{"id":211806,"date":"2018-11-16T18:45:27","date_gmt":"2018-11-16T17:45:27","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=211806"},"modified":"2023-06-01T01:03:07","modified_gmt":"2023-05-31T23:03:07","slug":"microsoft-patchday-weitere-updates-zum-13-november-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/11\/16\/microsoft-patchday-weitere-updates-zum-13-november-2018\/","title":{"rendered":"Microsoft Patchday: Weitere Updates zum 13. November 2018"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Windows Update\" width=\"54\" height=\"54\" align=\"left\" border=\"0\" \/>[English]Zum 13. November 2018 (Patchday) hat Microsoft weitere Updates f\u00fcr den Internet Explorer, Windows Server, etc. freigegeben. In diesem Blog-Beitrag sind die betreffenden Patches nachgetragen, die in den restlichen, am Artikelende verlinkten, Beitr\u00e4gen nicht enthalten sind.<\/p>\n<p><!--more--><\/p>\n<h2>Allgemeine Hinweise<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg08.met.vgwort.de\/na\/b2761dee63f64d889e5f6d13c20bce02\" alt=\"\" width=\"1\" height=\"1\" \/>Mit dem November 2018-Patchday hat Microsoft 63 Sicherheitsl\u00fccken (darunter 0-Day-Fixes f\u00fcr Windows, siehe <a href=\"https:\/\/thehackernews.com\/2018\/11\/microsoft-patch-tuesday-updates.html\" target=\"_blank\" rel=\"noopener\">hier<\/a>) in Windows, Office und anderen Microsoft-Produkten geschlossen. Ich erspare mir an dieser Stelle die Auflistung der Details, bei heise.de gibt es <a href=\"https:\/\/www.heise.de\/security\/meldung\/Patchday-Angreifer-attackieren-Windows-7-4220570.html\" target=\"_blank\" rel=\"noopener\">einen deutschsprachigen Beitrag<\/a> (beachtet den Hinweis auf die Windows 7-Schwachstelle). Wer Englisch kann, findet bei Talos <a href=\"https:\/\/blog.talosintelligence.com\/2018\/11\/microsoft-patch-tuesday-october-2018_13.html\" target=\"_blank\" rel=\"noopener\">eine \u00dcbersicht<\/a> zu den kritischen Sicherheitsl\u00fccken. Weitere Beitr\u00e4ge finden sich <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-patches-windows-zero-day-exploited-in-cyber-attacks\/\" target=\"_blank\" rel=\"noopener\">hier<\/a>, <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-patches-windows-zero-day-used-by-multiple-cyber-espionage-groups\/\" target=\"_blank\" rel=\"noopener\">hier<\/a> und <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-patches-windows-zero-day-exploited-in-cyber-attacks\/\" target=\"_blank\" rel=\"noopener\">hier<\/a>. Die komplette \u00dcbersicht \u00fcber alle Updates von Microsoft findet sich auf <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/894199\/software-update-services-and-windows-server-update-services-2018\" target=\"_blank\" rel=\"noopener\">dieser Webseite<\/a>. Ein Teil der dort genannten Updates ist in separaten Blog-Beitr\u00e4gen beschrieben (siehe Linkliste am Artikelende). Ungepatcht scheint mir die Schwachstelle aus diesem Blog-Beitrag\u00a0<a href=\"https:\/\/borncity.com\/blog\/2018\/10\/24\/windows-10-zero-day-exploit-in-microsoft-data-sharing\/\" rel=\"bookmark\">Windows 10 Zero-Day-Exploit in Microsoft Data Sharing<\/a>.<\/p>\n<h2>Sicherheitsupdates<\/h2>\n<p>Es wurden folgende Sicherheitsupdates freigegeben.<\/p>\n<ul>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4466388\" target=\"_blank\" rel=\"noopener\">KB4466388<\/a>: 2018-11 Security Update for WES09 and POSReady 2009 for x86-based Systems<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4466536\" target=\"_blank\" rel=\"noopener\">KB4466536<\/a>: 2018-11 Cumulative Security Update for Internet Explorer<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4467678\" target=\"_blank\" rel=\"noopener\">KB4467678<\/a>: 2018-11 Security Only Quality Update for Windows Embedded 8 Standard\/Windows Server 2012<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4467689\" target=\"_blank\" rel=\"noopener\">KB4467689<\/a>: 2018-11 Security Update for WES09 and POSReady 2009 for x86-based Systems<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4467694\" target=\"_blank\" rel=\"noopener\">KB4467694<\/a>: 2018-11 Security Update for Adobe Flash Player<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4467700\" target=\"_blank\" rel=\"noopener\">KB4467700<\/a>: 2018-11 Security Only Quality Update for Windows Server 2008<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4467701\" target=\"_blank\" rel=\"noopener\">KB4467701<\/a>: 018-11 Security Monthly Quality Rollup for Windows Embedded 8 Standard<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4467706\" target=\"_blank\" rel=\"noopener\">KB4467706<\/a>: 2018-11 Security Monthly Quality Rollup for Windows Server 2008<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4470118\" target=\"_blank\" rel=\"noopener\">KB4470118<\/a>: 2018-11 Security Update for WES09 and POSReady 2009<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/help\/4470198\" target=\"_blank\" rel=\"noopener\">KB4470198<\/a>: 2018-11 Security Update for WES09 and POSReady 2009<\/li>\n<\/ul>\n<h2>Nicht sicherheitsrelevante Updates<\/h2>\n<p>Zum nachfolgend aufgef\u00fchrten Windows Malicious Software Removal Tool hat Woody Leonhard in einem Tweet etwas geschrieben:<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"de\">\n<p dir=\"ltr\" lang=\"en\">There's a bug in this month's Malicious Software Removal Tool, KB 890830, that requires you to accept a new EULA for (&#8230;checks notes&#8230;) \"Windows XP prerelease code.\" So far the bug's been reported with 32-bit Win7. <a href=\"https:\/\/t.co\/77AxNZ8xxJ\">https:\/\/t.co\/77AxNZ8xxJ<\/a><\/p>\n<p>\u2014 Woody Leonhard (@woodyleonhard) <a href=\"https:\/\/twitter.com\/woodyleonhard\/status\/1063028208432381952?ref_src=twsrc%5Etfw\">15. November 2018<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<ul>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/890830\" target=\"_blank\" rel=\"noopener\">KB890830<\/a>: Windows Malicious Software Removal Tool\u00a0 &#8211; November 2018 update<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/4467240\" target=\"_blank\" rel=\"noopener\">KB4467240<\/a>: 2018-11 Security and Quality Rollup for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/4467241\" target=\"_blank\" rel=\"noopener\">KB4467241<\/a>: 2018-11 Security and Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows Embedded 8 Standard and Windows Server 2012<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/4467242\" target=\"_blank\" rel=\"noopener\">KB4467242<\/a>: 2018-11 Security and Quality Rollup for .NET Framework 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2<\/li>\n<li><a href=\"http:\/\/support.microsoft.com\/kb\/4467243\" target=\"_blank\" rel=\"noopener\">KB4467243<\/a>: 2018-11 Security and Quality Rollup for .NET Framework 2.0, 3.0, 4.5.2, 4.6 on Windows Server 2008<\/li>\n<\/ul>\n<h2>Inoffizielle Updates f\u00fcr Windows Vista<\/h2>\n<p>Wer noch mit Windows Vista unterwegs ist, kann sie die Updates f\u00fcr Windows Server 2008 aus dem Microsoft Update Catalog herunter laden und diese manuell installieren (siehe <a href=\"https:\/\/borncity.com\/blog\/2017\/06\/23\/tipp-updates-fr-windows-vista-nach-supportende\/\">Tipp: Updates f\u00fcr Windows Vista nach Supportende<\/a>).<\/p>\n<p><strong>\u00c4hnliche Artikel:<\/strong><br \/>\n<a href=\"https:\/\/support.microsoft.com\/help\/4092473\">Microsoft Office Patchday (6. November 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/11\/14\/microsoft-security-update-summary-for-november-13-2018\/\">Microsoft Security Update Summary (13. November 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/11\/14\/patchday-updates-fr-windows-7-8-1-server-13-nov-2018\/\">Patchday: Updates f\u00fcr Windows 7\/8.1\/Server 13. Nov. 2018<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/11\/14\/patchday-windows-10-updates-13-november-2018\/\">Patchday Windows 10-Updates (13. November 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/11\/16\/patchday-microsoft-office-updates-13-november-2018\/\">Patchday Microsoft Office Updates (13. November 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2018\/11\/16\/microsoft-patchday-weitere-updates-zum-13-november-2018\/\" rel=\"bookmark\">Microsoft Patchday: Weitere Updates zum 13. November 2018<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Zum 13. November 2018 (Patchday) hat Microsoft weitere Updates f\u00fcr den Internet Explorer, Windows Server, etc. freigegeben. In diesem Blog-Beitrag sind die betreffenden Patches nachgetragen, die in den restlichen, am Artikelende verlinkten, Beitr\u00e4gen nicht enthalten sind.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,185],"tags":[1115,4295,4328,4315,3288],"class_list":["post-211806","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-update","tag-net","tag-internet-explorer","tag-sicherheit","tag-update","tag-windows-en"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/211806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=211806"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/211806\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=211806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=211806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=211806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}