{"id":224794,"date":"2019-11-13T13:24:30","date_gmt":"2019-11-13T12:24:30","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=224794"},"modified":"2024-06-24T20:27:22","modified_gmt":"2024-06-24T18:27:22","slug":"patchday-updates-fr-windows-7-8-1-server-12-nov-2019","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2019\/11\/13\/patchday-updates-fr-windows-7-8-1-server-12-nov-2019\/","title":{"rendered":"Patchday: Updates f&uuml;r Windows 7\/8.1\/Server (12. Nov. 2019)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Windows Update\" width=\"54\" height=\"54\" border=\"0\" \/>[<a href=\"https:\/\/borncity.com\/win\/2019\/11\/13\/patchday-updates-for-windows-7-8-1-server-nov-12-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">English<\/a>]Am 12. November 2019 hat Microsoft diverse (Sicherheits-)Updates f\u00fcr Windows 7 SP1 und weitere Updates f\u00fcr Windows 8.1 sowie die korrespondierenden Server-Versionen freigegeben. Hier der \u00dcberblick \u00fcber diese Updates.<\/p>\n<p><!--more--><\/p>\n<h2>Updates f\u00fcr Windows 7\/Windows Server 2008 R2<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/bbfd7f12d8cd4201b00967e15e48047d\" alt=\"\" width=\"1\" height=\"1\" \/>F\u00fcr Windows 7 SP1 und Windows Server 2008 R2 SP1 wurden ein Rollup und ein Security-only Update freigegeben. Die Update-Historie f\u00fcr Windows 7 ist auf <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4009469\" target=\"_blank\" rel=\"noopener noreferrer\">dieser Microsoft-Seite<\/a> zu finden. Zur Installation ist ein installierter SHA2-Support f\u00fcr die erfolgreiche Installation der Sicherheitsupdates erforderlich.<\/p>\n<h3>KB4525235 (Monthly Rollup) f\u00fcr Windows 7\/Windows Server 2008 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4525235\" target=\"_blank\" rel=\"noopener noreferrer\">KB4525235<\/a> (Monthly Quality Rollup for Windows 7 SP1 and Windows Server 2008 R2 SP1) enth\u00e4lt (neben den Sicherheitsfixes vom Oktober 2019) Verbesserungen und Bug-Fixes und adressiert folgendes:<\/p>\n<ul>\n<li>Addresses an issue that prevents a 16-bit Visual Basic 3 (VB3) application or other VB3 applications from running.<\/li>\n<li>Provides protections against the Intel\u00ae Processor Machine Check Error vulnerability (<u><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-12207\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-12207<\/a><\/u>). Use the registry setting as described in the <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4530989\" target=\"_blank\" rel=\"noopener noreferrer\">Guidance KB article<\/a><em>. <\/em>(This registry setting is disabled by default.)<\/li>\n<li>Provides protections against the Intel\u00ae Transactional Synchronization Extensions (Intel\u00ae TSX) Transaction Asynchronous Abort vulnerability (<a href=\"https:\/\/web.archive.org\/web\/20201006063840\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-11135\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-11135<\/a>). Use the registry settings as described in the <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Client<\/a> and <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Server<\/a> articles<em>. <\/em>(These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.)<\/li>\n<li>Addresses an issue with temporary user profiles in an environment in which user profile disks (UPD) are deployed and cached roaming profiles are not deleted when the \"Delete cached copies of roaming profiles\" policy is enabled.<\/li>\n<li>Security updates to Microsoft Scripting Engine, Windows Input and Composition, Microsoft Graphics Component, Windows Cryptography, Windows Virtualization, Windows Kernel, Windows Datacenter Networking, and the Microsoft JET Database Engine.<\/li>\n<\/ul>\n<p>Dieses Update wird automatisch per Windows Update heruntergeladen und installiert. Das Paket ist aber auch per <a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4525235\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Update Catalog<\/a> erh\u00e4ltlich und wird per WSUS verteilt. Die Installation erfordert, dass das SSU (<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4490628\" target=\"_blank\" rel=\"noopener noreferrer\">KB4490628<\/a> vom M\u00e4rz 2019 und das SHA-2 Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4474419\" target=\"_blank\" rel=\"noopener noreferrer\">KB4474419<\/a> vom 10. September 2019) bereits installiert ist. Bei Installation per Windows Update wird dieses automatisch installiert. Nach der Update-Installation empfiehlt Microsoft das SSU <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4523206\" target=\"_blank\" rel=\"noopener noreferrer\">KB4523206<\/a> zu installieren (sofern noch nicht vorhanden). Dieses SSU wurde zum 12. November 2019 ver\u00f6ffentlicht und bringt Verbesserungen beim Service Stack.<\/p>\n<blockquote><p>Seit August 2019 muss das SHA-2-Update (<a href=\"https:\/\/support.microsoft.com\/de-de\/help\/4474419\/sha-2-code-signing-support-update\">KB4474419<\/a>) vor der Installation dieses Sicherheitsupdates installiert werden. Denn dieses Update wird nur noch per SHA-2 Code Signing f\u00fcr Windows Update und WSUS ausgeliefert. Microsoft hat zum 8. Oktober 2019 eine Aktualisierung vorgenommen. Das Update sollte automatisch aktualisiert werden.<\/p><\/blockquote>\n<p>F\u00fcr dieses Update f\u00fchrt Microsoft keine bekannten Problem auf.<\/p>\n<h3>KB4525233 (Security Only) f\u00fcr Windows 7\/Windows Server 2008 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4525233\/\" target=\"_blank\" rel=\"noopener noreferrer\">KB4525233<\/a> (Security-only update) steht f\u00fcr Windows 7 SP1 und Windows Server 2008 R2 SP1 zur Verf\u00fcgung. Das Update adressiert folgende Punkte.<\/p>\n<ul>\n<li>Provides protections against the Intel\u00ae Processor Machine Check Error vulnerability (<u><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-12207\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-12207<\/a><\/u>). Use the registry setting as described in the <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4530989\" target=\"_blank\" rel=\"noopener noreferrer\">Guidance KB article<\/a><em>. <\/em>(This registry setting is disabled by default.)<\/li>\n<li>Provides protections against the Intel\u00ae Transactional Synchronization Extensions (Intel\u00ae TSX) Transaction Asynchronous Abort vulnerability (<a href=\"https:\/\/web.archive.org\/web\/20201006063840\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-11135\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-11135<\/a>). Use the registry settings as described in the <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Client<\/a> and <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Server<\/a> articles<em>. <\/em>(These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.)<\/li>\n<li>Security updates to Windows Input and Composition, Microsoft Graphics Component, Windows Cryptography, Windows Virtualization, Windows Kernel, Windows Datacenter Networking, and the Microsoft JET Database Engine.<\/li>\n<\/ul>\n<p>Das Update gibt es per WSUS oder im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4525233\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Update Catalog<\/a>. Um das Update zu installieren, sind die im KB-Artikel und oben beim Rollup Update aufgef\u00fchrten Vorbedingungen zu erf\u00fcllen.<\/p>\n<p>Bei der WSUS-Bereitstellung ist darauf zu achten, dass die oben erw\u00e4hnten SSU- und SHA-2-Updates installiert sind \u2013 die automatische Installation erfolgt dann ja nicht per Windows Update. Nach Installation ist Windows neu zu starten, bevor das Security-only Update installiert wird. Zudem sollten Sie auch das Sicherheitsupdate <a href=\"https:\/\/support.microsoft.com\/help\/4525106\" target=\"_blank\" rel=\"noopener noreferrer\">KB4525106<\/a> f\u00fcr den IE installieren, da dieses eine 0-day-Schwachstelle schlie\u00dft. Bei diesem Update f\u00fchrt Microsoft keine bekannten Probleme auf. Ob diesmal Telemetriefunktionen enthalten sind, ist derzeit unbekannt.<\/p>\n<h2>Updates f\u00fcr Windows 8.1\/Windows Server 2012 R2<\/h2>\n<p>F\u00fcr Windows 8.1 und Windows Server 2012 R2 wurden ein Rollup und ein Security-only Update freigegeben. Die Update-Historie f\u00fcr Windows 8.1 ist auf <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4009470\/windows-8-1-windows-server-2012-r2-update-history\" target=\"_blank\" rel=\"noopener noreferrer\">dieser Microsoft-Seite<\/a> zu finden.<\/p>\n<h3>KB4525243 (Monthly Rollup) f\u00fcr Windows 8.1\/Server 2012 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4525243\" target=\"_blank\" rel=\"noopener noreferrer\">KB4525243<\/a> (Monthly Rollup for Windows 8.1 and Windows Server 2012 R2) enth\u00e4lt Verbesserungen und Fixes, und adressiert die folgenden Punkte.<\/p>\n<ul>\n<li>Addresses an issue that prevents a 16-bit Visual Basic 3 (VB3) application or other VB3 applications from running.<\/li>\n<li>Addresses an issue that causes only one Bluetooth Basic Rate device to function properly on some Bluetooth controllers after installing the August 13, 2019 update.<\/li>\n<li>Addresses an issue that causes error 0x7E when you connect Bluetooth devices after installing the June 11, 2019 update.<\/li>\n<li>Provides protections against the Intel\u00ae Processor Machine Check Error vulnerability (<u><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-12207\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-12207<\/a><\/u>). Use the registry setting as described in the <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4530989\" target=\"_blank\" rel=\"noopener noreferrer\">Guidance KB article<\/a><em>. <\/em>(This registry setting is disabled by default.)<\/li>\n<li>Provides protections against the Intel\u00ae Transactional Synchronization Extensions (Intel\u00ae TSX) Transaction Asynchronous Abort vulnerability (<a href=\"https:\/\/web.archive.org\/web\/20201006063840\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-11135\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-11135<\/a>). Use the registry settings as described in the <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Client<\/a> and <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Server<\/a> articles<em>. <\/em>(These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.)<\/li>\n<li>Addresses an issue with temporary user profiles in an environment in which user profile disks (UPD) are deployed and cached roaming profiles are not deleted when the \"Delete cached copies of roaming profiles\" policy is enabled.<\/li>\n<li>Security updates to Microsoft Scripting Engine, Internet Explorer, Microsoft Graphics Component, Windows Input and Composition, Windows Cryptography, Windows Virtualization, Windows Kernel, Windows Datacenter Networking, and the Microsoft JET Database Engine.<\/li>\n<\/ul>\n<p>Dieses Update wird automatisch von Windows Update heruntergeladen und installiert, ist aber auch im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4525243\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Update Catalog<\/a> sowie per WSUS erh\u00e4ltlich. Bei einer manuellen Installation ist das neueste Servicing Stack Update (SSU) vorher zu installieren.<\/p>\n<p>Das Update weist ein bekanntes Probleme auf: Bestimmte Aktionen, wie z. B. Umbenennen, die Sie an Dateien oder Ordnern durchf\u00fchren, die sich auf einem Cluster Shared Volume (CSV) befinden, k\u00f6nnen mit dem Fehler \"STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)\" fehlschlagen. Dies tritt auf, wenn Sie die Aktion auf einem CSV-Eigent\u00fcmerknoten aus einem Prozess ausf\u00fchren, der keine Administratorrechte hat. Details sind dem KB-Artikel zu entnehmen.<\/p>\n<h3>KB4525250 (Security-only update) f\u00fcr Windows 8.1\/Server 2012 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4525250\" target=\"_blank\" rel=\"noopener noreferrer\">KB4525250<\/a> (Security Only Quality Update for Windows 8.1 and Windows Server 2012 R2) adressiert folgenden Punkte.<\/p>\n<ul>\n<li>Provides protections against the Intel\u00ae Processor Machine Check Error vulnerability (<u><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-12207\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-12207<\/a><\/u>). Use the registry setting as described in the <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4530989\" target=\"_blank\" rel=\"noopener noreferrer\">Guidance KB article<\/a><em>. <\/em>(This registry setting is disabled by default.)<\/li>\n<li>Provides protections against the Intel\u00ae Transactional Synchronization Extensions (Intel\u00ae TSX) Transaction Asynchronous Abort vulnerability (<a href=\"https:\/\/web.archive.org\/web\/20201006063840\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-11135\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-11135<\/a>). Use the registry settings as described in the <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4073119\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Client<\/a> and <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\" target=\"_blank\" rel=\"noopener noreferrer\">Windows Server<\/a> articles<em>. <\/em>(These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.)<\/li>\n<li>Security updates to Microsoft Graphics Component, Windows Input and Composition, Windows Cryptography, Windows Virtualization, Windows Kernel, Windows Datacenter Networking, and the Microsoft JET Database Engine.<\/li>\n<\/ul>\n<p>Das Update gibt es per WSUS oder im <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4525250\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Update Catalog<\/a>. Das Update weist die gleichen bekannten Probleme wie das Rollup Update auf, diese sind im KB-Artikel beschrieben. Bei einer manuellen Installation ist das neueste Servicing Stack Update (SSU) vorher zu installieren. Zudem sollten Sie auch das Sicherheitsupdate <a href=\"https:\/\/support.microsoft.com\/help\/4525106\" target=\"_blank\" rel=\"noopener noreferrer\">KB4525106<\/a> f\u00fcr den IE installieren, da dieses eine 0-day-Schwachstelle schlie\u00dft. Bei diesem Update f\u00fchrt Microsoft die gleichen bekannten Probleme wie f\u00fcr Update KB4525243 auf.<\/p>\n<p><strong>\u00c4hnliche Artikel:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/blog\/2019\/11\/06\/microsoft-office-patchday-5-november-2019\/\">Microsoft Office Patchday (5. November 2019)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2019\/11\/13\/microsoft-security-update-summary-12-november-2019\/\">Microsoft Security Update Summary (12. November 2019)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2019\/11\/13\/patchday-updates-fr-windows-7-8-1-server-12-nov-2019\/\">Patchday: Updates f\u00fcr Windows 7\/8.1\/Server (12. Nov. 2019)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2019\/11\/13\/patchday-windows-10-updates-12-november-2019\/\">Patchday Windows 10-Updates (12. November 2019)<\/a><br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20240101035645\/https:\/\/borncity.com\/blog\/2019\/11\/14\/patchday-microsoft-office-updates-12-november-2019\/\" rel=\"bookmark\">Patchday Microsoft Office Updates (12. November 2019)<\/a><\/p>\n<p><a href=\"https:\/\/borncity.com\/blog\/2019\/11\/13\/access-fehler-3340-durch-november-2019-updates\/\">Access Fehler 3340 durch November 2019-Updates<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Am 12. November 2019 hat Microsoft diverse (Sicherheits-)Updates f\u00fcr Windows 7 SP1 und weitere Updates f\u00fcr Windows 8.1 sowie die korrespondierenden Server-Versionen freigegeben. Hier der \u00dcberblick \u00fcber diese Updates.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,185,2557],"tags":[7809,7806,7805,7807,7808,4328,4315,3288],"class_list":["post-224794","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-update","category-windows-server","tag-kb4523206","tag-kb4525233","tag-kb4525235","tag-kb4525243","tag-kb4525250","tag-sicherheit","tag-update","tag-windows-en"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/224794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=224794"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/224794\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=224794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=224794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=224794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}