{"id":220693,"date":"2019-07-17T12:09:38","date_gmt":"2019-07-17T10:09:38","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=220693"},"modified":"2024-01-24T11:25:20","modified_gmt":"2024-01-24T10:25:20","slug":"microsoft-sicherheitshinweise-juli-2019","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2019\/07\/17\/microsoft-sicherheitshinweise-juli-2019\/","title":{"rendered":"Microsoft Sicherheitshinweise Juli 2019"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\"\/>[English]Noch ein kleiner Nachtrag: Microsoft hat im Juli 2019 einige Sicherheitshinweise ver\u00f6ffentlicht, die ich euch nicht vorenthalten m\u00f6chte. Unter anderem gibt es ein Update im PowerShell Core 6.1.5 und 6.2.2 zum Beheben einer Sicherheitsl\u00fccke.<\/p>\n<p><!--more--><\/p>\n<h2>Sicherheitsupdate f\u00fcr PowerShell Core 6.1.5 und 6.2.2<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg05.met.vgwort.de\/na\/7a8decc6ef204676b03bedc6d2d60a12\" width=\"1\" height=\"1\"\/>Zum 16. Juli 2019 hat Microsoft den Sicherheitshinweis <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-1167\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-1167<\/a> mit dem Titel <em>Windows Defender Application Control Security Feature Bypass Vulnerability <\/em>ver\u00f6ffentlicht. Die Information ist mir die Nacht per Mail zugegangen:<\/p>\n<p>Revision Information: CVE-2019-1167&nbsp; <br \/>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-1167\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-1167<\/a><br \/>&#8211; Version: 1.0<br \/>&#8211; Reason for Revision: Information published.<br \/>&#8211; Originally posted: July 16, 2019<br \/>&#8211; Updated: N\/A<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>In der Windows Defender Application Control (WDAC) existiert eine Sicherheitsl\u00fccke, die es einem Angreifer erm\u00f6glichen k\u00f6nnte, die WDAC-Mechanismen zu umgehen. Ein Angreifer, der diese Schwachstelle erfolgreich ausgenutzt hat, k\u00f6nnte den PowerShell Core Constrained Language Mode auf dem Computer umgehen. Weitere Details finden sich in in den im Sicherheitshinweis <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-1167\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-1167<\/a> verlinkten Artikeln.<\/p>\n<p>**************************************************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: July 9, 2019<br \/>**************************************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2019-0683<br \/>* CVE-2019-0998<br \/>* CVE-2019-1072<\/p>\n<p>&nbsp; <br \/>Revision Information:<br \/>=====================<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201005005415\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0683\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0683<\/a><br \/>&#8211; Version: 3.0<br \/>&#8211; Reason for Revision: On July 9, 2019, Microsoft released security updates for all<br \/>&nbsp;&nbsp; versions of Microsoft Windows to set the new trust flag to Yes for CVE-2018-0683, <br \/>&nbsp;&nbsp; the CVE that addresses the issue described in ADV190006. For more information please<br \/>&nbsp;&nbsp; see <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4490425\/updates-to-tgt-delegation-across-incoming-trusts-in-windows-server\" target=\"_blank\" rel=\"noopener noreferrer\">KB4490425<\/a>.<br \/>&#8211; Originally posted: March 12, 2019<br \/>&#8211; Updated: June 11, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20200227070635\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0998\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0998<\/a><br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Information revised to announce the release of a new Windows<br \/>&nbsp;&nbsp; 10 Version 1903 security update (4507453) for CVE-2019-0998. The update adds to <br \/>&nbsp;&nbsp; the original release to comprehensively address CVE-2019-0998. Microsoft <br \/>&nbsp;&nbsp; recommends that customers running the affected software install the security<br \/>&nbsp;&nbsp; update to be fully protected from the vulnerability described in this CVE.<br \/>&#8211; Originally posted: June 11, 2019<br \/>&#8211; Updated: July 9, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20200515230017\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1072\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-1072<\/a><br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Added Team Foundation Server 2010 SP1 (x86) and Team <br \/>&nbsp;&nbsp; Foundation Server 2010 SP1 (x64) to the Security Updates table as there are<br \/>&nbsp;&nbsp; unique security updates for each architecture. Corrected Security Update <br \/>&nbsp;&nbsp; download links for Team Foundation Server 2012 Update 4, Team Foundation Server<br \/>&nbsp;&nbsp; 2013 Update 5, and Azure DevOps Server 2019.0.1. <br \/>&#8211; Originally posted: July 9, 2019<br \/>&#8211; Updated: July 9, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Critical<\/p>\n<p>**************************************************************************************<br \/>Title: Microsoft Security Advisory Notification<br \/>Issued: July 9, 2019<br \/>**************************************************************************************<\/p>\n<p>Security Advisories Released or Updated on July 9, 2019<br \/>======================================================================================<\/p>\n<p>* Microsoft Security Advisory ADV990001<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101085445\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV990001\" target=\"_blank\" rel=\"noopener noreferrer\">ADV990001<\/a> | Latest Servicing Stack Updates<br \/>&#8211; Reason for Revision: A Servicing Stack Update has been released for all supported <br \/>&nbsp;&nbsp; versions of Windows 10, Windows 8.1, Windows Server 2012 R2 and Windows Server <br \/>&nbsp;&nbsp; 2012. See the FAQ section for more information.<br \/>&#8211; Originally posted: November 13, 2018<br \/>&#8211; Updated: July 9, 2019<br \/>&#8211; Version: 11.0<\/p>\n<p>* Microsoft Security Advisory ADV190006<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/ADV190006\" target=\"_blank\" rel=\"noopener noreferrer\">ADV190006<\/a> <\/p>\n<p>| Guidance to mitigate unconstrained delegation vulnerabilities<br \/>&#8211; Reason for Revision: On July 9, 2019, Microsoft released security updates for all<br \/>&nbsp;&nbsp; versions of Microsoft Windows to set the new trust flag to Yes for CVE-2019-0683, <br \/>&nbsp;&nbsp; the CVE that addresses the issue described in ADV190006. For more information<br \/>&nbsp;&nbsp; please see <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4490425\/updates-to-tgt-delegation-across-incoming-trusts-in-windows-server\" target=\"_blank\" rel=\"noopener noreferrer\">KB4490425<\/a>.<br \/>&#8211; Originally posted: February 12, 2019<br \/>&#8211; Updated: July 9, 2019<br \/>&#8211; Version: 1.4<\/p>\n<p>* Microsoft Security Advisory ADV190021<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/ADV190021\" target=\"_blank\" rel=\"noopener noreferrer\">ADV190021<\/a> | Outlook on the web Cross-Site Scripting Vulnerability<br \/>&#8211; Reason for Revision: Information published.<br \/>&#8211; Originally posted: July 9, 2019<br \/>&#8211; Updated: N\/A<br \/>&#8211; Version: 1.0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Noch ein kleiner Nachtrag: Microsoft hat im Juli 2019 einige Sicherheitshinweise ver\u00f6ffentlicht, die ich euch nicht vorenthalten m\u00f6chte. Unter anderem gibt es ein Update im PowerShell Core 6.1.5 und 6.2.2 zum Beheben einer Sicherheitsl\u00fccke.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,301],"tags":[672,4328],"class_list":["post-220693","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-windows","tag-microsoft","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/220693","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=220693"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/220693\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=220693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=220693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=220693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}