{"id":209142,"date":"2018-09-11T22:17:03","date_gmt":"2018-09-11T20:17:03","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=209142"},"modified":"2023-06-01T00:59:37","modified_gmt":"2023-05-31T22:59:37","slug":"microsoft-security-update-summary-11-september-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/09\/11\/microsoft-security-update-summary-11-september-2018\/","title":{"rendered":"Microsoft Security Update Summary 11. September 2018"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Windows Update\" width=\"54\" height=\"54\" align=\"left\" border=\"0\" \/>[English]Zum September-Patchday (11.9.2018) hat Microsoft wieder zahlreiche Sicherheitsupdates f\u00fcr Windows-Clients und \u2013Server, f\u00fcr Office, Visual Studie etc. freigegeben.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg06.met.vgwort.de\/na\/2a5815a351cd42879e13515bf728e333\" alt=\"\" width=\"1\" height=\"1\" \/>Hier eine Gesamt\u00fcbersicht der einzelnen Update. Eine Liste der Updates findet sich <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">auf dieser Microsoft-Seite<\/a>. Details zu den Update-Paketen f\u00fcr Windows, Office etc. wird es in den kommenden Stunden geben.<\/p>\n<h2 class=\"form-control-static flat-bottom ng-binding\">Fix f\u00fcr Windows ALPC-Schwachstelle (CVE-2018-8440)<\/h2>\n<p>K\u00fcrzlich wurde in der Windows Aufgabenplanung eine Schwachstelle\u00a0ALPC Elevation of Privilege-L\u00fccke entdeckt (siehe Links am Artikelende). In allen Updates f\u00fcr Windows ist ein Fix f\u00fcr die\u00a0ALPC Elevation of Privilege-L\u00fccke (CVE-2018-8440) enthalten (siehe <a href=\"https:\/\/web.archive.org\/web\/20200723201503\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8440\" target=\"_blank\" rel=\"noopener\">CVE-2018-8440 Windows ALPC Elevation of Privilege Vulnerability<\/a>.<\/p>\n<blockquote><p>Falls jemand den 0patch-Fix verwendet hat, <a href=\"https:\/\/blog.0patch.com\/2018\/09\/comparing-our-micropatch-with.html\" target=\"_blank\" rel=\"noopener\">hier<\/a>\u00a0geht der Entwickler von opatch darauf ein. Sobald Microsofts Update installiert ist, wird der 0patch eliminiert.<\/p><\/blockquote>\n<h2>Gefixte Sicherheitsl\u00fccken<\/h2>\n<p>Zum September 2018-Patchday hat Microsoft 17 Schwachstellen behoben. Hier eine Kurzliste weiterer CVEs, die gefixt wurden:<\/p>\n<ul>\n<li>CVE-2018-0965: Windows Hyper-V Remote Code Execution Vulnerability is a remote code execution vulnerability in Windows Hyper-V that would allow an attacker to craft a malicious application that could escape the guest virtual machine and execute commands on the host machine.<\/li>\n<li><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8465\" target=\"_blank\" rel=\"noopener\">CVE-2018-8465<\/a>: Chakra Scripting Engine Memory Corruption Vulnerability is a vulnerability is in the Chakra scripting engine in Microsoft Edge that could allow malicious web sites to exploit the vulnerability and\u00a0execute code under the security level of the logged in user.<\/li>\n<li><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8420\" target=\"_blank\" rel=\"noopener\">CVE-2018-8420<\/a>: MS XML Remote Code Execution Vulnerability\u00a0is a vulnerability in the\u00a0Microsoft XML Core Services that could allow an attack to perform remote code execution.<\/li>\n<li>CVE-2018-8461: Internet Explorer Memory Corruption Vulnerabilityis a vulnerability in Internet Explorer 11 that would allow a\u00a0malicious web site to perform remote code execution.<\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-8475\" target=\"_blank\" rel=\"noopener\">CVE-2018-8475<\/a>: Windows Remote Code Execution Vulnerabilityaffects all Windows versions from Windows 10 through Windows Server and could allow an attacker to create a malicious image file that would execute code when opened.<\/li>\n<li><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-8332\" target=\"_blank\" rel=\"noopener\">CVE-2018-8332<\/a>: Win32k Graphics Remote Code Execution Vulnerability affects all Windows versions from Windows 10 through Windows Server that could allow an attacker to create a malicious font, which when viewed could cause remote code execution.<\/li>\n<\/ul>\n<h2>Liste der Sicherheitsupdates<\/h2>\n<p>Critical Security Updates<br \/>\n============================<\/p>\n<p>ChakraCore<br \/>\nWindows Server 2008 for 32-bit Systems Service Pack 2<br \/>\nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core<br \/>\ninstallation)<br \/>\nWindows Server 2008 for Itanium-Based Systems Service Pack 2<br \/>\nWindows Server 2008 for x64-based Systems Service Pack 2<br \/>\nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core<br \/>\ninstallation)<br \/>\nWindows 7 for 32-bit Systems Service Pack 1<br \/>\nWindows 7 for x64-based Systems Service Pack 1<br \/>\nWindows Server 2008 R2 for Itanium-Based Systems Service Pack 1<br \/>\nWindows Server 2008 R2 for x64-based Systems Service Pack 1<br \/>\nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core<br \/>\ninstallation)<br \/>\nWindows Server 2012<br \/>\nWindows Server 2012 (Server Core installation)<br \/>\nWindows 8.1 for 32-bit systems<br \/>\nWindows 8.1 for x64-based systems<br \/>\nWindows RT 8.1<br \/>\nWindows Server 2012 R2<br \/>\nWindows Server 2012 R2 (Server Core installation)<br \/>\nWindows 10 for 32-bit Systems<br \/>\nWindows 10 for x64-based Systems<br \/>\nWindows 10 Version 1607 for 32-bit Systems<br \/>\nWindows 10 Version 1607 for x64-based Systems<br \/>\nWindows 10 Version 1703 for 32-bit Systems<br \/>\nWindows 10 Version 1703 for x64-based Systems<br \/>\nWindows 10 version 1709 for 32-bit Systems<br \/>\nWindows 10 version 1709 for x64-based Systems<br \/>\nWindows 10 Version 1803 for 32-bit Systems<br \/>\nWindows 10 Version 1803 for x64-based Systems<br \/>\nWindows Server 2016<br \/>\nWindows Server 2016 (Server Core installation)<br \/>\nWindows Server, version 1709 (Server Core Installation)<br \/>\nWindows Server, version 1803 (Server Core Installation)<br \/>\nMicrosoft Edge<br \/>\nInternet Explorer 11<br \/>\nMicrosoft .NET Framework 2.0 Service Pack 2<br \/>\nMicrosoft .NET Framework 3.0 Service Pack 2<br \/>\nMicrosoft .NET Framework 3.5<br \/>\nMicrosoft .NET Framework 3.5.1<br \/>\nMicrosoft .NET Framework 4.5.2<br \/>\nMicrosoft .NET Framework 4.6<br \/>\nMicrosoft .NET Framework 4.6.2\/4.7\/4.7.1\/4.7.2<br \/>\nMicrosoft .NET Framework 4.6\/4.6.1\/4.6.2\/4.7\/4.7.1\/4.7.1\/4.7.2<br \/>\nMicrosoft .NET Framework 4.7.1\/4.7.2<br \/>\nMicrosoft .NET Framework 4.7.2<br \/>\nMicrosoft .NET Framework 4.7\/4.7.1\/4.7.2<br \/>\nMicrosoft Office 2016 Click-to-Run (C2R) for 32-bit editions<br \/>\nMicrosoft Office 2016 Click-to-Run (C2R) for 64-bit editions<br \/>\nMicrosoft Office 2016 for Mac<\/p>\n<p>Important Security Updates<br \/>\n============================<\/p>\n<p>.NET Core 2.1<br \/>\nASP.NET Core 2.1<br \/>\nSystem.IO.Pipelines<br \/>\nC SDK for Azure IoT<br \/>\nMicrosoft Excel 2010 Service Pack 2 (32-bit editions)<br \/>\nMicrosoft Excel 2010 Service Pack 2 (64-bit editions)<br \/>\nMicrosoft Excel 2013 RT Service Pack 1<br \/>\nMicrosoft Excel 2013 Service Pack 1 (32-bit editions)<br \/>\nMicrosoft Excel 2013 Service Pack 1 (64-bit editions)<br \/>\nMicrosoft Excel 2016 (32-bit edition)<br \/>\nMicrosoft Excel 2016 (64-bit edition)<br \/>\nMicrosoft Excel Viewer 2007 Service Pack 3<br \/>\nMicrosoft Office Compatibility Pack Service Pack 3<br \/>\nMicrosoft Excel Viewer 2007 Service Pack 3<br \/>\nMicrosoft SharePoint Enterprise Server 2013 Service Pack 1<br \/>\nMicrosoft SharePoint Enterprise Server 2016<br \/>\nMicrosoft SharePoint Server 2010 Service Pack 2<br \/>\nMicrosoft Word 2013 RT Service Pack 1<br \/>\nMicrosoft Word 2013 Service Pack 1 (32-bit editions)<br \/>\nMicrosoft Word 2013 Service Pack 1 (64-bit editions)<br \/>\nMicrosoft Word 2016 (32-bit edition)<br \/>\nMicrosoft Word 2016 (64-bit edition)<br \/>\nMicrosoft.Data.OData<\/p>\n<p>Moderate Security Updates<br \/>\n============================<br \/>\nMicrosoft Lync for Mac 2011<br \/>\nInternet Explorer 9<\/p>\n<p>Low Security Updates<br \/>\n============================<br \/>\nInternet Explorer 10<\/p>\n<p><strong>\u00c4hnliche Artikel:<br \/>\n<\/strong>Adobe Flash Player: Update Version 31.0.0.108<br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/09\/05\/microsoft-office-updates-3-9-2018\/\">Microsoft Office-Updates (4.9.2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/09\/11\/microsoft-security-update-summary-11-september-2018\/\">Microsoft Security Update Summary 11. September 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/?p=209147\">Patchday: Updates f\u00fcr Windows 7\/8.1\/Server 11. Sept. 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/?p=209151\" target=\"_blank\" rel=\"noopener\">Patchday Windows 10-Updates (11. September 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/?p=209214\">Patchday Microsoft Office Updates (11. September 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/09\/13\/microsoft-patchday-weitere-updates-zum-11-september-2018\/\">Microsoft Patchday: Weitere Updates zum 11. September 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/09\/18\/windows-10-updates-kb4464217-und-kb4464218\/\">Windows 10 Updates KB4464217 und KB4464218<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/09\/21\/windows-10-kumulative-updates-20-september-2018\/\">Windows 10: Kumulative Updates (20. September 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/09\/21\/windows-7-8-1-und-server-updates-20-sept-2018\/\">Windows 7\/8.1 und Server: Updates (20 Sept. 2018)<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/blog\/2018\/08\/28\/neue-windows-alpc-zero-day-schwachstelle-entdeckt\/\" rel=\"bookmark\">Neue Windows ALPC Zero-Day-Schwachstelle entdeckt<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/09\/01\/neues-zur-windows-alpc-zero-day-schwachstelle\/\" rel=\"bookmark\">Neues zur Windows ALPC Zero-Day-Schwachstelle<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/09\/06\/windows-alpc-0-day-lcke-wird-durch-malware-ausgenutzt\/\" rel=\"bookmark\">Windows ALPC 0-day-L\u00fccke wird durch Malware ausgenutzt<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Zum September-Patchday (11.9.2018) hat Microsoft wieder zahlreiche Sicherheitsupdates f\u00fcr Windows-Clients und \u2013Server, f\u00fcr Office, Visual Studie etc. freigegeben.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[270,426,185,301],"tags":[4322,1229,4328,4315,3288],"class_list":["post-209142","post","type-post","status-publish","format-standard","hentry","category-office","category-sicherheit","category-update","category-windows","tag-office","tag-patchday","tag-sicherheit","tag-update","tag-windows-en"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/209142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=209142"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/209142\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=209142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=209142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=209142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}