{"id":211875,"date":"2018-11-19T00:31:00","date_gmt":"2018-11-18T23:31:00","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=211875"},"modified":"2021-12-31T17:44:16","modified_gmt":"2021-12-31T16:44:16","slug":"microsoft-aktualisiert-meltdown-spectre-schutzseite","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2018\/11\/19\/microsoft-aktualisiert-meltdown-spectre-schutzseite\/","title":{"rendered":"Microsoft aktualisiert Meltdown\/Spectre-Schutzseite"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\"\/>Microsoft hat ja einige Updates zum Schlie\u00dfen von Spectre- und Meltdown-Schwachstellen ver\u00f6ffentlicht. Jetzt hat man wieder einmal die Informationsseite aktualisiert. <\/p>\n<p><!--more--><\/p>\n<p>Die Webseite <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\/protect-against-speculative-execution-side-channel-vulnerabilities-in\" target=\"_blank\" rel=\"noopener\">Windows client guidance for IT Pros to protect against speculative execution side-channel vulnerabilities<\/a> gilt f\u00fcr <\/p>\n<ul>\n<li>Windows Server 2016 Version 1709<\/li>\n<li>Windows Server 2012 R2 Standard<\/li>\n<li>Windows Server 2012 Standard<\/li>\n<li>Windows Server 2008 R2 Service Pack 1<\/li>\n<li>Windows Server 2008 R2 Standard<\/li>\n<li>Windows Server 2008 Service Pack 2<\/li>\n<li>Windows Server 2008 Foundation<\/li>\n<li>Windows Server 2008 for Itanium-Based Systems<\/li>\n<li>Windows Server 2008 Enterprise without Hyper-V<\/li>\n<li>Windows Server 2008 Enterprise<\/li>\n<li>Windows Server 2008 Datacenter without Hyper-V<\/li>\n<li>Windows Server 2008 DatacenterServers<\/li>\n<li>Windows Server 2016 Datacenter<\/li>\n<li>Windows Server 2016 Essentials<\/li>\n<li>Windows Server 2016 Standard<\/li>\n<li>Windows Server 2016<\/li>\n<li>Windows Server 2008 R2<\/li>\n<li>Windows Server 2008 R2 Datacenter<\/li>\n<li>Windows Server 2008 R2 Enterprise<\/li>\n<li>Windows Server 2008 R2 for Itanium-Based Systems<\/li>\n<li>Windows Server 2008 R2 Foundation<\/li>\n<li>Windows Web Server 2008 R2<\/li>\n<li>Windows 10, version 1803<\/li>\n<li>Windows 10, version 1709<\/li>\n<li>Windows 10, version 1703<\/li>\n<li>Windows 10, version 1607<\/li>\n<li>Windows 10<\/li>\n<li>Windows 7 Service Pack 1<\/li>\n<\/ul>\n<p>und wurde zum 15. November 2018 aktualisiert. So wurden die Registrierungseinstellungen f\u00fcr AMD-CPUs hinzugef\u00fcgt, mit dem man den Schutz vor Meltdown und Spectre ein-\/ausschalten kann:<\/p>\n<table cellspacing=\"0\" cellpadding=\"2\" width=\"640\" border=\"1\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"178\"><strong>CVE<\/strong><\/td>\n<td valign=\"top\" width=\"184\"><strong>Requires CPU microcode\/firmware?<\/strong><\/td>\n<td valign=\"top\" width=\"277\"><strong>Mitigation Default status<\/strong><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"178\">CVE-2018-3639 <\/td>\n<td valign=\"top\" width=\"184\">Intel: Yes<br \/>AMD: No<br \/>ARM: Yes<\/td>\n<td valign=\"top\" width=\"277\">Intel and AMD: Disabled by default. See <u><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV180012\" target=\"_blank\" rel=\"noopener\">ADV180012<\/a><\/u> for more information and this KB article for applicable registry key settings. <\/p>\n<p>ARM: Enabled by default without option to disable.<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>In <u><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV180012\" target=\"_blank\" rel=\"noopener\">ADV180012<\/a><\/u> findet sich dann die Aktualisierung vom 13. November 2018. Den Kollegen von deskmodder.de ist das <a href=\"https:\/\/www.deskmodder.de\/blog\/2018\/11\/17\/microsoft-aktualisiert-die-liste-gegen-spectre-und-meltdown-fuer-amd-und-arm-cpus\/\" target=\"_blank\" rel=\"noopener\">hier<\/a> aufgefallen, die dort ein paar Anmerkungen publiziert haben. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft hat ja einige Updates zum Schlie\u00dfen von Spectre- und Meltdown-Schwachstellen ver\u00f6ffentlicht. Jetzt hat man wieder einmal die Informationsseite aktualisiert.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-211875","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/211875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=211875"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/211875\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=211875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=211875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=211875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}