{"id":209359,"date":"2018-09-16T01:14:09","date_gmt":"2018-09-15T23:14:09","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=209359"},"modified":"2022-08-22T10:19:06","modified_gmt":"2022-08-22T08:19:06","slug":"microsoft-security-advisories-und-update-nderungen","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/09\/16\/microsoft-security-advisories-und-update-nderungen\/","title":{"rendered":"Microsoft Security Advisories und Update-&Auml;nderungen"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/win\/2018\/09\/17\/microsoft-security-advisories-and-update-revisions\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Noch ein Nachtrag von dieser Woche in Sachen Sicherheitshinweise von Microsoft samt \u00c4nderungen an Update-Beschreibungen. Und ein Hinweis auf die\u00a0FragmentSmack-Schwachstelle (CVE-2018-5391).<\/p>\n<p><!--more--><\/p>\n<h2>FragmentSmack-Schwachstelle (CVE-2018-5391)<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg04.met.vgwort.de\/na\/b0ba9d6083fc4fd9ac53168b0292f6a4\" alt=\"\" width=\"1\" height=\"1\" \/>Die Sicherheitswarnung vor der FragmentSmack-Schwachstelle CVE-2018-5391 gab es bereits im August 2018 (siehe <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-bulletin-for-august-2018\/\" target=\"_blank\" rel=\"noopener\">diesen Microsoft-Artikel<\/a>). Die Schwachstelle erm\u00f6glicht es Angreifern eine Denial-of-Service-Attacke auszuf\u00fchren. Damit werden Windows-Systeme in die Knie gezwungen und reagieren nicht mehr.<\/p>\n<p>Die Schwachstelle betrifft alle Versionen von Windows 7 bis 10 (einschlie\u00dflich 8.1 RT), sowie Windows Server 2008, 2012 und 2016. Am 11. September 2018 hat Microsoft Sicherheitsupdates f\u00fcr diverse Windows-Versionen f\u00fcr die FragmentSmack-Schwachstelle CVE-2018-5391 herausgebracht. Diese schlie\u00dfen die Schwachstelle. Eine Liste der Updates findet sich <a title=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">hier<\/a> (nach der CVE suchen). Bei Bleeping Computer gibt es <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/windows-systems-vulnerable-to-fragmentsmack-90s-like-dos-bug\/\" target=\"_blank\" rel=\"noopener\">diesen Beitrag<\/a>, der sich ausgiebiger mit der Thematik auseinander setzt.<\/p>\n<h2>Weitere Sicherheitsnachrichten<\/h2>\n<p>********************************************************************<br \/>\nTitle: Microsoft Security Advisory Notification<br \/>\nIssued: September 11, 2018<br \/>\n********************************************************************<\/p>\n<p>Security Advisories Released or Updated on September 11, 2018<br \/>\n======================================================<\/p>\n<p>* Microsoft Security Advisory ADV180002<\/p>\n<p>&#8211; Title: Guidance to mitigate speculative execution<br \/>\nside-channel vulnerabilities<br \/>\n&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201012150049\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180002\" target=\"_blank\" rel=\"noopener\">ADV180002<\/a><br \/>\n&#8211; Reason for Revision: The following updates have been made:<br \/>\n1. Microsoft has released security update 4457128 for Windows<br \/>\n10 Version 1803 for ARM64-based Systems to provide protection<br \/>\nagainst CVE-2017-5715. See the Affected Products table for links<br \/>\nto download and install the update. Note that this update is also<br \/>\navailable via Windows Update. 2. Added FAQ #19 to explain where<br \/>\ncustomer can find and install ARM64 firmware that address<br \/>\nCVE-2017-5715 &#8211; Branch target injection (Spectre, Variant 2).<br \/>\n&#8211; Originally posted: January 3, 2018<br \/>\n&#8211; Updated: September 11, 2018<br \/>\n&#8211; Version: 25.0<\/p>\n<p>* Microsoft Security Advisory ADV180018<\/p>\n<p>&#8211; Title: Microsoft guidance to mitigate L1TF variant<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">ADV180018<\/a><br \/>\n&#8211; Reason for RevisioMicrosoft is announcing the release of<br \/>\nMonthly Rollup 4458010 and Security Only 4457984 for Windows<br \/>\nServer 2008 to provide additional protections against the<br \/>\nspeculative execution side-channel vulnerability known as L1<br \/>\nTerminal Fault (L1TF) that affects Intel\u00c2\u00ae Core\u00c2\u00ae processors and<br \/>\nIntel\u00c2\u00ae Xeon\u00c2\u00ae processors (CVE-2018-3620 and CVE-2018-3646).<br \/>\nCustomers running Windows Server 2008 should install either<br \/>\n4458010 or 4457984 in addition to Security Update 4341832, which<br \/>\nwas released on August 14, 2018.<br \/>\nSee [<a href=\"https:\/\/cloudblogs.microsoft.com\/windowsserver\/2018\/06\/12\/windows-server-2008-sp2-servicing-changes\/\" target=\"_blank\" rel=\"noopener\">Windows Server 2008 SP2 servicing changes<\/a> ] for<br \/>\nmore information. In addition, a note has been added to FAQ #2<br \/>\nto provide further information regarding enabling the mitigation<br \/>\nfor CVE-2017-5754 (Meltdown).<br \/>\n&#8211; Originally posted: August 14, 2018<br \/>\n&#8211; Updated: September 11, 2018<br \/>\n&#8211; Version: 4.0<\/p>\n<p>********************************************************************<br \/>\nTitle: Microsoft Security Advisory Notification<br \/>\nIssued: September 12, 2018<br \/>\n********************************************************************<br \/>\nSecurity Advisories Released or Updated on September 12, 2018<br \/>\n=======================================================<\/p>\n<p>* Microsoft Security Advisory ADV180022<\/p>\n<p>&#8211; Title: Windows Denial of Service Vulnerability<br \/>\n&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/ADV180022\" target=\"_blank\" rel=\"noopener\">ADV180022<\/a><br \/>\n&#8211; Reason for Revision: Removed FAQ #3 regarding when the security<br \/>\nupdates would be available for this vulnerability. The security<br \/>\nupdates were released on September 9, 2018 at the same time the<br \/>\nadvisory was published; therefore, the FAQ is not applicable. This<br \/>\nis an informational change only.<br \/>\n&#8211; Originally posted: September 11, 2018<br \/>\n&#8211; Updated: September 12, 2018<br \/>\n&#8211; Version: 1.1<\/p>\n<p>********************************************************************<br \/>\nTitle: Microsoft Security Update Releases<br \/>\nIssued: September 11, 2018<br \/>\n********************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVE has undergone a major revision increment:<\/p>\n<p>* CVE-2018-8154<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>&#8211; CVE-2018-8154 | Microsoft Exchange Memory Corruption<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Reason for Revision: To comprehensively address CVE-2018-8154,<br \/>\nMicrosoft has released security update 4458311 for Microsoft<br \/>\nExchange Server 2010 Service Pack 3. Microsoft recommends that<br \/>\nenterprise customers running Microsoft Exchange Server 2010<br \/>\nService Pack 3 ensure that they have update 4458311 installed<br \/>\nto be protected from this vulnerability.<br \/>\n&#8211; Originally posted: May 8, 2018<br \/>\n&#8211; Updated: September 11, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Critical<br \/>\n&#8211; Version: 2.0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Noch ein Nachtrag von dieser Woche in Sachen Sicherheitshinweise von Microsoft samt \u00c4nderungen an Update-Beschreibungen. Und ein Hinweis auf die\u00a0FragmentSmack-Schwachstelle (CVE-2018-5391).<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-209359","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/209359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=209359"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/209359\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=209359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=209359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=209359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}