{"id":211743,"date":"2018-11-15T00:13:00","date_gmt":"2018-11-14T23:13:00","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=211743"},"modified":"2022-08-22T10:12:56","modified_gmt":"2022-08-22T08:12:56","slug":"microsoft-security-update-releases-advisory-notification","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/11\/15\/microsoft-security-update-releases-advisory-notification\/","title":{"rendered":"Microsoft Security Update Releases\/Advisory Notification"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/win\/2018\/11\/15\/microsoft-security-update-releases-advisory-notification-11-2018\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Kurzer Nachtrag \u2013 zum Patchday (13. November 2018) hat Microsoft auch zwei Dokumente mit Security Update Releases-Informationen und Security Update Advisory Notification freigegeben. <strong>Erg\u00e4nzung:<\/strong> Zum 14. November 2018 wurden weitere Revisionen nachgetragen.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/fe3b5b01e5134808996e2510fe345bb9\" alt=\"\" width=\"1\" height=\"1\" \/>Hier die unmodifizierten Texte. Interessant ist, dass Micrsosoft erstmals eine Liste der Servicing Stack Updates (SSUs) ver\u00f6ffentlicht.<\/p>\n<p>********************************************************************<br \/>\nTitle: <strong>Microsoft Security Advisory Notification<\/strong><br \/>\nIssued: November 13, 2018<br \/>\n********************************************************************<\/p>\n<p>Security Advisories Released or Updated on November 13, 2018<br \/>\n===================================================================<\/p>\n<p>* Microsoft Security Advisory ADV990001<\/p>\n<p>&#8211; Title: <strong>Latest Servicing Stack Updates<\/strong><br \/>\n&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101085445\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV990001\" target=\"_blank\" rel=\"noopener\">ADV990001<\/a><br \/>\n&#8211; Reason for Revision: Information published<br \/>\n&#8211; Originally posted: November 13, 2018<br \/>\n&#8211; Updated: N\/A<br \/>\n&#8211; Version: 1.0<\/p>\n<p>* Microsoft Security Advisory ADV180002<\/p>\n<p>&#8211; Title: <strong>Guidance to mitigate speculative execution<br \/>\nside-channel vulnerabilities<\/strong><br \/>\n&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201012150049\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180002\" target=\"_blank\" rel=\"noopener\">ADV180002<\/a><br \/>\n&#8211; Reason for Revision: The following updates have been made:<br \/>\n1. Added information to FAQ #9 for customers running Windows<br \/>\nServer 2019. 2. Updated FAQ #18 to announce that with the Windows<br \/>\nsecurity updates released on November 13, 2018, Microsoft is<br \/>\nproviding the solution for customers with AMD-based devices who<br \/>\nexperienced high CPU utilization after installing the June or<br \/>\nJuly security updates and updated microcode from AMD. Microsoft<br \/>\nrecommends that these customers install the November Windows<br \/>\nsecurity updates and re-enable the Spectre Variant 2 mitigations<br \/>\nif they were previously disabled. This solution is available in<br \/>\nthe November Windows security updates for: Windows Server 2008,<br \/>\nWindows Server 2012, Windows 8.1, and Windows Server 2012 R2.<br \/>\n3. Added FAQ #20 to address the mitigations for ARM CPUs for<br \/>\nCVE 2017-5715, Branch Target Injection.<br \/>\n&#8211; Originally posted: January 3, 2018<br \/>\n&#8211; Updated: November 13, 2018<br \/>\n&#8211; Version: 26.0<\/p>\n<p>* Microsoft Security Advisory ADV180012<\/p>\n<p>&#8211; Title: <strong>Microsoft Guidance for Speculative Store Bypass<\/strong><br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180012\" target=\"_blank\" rel=\"noopener\">ADV180012<\/a><br \/>\n&#8211; Reason for Revision: The following updates have been made to<br \/>\nthis advisory: 1. Microsoft is announcing that the security<br \/>\nupdates released on November 13, 2018 for all supported versions<br \/>\nof Windows 10, and for Windows Server 2016; Windows Server,<br \/>\nversion 1709; Windows Server, version 1803; and Windows Server<br \/>\n2019 provide protections against the Speculative Store Bypass<br \/>\nvulnerability (CVE-2018-3639) for AMD-based computers. These<br \/>\nprotections are not enabled by default. For Windows client<br \/>\n(IT pro) guidance, follow the instructions in KB4073119.<br \/>\n2. Microsoft is announcing the availability of updates for<br \/>\nSurface Studio and Surface Book that address the Speculative<br \/>\nStore Bypass (SSB) (CVE-2018-3639) vulnerability. See the<br \/>\nAffected Products table for links to download and install the<br \/>\nupdates. See Microsoft Knowledge Base article 4073065 for more<br \/>\ninformation. 3. In the Security Updates table, the Article and<br \/>\nDownload links have been corrected for affected Surface devices.<br \/>\n4. Windows 10 version 1809 and Windows Server 2019 have been<br \/>\nadded to the Security Updates table because they are affected by<br \/>\nthe SSB vulnerability. 5. The Recommended Actions and FAQ<br \/>\nsections have been updated to include information for devices<br \/>\nusing AMD processors.<br \/>\n&#8211; Originally posted: May 21, 2018<br \/>\n&#8211; Updated: November 13, 2018<br \/>\n&#8211; Version: 6.0<\/p>\n<p>* Microsoft Security Advisory ADV180013<\/p>\n<p>&#8211; Title: <strong>Microsoft Guidance for Rogue System Register Read<\/strong><br \/>\n&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV180013\" target=\"_blank\" rel=\"noopener\">ADV180013<\/a><br \/>\n&#8211; Reason for Revision: The following updates have been made to this<br \/>\nadvisory: 1. Microsoft is announcing the availability of updates<br \/>\nfor Surface Book that address the Rogue System Registry Read<br \/>\n(CVE-2018-3640) vulnerability. See the Affected Products table<br \/>\nfor links to download and install the updates. See Microsoft<br \/>\nKnowledge Base article 4073065 for more information.<br \/>\n2. In the Security Updates table, the Article and Download<br \/>\nlinks have been corrected.<br \/>\n&#8211; Originally posted: May 21, 2018<br \/>\n&#8211; Updated: November 13, 2018<br \/>\n&#8211; Version: 5.0<\/p>\n<p>* Microsoft Security Advisory ADV180018<\/p>\n<p>&#8211; Title: <strong>Microsoft guidance to mitigate L1TF variant<\/strong><br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">ADV180018<\/a><br \/>\n&#8211; Reason for Revision: The following updates have been made:<br \/>\n1. Updated the \"Microsoft Windows client customers\" section to<br \/>\nprovide clarification about how the protections for<br \/>\nCVE-2018-5754 and CVE-2018-3620 are related. Customers that<br \/>\nhave disabled the protection for CVE-2017-5754 must re-enable it<br \/>\nto gain protection for CVE-2018-3620 (See FAQ#2).<br \/>\n2. Updated the \"Microsoft Window Server customers\" section to<br \/>\ninclude information for customers running Windows Server 2019.<br \/>\nAdded further clarification to address VBS, Hyper-V, and<br \/>\nHyper-Threading configurations based on the version of Windows<br \/>\nServer. 3. In FAQ 3, added Windows 10 Version 1809 to the list<br \/>\nof Windows versions in which VBS is supported.<br \/>\n&#8211; Originally posted: August 14, 2018<br \/>\n&#8211; Updated: November 13, 2018<br \/>\n&#8211; Version: 5.0<\/p>\n<p>********************************************************************<br \/>\nTitle: <strong>Microsoft Security Update Releases<\/strong><br \/>\nIssued: November 13, 2018<br \/>\n********************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVE been added to the September 2018 Security updates:<\/p>\n<p>* CVE-2018-8529<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>&#8211; CVE-2018-8529 | <strong>Team Foundation Server Remote Code Execution<br \/>\nVulnerability<br \/>\n<\/strong>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Reason for Revision: Information published. CVE-2018-8529 has<br \/>\nbeen added to the September 2018 Security Updates.<br \/>\n&#8211; Originally posted: November 13, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<br \/>\n&#8211; Version: 1.0<\/p>\n<p>********************************************************************<br \/>\nTitle: <strong>Microsoft Security Update Minor Revisions<\/strong><br \/>\nIssued: November 14, 2018<br \/>\n********************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVEs and advisory have undergone a minor revision<br \/>\nincrement:<\/p>\n<p>* CVE-2018-8454<br \/>\n* CVE-2018-8552<br \/>\n* ADV990001<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>&#8211; CVE-2018-8454 | Windows Audio Service Information Disclosure<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/de-de\/vulnerability\/CVE-2018-8454\" target=\"_blank\" rel=\"noopener\">CVE-2018-8454<\/a><br \/>\n&#8211; Reason for Revision: Corrected vulnerability description. This<br \/>\nis an informational change only.<br \/>\n&#8211; Originally posted: November 13, 2018<br \/>\n&#8211; Updated: November 13, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<br \/>\n&#8211; Version: 1.1<\/p>\n<p>&#8211; CVE-2018-8552 | Scripting Engine Memory Corruption<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-8552\" target=\"_blank\" rel=\"noopener\">CVE-2018-8552<\/a><br \/>\n&#8211; Reason for Revision: Corrected the CVE title and description<br \/>\nto address the vulnerability as remote code execution. In the<br \/>\nAffected Products table, corrected the Impact to Remote Code<br \/>\nExecution. This is an informational change only.<br \/>\n&#8211; Originally posted: November 13, 2018<br \/>\n&#8211; Updated: November 14, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<br \/>\n&#8211; Version: 1.1<\/p>\n<p>&#8211; ADV990001 | Latest Servicing Stack Updates<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV990001\" target=\"_blank\" rel=\"noopener\">ADV990001<\/a><br \/>\n&#8211; Reason for Revision: Corrected the link to the Windows Server<br \/>\n2008 Servicing Stack Update. This is an informational change<br \/>\nonly.<br \/>\n&#8211; Originally posted: November 13, 2018<br \/>\n&#8211; Updated: November 14, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: None<br \/>\n&#8211; Version: 1.1<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Kurzer Nachtrag \u2013 zum Patchday (13. November 2018) hat Microsoft auch zwei Dokumente mit Security Update Releases-Informationen und Security Update Advisory Notification freigegeben. Erg\u00e4nzung: Zum 14. November 2018 wurden weitere Revisionen nachgetragen.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-211743","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/211743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=211743"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/211743\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=211743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=211743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=211743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}