoft-Produkten geschlossen. Zwei Schwachstellen werden aktuell angegriffen. Ich erspare mir an dieser Stelle die Auflistung der Details, bei heise.de gibt es <a href=\"https:\/\/www.heise.de\/security\/meldung\/Patchday-Microsoft-Angreifer-attackieren-Internet-Explorer-4137351.html\" target=\"_blank\" rel=\"noopener noreferrer\">einen deutschsprachigen Beitrag<\/a>. Wer Englisch kann, findet bei Talos <a href=\"https:\/\/blog.talosintelligence.com\/2018\/08\/ms-tuesday.html\" target=\"_blank\" rel=\"noopener noreferrer\">eine \u00dcbersicht<\/a> zu den kritischen Sicherheitsl\u00fccken. Und das <a href=\"https:\/\/web.archive.org\/web\/20190216210700\/https:\/\/patchtuesdaydashboard.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">patchtuesdaydashboard.com<\/a> (der Aufruf dauert) enth\u00e4lt ebenfalls eine Auflistung. Die komplette \u00dcbersicht \u00fcber alle Updates von Microsoft findet sich auf <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/894199\/software-update-services-and-windows-server-update-services-changes-in\" target=\"_blank\" rel=\"noopener noreferrer\">dieser Webseite<\/a>. Ein Teil der dort genannten Updates ist in separaten Blog-Beitr\u00e4gen beschrieben (siehe Linkliste am Artikelende).<\/p>\n<h2>Sicherheitsupdates<\/h2>\n<p>Es wurden folgende Sicherheitsupdates freigegeben.<\/p>\n<ul>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4338380\" target=\"_blank\" rel=\"noopener noreferrer\">KB4338380<\/a>: Security Update for Windows Server 2008, Description of the security update for the Windows kernel information disclosure vulnerability in Windows Server 2008 (<a href=\"https:\/\/web.archive.org\/web\/20201031032115\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-8348\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-8348<\/a>).<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4340937\" target=\"_blank\" rel=\"noopener noreferrer\">KB4340937<\/a>: Security Update for Windows Server 2008 and Windows XP Embedded; Description of the security update for the remote code execution vulnerability in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 (CVE-2018-8339, CVE-2018-8349).<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4340939\" target=\"_blank\" rel=\"noopener noreferrer\">KB4340939<\/a>: Security Update for Windows Server 2008; Sicherheitsupdate f\u00fcr die Remotecodeausf\u00fchrung in Windows Server 2008 (CVE-2018-8346, <a href=\"https:\/\/web.archive.org\/web\/20200605091738\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8345\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-8345<\/a>)<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4341832\" target=\"_blank\" rel=\"noopener noreferrer\">KB4341832<\/a>: Security Update for Windows Server 2008; Sicherheitsupdates f\u00fcr die Variante L1TF Sicherheitsl\u00fccken in Windows Server 2008<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/4343205\" target=\"_blank\" rel=\"noopener noreferrer\">KB4343205<\/a>: Kumulatives Sicherheitsupdate f\u00fcr Internet Explorer f\u00fcr Windows 7 bis Windows 10 und die Server-Pendats. Die geschlossenen Schwachstellen werden wohl bereits angegriffen.<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4343674\" target=\"_blank\" rel=\"noopener noreferrer\">KB4343674<\/a>: Security Update for Windows Server 2008 and Windows XP Embedded;\u00a0 Sicherheitsupdates f\u00fcr die GDI-Sicherheitsl\u00fccken in Windows Server 2008, Windows Embedded POSReady 2009 und Windows Embedded Standard 2009.<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4343896\" target=\"_blank\" rel=\"noopener noreferrer\">KB4343896<\/a>: Security Only Quality Update for Windows Embedded 8 Standard and Windows Server 2012 (L1 Terminal Fault (L1TF) und Lazy Floating Point (FP)).<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4343901\" target=\"_blank\" rel=\"noopener noreferrer\">KB4343901<\/a>: Security Monthly Quality Rollup for Windows Embedded 8 Standard and Windows Server 2012 (L1 Terminal Fault (L1TF) und Lazy Floating Point (FP)).<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4343902\" target=\"_blank\" rel=\"noopener noreferrer\">KB4343902<\/a>: Security Update for Adobe Flash Player for Windows 8.1\/10 und Server Varianten sowie f\u00fcr Windows 8.1 RT.<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4344104\" target=\"_blank\" rel=\"noopener noreferrer\">KB4344104<\/a>: Security Update for Windows Server 2008 and Windows XP Embedded; Sicherheitsupdates f\u00fcr die Schriftart Bibliothek Schwachstelle in Windows Server 2008, Windows Embedded POSReady 2009 und Windows Embedded Standard 2009<\/li>\n<\/ul>\n<p>F\u00fcr die nachfolgenden .NET Framework-Updates sind die Links in die betreffenden KB-Artikel teilweise gebrochen.<\/p>\n<ul>\n<li>KB4344159: Security Only Update for .NET Framework 4.0 on WES09 and POSReady 2009<\/li>\n<li>KB4344180: Security Only Update for .NET Framework 2.0 on WES09 and POSReady<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/4345590\" target=\"_blank\" rel=\"noopener noreferrer\">KB4345590<\/a>: Security and Quality Rollup for .NET Framework 3.5.1 on Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/4345591\" target=\"_blank\" rel=\"noopener noreferrer\">KB4345591<\/a>: Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows Embedded 8 Standard and Windows Server 2012<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/4345592\" target=\"_blank\" rel=\"noopener noreferrer\">KB4345592<\/a>: Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/4345593\" target=\"_blank\" rel=\"noopener noreferrer\">KB4345593<\/a>: Security and Quality Rollup for .NET Framework 2.0, 3.0, 4.5.2, 4.6 for Windows Server 2008<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/4345679\" target=\"_blank\" rel=\"noopener noreferrer\">KB4345679<\/a>: Security Only Update for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/4345680\" target=\"_blank\" rel=\"noopener noreferrer\">KB4345680<\/a>: Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows Embedded 8 Standard and Windows Server 2012<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/4345681\" target=\"_blank\" rel=\"noopener noreferrer\">KB4345681<\/a>: Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1 and Windows Server 2012 R2<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/4345682\" target=\"_blank\" rel=\"noopener noreferrer\">KB4345682<\/a>: Security Only Update for .NET Framework 2.0, 3.0, 4.5.2, 4.6 for Windows Server 2008<\/li>\n<\/ul>\n<h2>Nicht sicherheitsrelevante Updates<\/h2>\n<ul>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/4339284\" target=\"_blank\" rel=\"noopener noreferrer\">KB4339284<\/a>: Update for WES09 and POSReady 2009; Zeitzone und Sommerzeit \u00c4nderungen in Windows Nordkorea<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/890830\" target=\"_blank\" rel=\"noopener noreferrer\">KB890830<\/a>: Windows Malicious Software Removal Tool &#8211; August 2018<\/li>\n<\/ul>\n<h2>Inoffizielle Updates f\u00fcr Windows Vista<\/h2>\n<p>Wer noch mit Windows Vista unterwegs ist, kann sie die Updates f\u00fcr Windows Server 2008 ziehen und diese installieren. Die Liste der passenden Updates ist in <a href=\"https:\/\/borncity.com\/blog\/2017\/06\/23\/tipp-updates-fr-windows-vista-nach-supportende\/#comment-61389\" target=\"_blank\" rel=\"noopener noreferrer\">diesem Kommentar<\/a> zu finden. Der Beitrag, zu dem der Kommentar gepostet wurde, erkl\u00e4rt die Details.<\/p>\n<p><strong>\u00c4hnliche Artikel:<br \/>\n<\/strong><a href=\"https:\/\/web.archive.org\/web\/20240222171800\/https:\/\/borncity.com\/blog\/2018\/08\/14\/sicherheitsupdate-fr-adobe-acrobat-reader\/\">Sicherheitsupdate f\u00fcr Adobe Acrobat\/Reader<\/a><br \/>\nAdobe Flash Player: Update Version 30.0.0.154<br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/08\/microsoft-office-patchday-7-august-2018\/\">Microsoft Office Patchday (7. August 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/10\/windows10-updates-kb4295110-kb4023057-9-8-2018\/\">Windows 10 Updates KB4295110\/KB4023057 (9.8.2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/14\/microsoft-security-update-summary-14-august-2018\/\">Microsoft Security Update Summary 14. August 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/15\/patchday-updates-fr-windows-7-8-1-server-14-august-2018\/\">Patchday: Updates f\u00fcr Windows 7\/8.1\/Server 14. August 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/15\/patchday-windows-10-updates-14-august-2018\/\">Patchday Windows 10-Updates (14. August 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/15\/patchday-microsoft-office-updates-14-august-2018\/\">Patchday Microsoft Office Updates (14. August 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/08\/15\/microsoft-patchday-weitere-updates-zum-14-august-2018\/\">Microsoft Patchday: Weitere Updates zum 14. August 2018<\/a><\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20240303035929\/https:\/\/borncity.com\/blog\/2018\/08\/15\/foreshadow-co-neue-spectre-hnliche-cpu-schwachstellen\/\">Foreshadow (L1TF), neue (Spectre-\u00e4hnliche) CPU-Schwachstellen<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Zum 14. August 2018 (Patchday) hat Microsoft weitere Updates f\u00fcr den Internet Explorer, Windows Server, etc. freigegeben. In diesem Blog-Beitrag sind Details zu ausgew\u00e4hlten Patches nachgetragen, die in den restlichen, am Artikelende verlinkten, Beitr\u00e4gen nicht enthalten sind.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,185,301],"tags":[5260,4295,4328,4315,3288],"class_list":["post-207971","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-update","category-windows","tag-net-framework","tag-internet-explorer","tag-sicherheit","tag-update","tag-windows-en"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/207971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=207971"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/207971\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=207971"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=207971"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=207971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}