{"id":208008,"date":"2018-08-16T02:45:18","date_gmt":"2018-08-16T00:45:18","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=208008"},"modified":"2022-08-22T10:18:58","modified_gmt":"2022-08-22T08:18:58","slug":"microsoft-security-advisory-notification-14-august-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/08\/16\/microsoft-security-advisory-notification-14-august-2018\/","title":{"rendered":"Microsoft Security Advisory Notification (14.\/15. August 2018)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\"\/>Microsoft&nbsp; hat zum 14. und 15. August 2018 mehrere Security Advisory Notification ver\u00f6ffentlicht, die die neu entdeckten Schwachstellen (L1TF) zum Thema haben. <strong>Erg\u00e4nzung:<\/strong> Sicherheitsmitteilungen vom 15. August 2018 hinzugef\u00fcgt.<\/p>\n<p><!--more--><\/p>\n<p>********************************************************************<br \/><strong>Security Advisories Released or Updated on August 14, 2018<br \/><\/strong>********************************************************************<br \/><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg07.met.vgwort.de\/na\/14ea99e9c8494db2a942cc58c7767bdf\" width=\"1\" height=\"1\"\/>* Microsoft Security Advisory ADV180018<\/p>\n<p>&#8211; Title: Microsoft guidance to mitigate L1TF variant<br \/>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">ADV180018<\/a><br \/>&#8211; Reason for Revision: Information published.<br \/>&#8211; Originally posted: August 14, 2018<br \/>&#8211; Updated: N\/A<br \/>&#8211; Version: 1.0<\/p>\n<p>* Microsoft Security Advisory ADV180016<\/p>\n<p>&#8211; Title: Microsoft Guidance for Lazy FP State Restore<br \/>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/ADV180016\" target=\"_blank\" rel=\"noopener\">ADV180016<\/a><br \/>&#8211; Reason for Revision: Microsoft is announcing that the Windows<br \/>&nbsp;&nbsp; security updates released on August 14, 2018 provide mitigations<br \/>&nbsp;&nbsp; for CVE-2018-3665 &#8211; Lazy FP State Restore. These updates are <br \/>&nbsp;&nbsp; available for 32-bit versions of Windows 7 and Windows Server<br \/>&nbsp;&nbsp; 2008. See the Affected Products table to download and install <br \/>&nbsp;&nbsp; the security updates.<br \/>&#8211; Originally posted: June 13, 2018<br \/>&#8211; Updated: August 14, 2018<br \/>&#8211; Version: 4.0<\/p>\n<p>******************************************************************** <\/p>\n<p><strong>Microsoft Security Update Releases August 15, 2018<\/strong><strong><br \/><\/strong>********************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2018-8202<br \/>* CVE-2018-8284<\/p>\n<p>Revision Information:<br \/>=====================<\/p>\n<p> &#8211; CVE-2018-8202 | .NET Framework Elevation of Privilege<br \/>&nbsp;&nbsp; Vulnerability<br \/> &#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/> &#8211; Reason for Revision: Microsoft is releasing the August Monthly<br \/>&nbsp;&nbsp; Rollup, Security Only, and Security Updates to fully resolve known<br \/>&nbsp;&nbsp; issues some customers experienced after installing the July security<br \/>&nbsp;&nbsp; updates for .NET Framework. Customers who installed either the<br \/>&nbsp;&nbsp; Standalone updates or Alternate Cumulative update should also install<br \/>&nbsp;&nbsp; the August updates. See the Affected Products table for links<br \/>&nbsp;&nbsp; to download and install the August updates.<br \/> &#8211; Originally posted: July 10, 2018<br \/> &#8211; Updated: August 15, 2018<br \/> &#8211; Aggregate CVE Severity Rating: Important<br \/> &#8211; Version: 5.0<\/p>\n<p> &#8211; CVE-2018-8284 | .NET Framework Remote Code Injection<br \/>&nbsp;&nbsp; Vulnerability<br \/> &#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/> &#8211; Reason for Revision: Updated the Affected Products to include<br \/>&nbsp;&nbsp; affected versions of Microsoft SharePoint Server, Microsoft<br \/>&nbsp;&nbsp; SharePoint Foundation, Microsoft SharePoint Enterprise Server,<br \/>&nbsp;&nbsp; and Microsoft Project Server. Customers running any of the<br \/>&nbsp;&nbsp; SharePoint products listed in the Affected Products table and<br \/>&nbsp;&nbsp; who are also running any affected versions of .NET Framework<br \/>&nbsp;&nbsp; need to install the security updates for the versions of .NET<br \/>&nbsp;&nbsp; running on their system to be fully protected from this<br \/>&nbsp;&nbsp; vulnerability.<br \/> &#8211; Originally posted: July 10, 2018<br \/> &#8211; Updated: August 14, 2018<br \/> &#8211; Aggregate CVE Severity Rating: Important<br \/> &#8211; Version: 3.0<\/p>\n<p>******************************************************************** <\/p>\n<p><strong>Microsoft Security Advisory Notification August 15, 2018<\/strong><strong><br \/><\/strong>********************************************************************<\/p>\n<p>Security Advisories Released or Updated on August 15, 2018<br \/>======================================================<\/p>\n<p>Das Microsoft Security Advisory ADV180002 sollten sich vor allem Besitzer eines Systems mit AMD-CPUs durchlesen. <\/p>\n<p>* Microsoft Security Advisory ADV180002<\/p>\n<p> &#8211; Title: Guidance to mitigate speculative execution side-channel<br \/>&nbsp;&nbsp; vulnerabilities<br \/> &#8211; <a href=\"https:\/\/web.archive.org\/web\/20201012150049\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180002\" target=\"_blank\" rel=\"noopener\">ADV180002<\/a><br \/> &#8211; Reason for Revision: Updated FAQ #18 to announce that with the<br \/>&nbsp;&nbsp; Windows security updates released on Augus 18, 2918, Microsoft<br \/>&nbsp;&nbsp; is providing the solution for customers with AMD-based devices<br \/>&nbsp;&nbsp; who experienced high CPU utilization after installing the June<br \/>&nbsp;&nbsp; or July security updates and updated microcode from AMD. Microsoft<br \/>&nbsp;&nbsp; recommends that these customers install the August Windows<br \/>&nbsp;&nbsp; secrurity updates and re-enable the Spectre Variant 2 mitigations<br \/>&nbsp;&nbsp; if they were previously disabled. This solution is available in<br \/>&nbsp;&nbsp; the August Windows security updates for: Windows 10 version 1607.<br \/>&nbsp;&nbsp; Windows 10 version 1709. Windows 10 version 1803, Windows 7<br \/>&nbsp;&nbsp; Service Pack 1, Windows Server 2016, Windows Server, version 1709<br \/>&nbsp;&nbsp; (Server Core Installation), Windows Server, version 1803 (Server<br \/>&nbsp;&nbsp; Core Installation), and Windows Server 2008 R2 Service Pack 1.<br \/>&nbsp;&nbsp; The FAQ will be updated as further updates become available.<br \/> &#8211; Originally posted: January 3, 2018<br \/> &#8211; Updated: August 15, 2018<br \/> &#8211; Version: 24.0<\/p>\n<p>* Microsoft Security Advisory ADV180021<\/p>\n<p> &#8211; Title: Microsoft Office Defense in Depth Update<br \/> &#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180021\" target=\"_blank\" rel=\"noopener\">ADV180021<\/a><br \/> &#8211; Reason for Revision: Information published.<br \/> &#8211; Originally posted: August 15, 2018<br \/> &#8211; Updated: N\/A<br \/> &#8211; Version: 1.0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft&nbsp; hat zum 14. und 15. August 2018 mehrere Security Advisory Notification ver\u00f6ffentlicht, die die neu entdeckten Schwachstellen (L1TF) zum Thema haben. Erg\u00e4nzung: Sicherheitsmitteilungen vom 15. August 2018 hinzugef\u00fcgt.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-208008","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/208008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=208008"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/208008\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=208008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=208008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=208008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}