{"id":218404,"date":"2019-05-24T01:12:01","date_gmt":"2019-05-23T23:12:01","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=218404"},"modified":"2023-06-01T00:56:00","modified_gmt":"2023-05-31T22:56:00","slug":"microsoft-security-update-releases-revisions-may-2019","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2019\/05\/24\/microsoft-security-update-releases-revisions-may-2019\/","title":{"rendered":"Microsoft Security Update Releases\/Revisionen Mai 2019"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" title=\"Update\" style=\"border-left-width: 0px; border-right-width: 0px; border-bottom-width: 0px; float: left; margin: 0px 10px 0px 0px; display: inline; border-top-width: 0px\" border=\"0\" alt=\"Windows Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" width=\"54\" align=\"left\" height=\"54\"\/>Im Mai 2019 hat Microsoft Security Update Releases f\u00fcr den 14. und 21. Mai 2019 ver\u00f6ffentlicht. Hier sind die relevanten Informationen.<\/p>\n<p><!--more--><\/p>\n<p>***************************************************************************<br \/><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg01.met.vgwort.de\/na\/e1f1a664f7ca4fcb99dc9614c9bbd706\" width=\"1\" height=\"1\"\/>Title: Microsoft Security Update Releases<br \/>Issued: May 21, 2019<br \/>***************************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2019-0733<br \/>* CVE-2019-0820<br \/>* CVE-2019-0980<br \/>* CVE-2019-0981<\/p>\n<p>&nbsp; <br \/>Revision Information:<br \/>=====================<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20200227075650\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0733\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0733<\/a><br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell Core<br \/>&nbsp;&nbsp; 6.1 and 6.2 because they are affected by CVE-2019-0733. See <br \/>&nbsp;&nbsp; <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/18\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/18<\/a> for more information.<br \/>&#8211; Originally posted: May 14, 2019 <br \/>&#8211; Updated: May 21, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201003175518\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0820\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0820<\/a><br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell Core<br \/>&nbsp;&nbsp; 6.1 and 6.2 because they are affected by CVE-2019-0820. See <br \/>&nbsp;&nbsp; https:\/\/github.com\/PowerShell\/Announcements\/issues\/15 for more information.<br \/>&#8211; Originally posted: May 14, 2019 <br \/>&#8211; Updated: May 21, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201004104543\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0980\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0980<\/a><br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell Core<br \/>&nbsp;&nbsp; 6.1 and 6.2 because they are affected by CVE-2019-0980. See <br \/>&nbsp;&nbsp; <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/16\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/16<\/a> for more information.<br \/>&#8211; Originally posted: May 14, 2019 <br \/>&#8211; Updated: May 21, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-0981\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0981<\/a><br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell Core<br \/>&nbsp;&nbsp; 6.1 and 6.2 because they are affected by CVE-2019-0981. See <br \/>&nbsp;&nbsp; <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/17\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/17<\/a> for more information.<br \/>&#8211; Originally posted: May 14, 2019 <br \/>&#8211; Updated: May 21, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>***************************************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: May 14, 2019<br \/>***************************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVE has undergone a major revision increment:<\/p>\n<p>* CVE-2019-0683<\/p>\n<p>Revision Information:<br \/>=====================<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201005005415\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0683\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0683<\/a><br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: On May 14, 2019, Microsoft released security updates for all <br \/>&nbsp;&nbsp; versions of Microsoft Windows to introduce a new trust flag to add a new safe default<br \/>&nbsp;&nbsp; configuration for CVE-2018-0683, the CVE that addresses the issue described in <br \/>&nbsp;&nbsp; ADV190006. For more information please see <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4490425\/updates-to-tgt-delegation-across-incoming-trusts-in-windows-server\" target=\"_blank\" rel=\"noopener noreferrer\">4490425<\/a>.<br \/>&#8211; Originally posted: March 12, 2019 <br \/>&#8211; Updated: May 14, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>***************************************************************************<br \/>Title: Microsoft Security Advisory Notification<br \/>Issued: May 14, 2019<br \/>***************************************************************************<\/p>\n<p>Security Advisories Released or Updated on May 14, 2019<br \/>============================================================<\/p>\n<p>* Microsoft Security Advisory ADV990001<\/p>\n<p>&#8211; ADV990001 | Latest Servicing Stack Updates<br \/>&#8211;&nbsp; <a href=\"https:\/\/web.archive.org\/web\/20201101085445\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV990001\" target=\"_blank\" rel=\"noopener noreferrer\">ADV990001<\/a><br \/>&#8211; Reason for Revision: A Servicing Stack Update has been released for Windows 10 <br \/>&nbsp;&nbsp; version 1507, Windows 10 version 1607, Windows Server 2016, Windows 10 version <br \/>&nbsp;&nbsp; 1703, Windows 10 version 1709, Windows Server, version 1709, Windows 10 version <br \/>&nbsp;&nbsp; 1803, Windows Server, version 1803, Windows 10 version 1809, Windows Server 2019, <br \/>&nbsp;&nbsp; Windows 10 version 1809 and Windows Server, version 1809. See the FAQ section for<br \/>&nbsp;&nbsp; more information.<br \/>&#8211; Originally posted: November 13, 2018<br \/>&#8211; Updated: May 14, 2019<br \/>&#8211; Version: 8.0<\/p>\n<p>* Microsoft Security Advisory ADV190012<\/p>\n<p>&#8211; ADV190012 | May 2019 Adobe Flash Security Update<br \/>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/de-de\/vulnerability\/ADV190012\" target=\"_blank\" rel=\"noopener noreferrer\">ADV190012<\/a><br \/>&#8211; Reason for Revision: Information published.<br \/>&#8211; Originally posted: May 14, 2019<br \/>&#8211; Updated: N\/A<br \/>&#8211; Version: 1.0<\/p>\n<p>* Microsoft Security Advisory ADV190013<\/p>\n<p>&#8211; ADV190013 | Microsoft Guidance to mitigate Microarchitectural Data Sampling<br \/>&nbsp;&nbsp; vulnerabilities<br \/>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20200916142137\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190013\" target=\"_blank\" rel=\"noopener noreferrer\">ADV190013<\/a><br \/>&#8211; Reason for Revision: Information published.<br \/>&#8211; Originally posted: May 14, 2018<br \/>&#8211; Updated: N\/A<br \/>&#8211; Version: 1.0<\/p>\n<p>* Microsoft Security Advisory ADV190006<\/p>\n<p>&#8211; ADV190006 | Guidance to mitigate unconstrained delegation vulnerabilities<br \/>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/ADV190006\" target=\"_blank\" rel=\"noopener noreferrer\">ADV190006<\/a><br \/>&#8211; Reason for Revision: On May 14, 2019, Microsoft released security updates to <br \/>&nbsp;&nbsp; introduce a new trust flag to add a new safe default configuration for <br \/>&nbsp;&nbsp; CVE-2018-0683, the CVE that addresses the issue described in this vulnerability. <br \/>&nbsp;&nbsp; For more information please see <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4490425\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/support.microsoft.com\/en-us\/help\/4490425\/<\/a><br \/>&nbsp;&nbsp; See CVE-2019-0863 for links to download the updates.<br \/>&#8211; Originally posted: February 12, 2019<br \/>&#8211; Updated: May 14, 2019<br \/>&#8211; Version: 1.3<\/p>\n<p>* Microsoft Security Advisory ADV190009<\/p>\n<p>&#8211; ADV190009 | SHA-2 Code Sign Support Advisory<br \/>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201004024648\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/adv190009\" target=\"_blank\" rel=\"noopener noreferrer\">ADV190009<\/a><br \/>&#8211; Reason for Revision: Microsoft is announcing the availability of the support<br \/>&nbsp;&nbsp; SHA-2 code sign support for Windows Server 2008 Service Pack 2.<br \/>&#8211; Originally posted: March 12, 2019<br \/>&#8211; Updated: May 14, 2019<br \/>&#8211; Version: 2.0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Im Mai 2019 hat Microsoft Security Update Releases f\u00fcr den 14. und 21. Mai 2019 ver\u00f6ffentlicht. Hier sind die relevanten Informationen.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185],"tags":[4315],"class_list":["post-218404","post","type-post","status-publish","format-standard","hentry","category-update","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/218404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=218404"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/218404\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=218404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=218404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=218404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}