{"id":223540,"date":"2019-10-15T09:19:15","date_gmt":"2019-10-15T07:19:15","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=223540"},"modified":"2022-05-17T10:22:03","modified_gmt":"2022-05-17T08:22:03","slug":"microsoft-sicherheitshinweise-8-10-oktober-2019","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2019\/10\/15\/microsoft-sicherheitshinweise-8-10-oktober-2019\/","title":{"rendered":"Microsoft Sicherheitshinweise (8.\/10. Oktober 2019)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\"\/>Noch ein Nachtrag von letzter Woche. Microsoft hat zum 8. und 10. Oktober 2019 noch Sicherheitshinweise (Security Advisory) ver\u00f6ffentlicht, welche ich hier mal einstelle. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg01.met.vgwort.de\/na\/1672c7153be34b789eef85e12153fac3\" width=\"1\" height=\"1\"\/>Ein Dokument betrifft die am Patchday (8.10.2019) geschlossenen Schwachstellen in Edge und in der Scripting Engine des IE. Wer die automatischen Updates aktiviert hat, braucht keine weiteren Aktivit\u00e4ten zu unternehmen. Weiterhin geht es um Schwachstellen im Windows 10 Update Assistent. Zu allen Schwachstellen hatte ich hier im Blog separate Beitr\u00e4ge. <\/p>\n<p>************************************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: October 8, 2019<br \/>************************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs and advisory have undergone a major revision increment:<\/p>\n<p>* CVE-2019-1192<br \/>* CVE-2019-1367<br \/>* ADV190001<\/p>\n<p>Revision Information:<br \/>=====================<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/de-de\/vulnerability\/CVE-2019-1192\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-1192<\/a> | Microsoft Browsers Security Feature Bypass Vulnerability<br \/>&#8211;&nbsp; Version: 2.0<br \/>&#8211; Reason for Revision: To comprehensively address CVE-2019-1192, Microsoft has <br \/>&nbsp;&nbsp; released October 2019 security updates for Microsoft Edge installed on supported<br \/>&nbsp;&nbsp; editions of Windows 10; for Internet Explorer 11 installed on all affected versions<br \/>&nbsp;&nbsp; of Window 10, Windows 8.1, Server 2012, and Windows 7; and for Internet Explorer 10 <br \/>&nbsp;&nbsp; installed on Windows Server 2012. Microsoft strongly recommends that customers<br \/>&nbsp;&nbsp; install the updates to be fully protected from the vulnerability. Customers whose<br \/>&nbsp;&nbsp; systems are configured to receive automatic updates do not need to take any<br \/>&nbsp;&nbsp; further action.<br \/>&#8211; Originally posted: August 13, 2019<br \/>&#8211; Updated: October 8, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-1367\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-1367<\/a> | Scripting Engine Memory Corruption Vulnerability<br \/>&#8211; Version: 3.0<br \/>&#8211; Reason for Revision: The October security updates Microsoft is releasing on <br \/>&nbsp;&nbsp; October 8, 2019 address a known printing issue customers might have experienced<br \/>&nbsp;&nbsp; after installing any of the Security Updates, IE Cumulative Updates, or Monthly<br \/>&nbsp;&nbsp; Rollups that were released on September 23 or October 3 for all applicable <br \/>&nbsp;&nbsp; installations of Internet Explorer 9, 10, or 11 on Microsoft Windows. Customers<br \/>&nbsp;&nbsp; who have already installed the updates released on September 23 or October 3 <br \/>&nbsp;&nbsp; should install the October Security Updates to adress any printing issues you might<br \/>&nbsp;&nbsp; have been experiencing. Please see the Security Updates table to download and <br \/>&nbsp;&nbsp; install the October security updates.<br \/>&#8211; Originally posted: September 23, 2019<br \/>&#8211; Updated: October 8, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Critical<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201101085445\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV990001\" target=\"_blank\" rel=\"noopener noreferrer\">ADV990001<\/a> | Latest Servicing Stack Updates<br \/>&#8211;&nbsp; &#8211; Version: 15.0<br \/>&#8211; Reason for Revision: A Servicing Stack Update has been released for all supported <br \/>&nbsp;&nbsp; versions of Windows 10 (including Windows Server 2016 and 2019), Windows 8.1,<br \/>&nbsp;&nbsp; Windows Server 2012 R2 and Windows Server 2012. See the FAQ section for more<br \/>&nbsp;&nbsp; information.<br \/>&#8211; Originally posted: November 13, 2018<br \/>&#8211; Updated: October 8, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Critical<\/p>\n<p>****************************************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: October 10, 2019<br \/>****************************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2019-1316<br \/>* CVE-2019-1378<\/p>\n<p>&nbsp; <br \/>Revision Information:<br \/>=====================<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20200310042158\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1316\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-1316<\/a> | Microsoft Windows Setup Elevation of Privilege Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: The following updates have been made: 1. In the Security <br \/>&nbsp;&nbsp; Updates table, corrected the Download type to \"Setup DU\" and corrected the Download<br \/>&nbsp;&nbsp; and Article links. Please see the FAQ section for more information about Setup DUs.<br \/>&nbsp;&nbsp; 2. Removed Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems as <br \/>&nbsp;&nbsp; they are not affected by this vulnerability. <br \/>&nbsp;&nbsp; 3. Added FAQ to explain Setup DU downloads and how to get these updates.<br \/>&#8211; Originally posted: October 8, 2019<br \/>&#8211; Updated: October 9, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20191021233257\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-1378\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-1378<\/a> | Windows 10 Update Assistant Elevation of Privilege Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: The security update for Windows Update Assistant is now<br \/>&nbsp;&nbsp; available. See the Security Updates table for more information.<br \/>&#8211; Originally posted: October 8, 2019<br \/>&#8211; Updated: October 9, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p><strong>\u00c4hnliche Artikel:<\/strong><br \/><a href=\"https:\/\/borncity.com\/blog\/2019\/10\/12\/sicherheitslcke-im-windows-10-update-assistent\/\">Sicherheitsl\u00fccke im Windows 10 Update Assistent<\/a><br \/><a href=\"https:\/\/borncity.com\/blog\/2019\/10\/09\/patchday-windows-10-updates-8-oktober-2019\/\">Patchday Windows 10-Updates (8. Oktober 2019)<\/a><br \/><a href=\"https:\/\/borncity.com\/blog\/2019\/10\/10\/windows-10-oktober-2019-patchday-startmen-probleme\/\">Windows 10 Oktober 2019-Patchday (Startmen\u00fc-) Probleme<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Noch ein Nachtrag von letzter Woche. Microsoft hat zum 8. und 10. Oktober 2019 noch Sicherheitshinweise (Security Advisory) ver\u00f6ffentlicht, welche ich hier mal einstelle.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4461,426],"tags":[4201,4295,4328],"class_list":["post-223540","post","type-post","status-publish","format-standard","hentry","category-edge","category-sicherheit","tag-edge","tag-internet-explorer","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/223540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=223540"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/223540\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=223540"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=223540"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=223540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}