{"id":229689,"date":"2020-03-17T17:45:32","date_gmt":"2020-03-17T16:45:32","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=229689"},"modified":"2020-03-17T17:45:32","modified_gmt":"2020-03-17T16:45:32","slug":"trend-micro-wfbs-10-0-patch-2190","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2020\/03\/17\/trend-micro-wfbs-10-0-patch-2190\/","title":{"rendered":"Trend Micro WFBS 10.0 Patch 2190"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\"\/>Trend Micro hat den Patch 2190 f\u00fcr sein Worry Free Business Security 10.0 (TM WFBS 10.0) f\u00fcr Windows 10 freigegeben. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg02.met.vgwort.de\/na\/e369cf59d1704240803320c337b4d24b\" width=\"1\" height=\"1\"\/>Trend Micro Worry-Free Business Security (TM WFBS) sch\u00fctzt kleine Unternehmen, Benutzer und Assets vor Datendiebstahl, Identit\u00e4tsdiebstahl, riskanten Websites, und Spam (nur in Advanced Variante). Blog-Leser Tom B. hat mir dankenswerterweise eine kurze E-Mail zukommen lassen, dass das Paket aktualisiert wurde.<\/p>\n<h2>TM WFBS 10.0 Service Pack 1 Patch &#8211; Build 2190<\/h2>\n<p>Der Patch (WFBS_100_SP1_WIN_ALL_Patch_2190.exe) wurde am 16. M\u00e4rz 2020 ver\u00f6ffentlicht. Er unterst\u00fctzt das Windows 10 November 2019 Update (Version 1909) auf Clients. In der <a href=\"https:\/\/files.trendmicro.com\/documentation\/WFBS_100_SP1_WIN_ALL_Patch_2190.txt\" target=\"_blank\" rel=\"noopener noreferrer\">Readme-Datei<\/a> gibt TM weiterhin an, dass der Patch folgende wichtige Fehler behebt:  <\/p>\n<p>Issue 1:&nbsp;&nbsp;&nbsp;&nbsp; (VRTS-3690)<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Worry-Free Business Security is affected by a Local <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Privilege Escalation vulnerability and an IPC <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Authentication Bypass vulnerability.<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br \/>&nbsp;&nbsp;&nbsp;&nbsp; Solution 1:&nbsp; This patch resolves these vulnerabilities.<\/p>\n<p>&nbsp;&nbsp;&nbsp;&nbsp; Issue 2:&nbsp;&nbsp;&nbsp;&nbsp; (SEG-65986)<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; There is a typographical error on the agent <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; installation screen.<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br \/>&nbsp;&nbsp;&nbsp;&nbsp; Solution 2:&nbsp; This patch corrects typographical error on the agent<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; installation screen.<\/p>\n<p>&nbsp;&nbsp;&nbsp;&nbsp; Issue 3:&nbsp;&nbsp;&nbsp;&nbsp; (SEG-62792)<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; An issue prevents users from enabling the \"Antispam \u00e2\u20ac\" <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Spam detections in total messages received exceed\" <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; notification. <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br \/>&nbsp;&nbsp;&nbsp;&nbsp; Solution 3:&nbsp; This patch resolves the issue to ensure that the <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; notification can be enabled successfully.<br \/>&nbsp;<br \/>&nbsp;&nbsp;&nbsp;&nbsp; Issue 4:&nbsp;&nbsp;&nbsp;&nbsp; (SEG-63050)<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; An Apache(TM) Service error appears in the system <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; eventlog.<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br \/>&nbsp;&nbsp;&nbsp;&nbsp; Solution 4:&nbsp; This patch resolves the Apache error.<br \/>&nbsp;<br \/>&nbsp;&nbsp;&nbsp;&nbsp; Issue 5:&nbsp;&nbsp;&nbsp;&nbsp; (SEG-63427)(SEG-62691)<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; An \"AgentStatusDC.exe\" error appears on the event <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; viewer.<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br \/>&nbsp;&nbsp;&nbsp;&nbsp; Solution 5:&nbsp; This patch resolves the \"AgentStatusDC.exe\" error.<\/p>\n<p>&nbsp;&nbsp;&nbsp;&nbsp; Issue 6:&nbsp;&nbsp;&nbsp;&nbsp; (SEG-65938)<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Trend Micro Security Agent listener service may <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; not shutdown properly after receiving a pre-shutdown <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; command.<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br \/>&nbsp;&nbsp;&nbsp;&nbsp; Solution 6:&nbsp; This patch resolves this issue.<\/p>\n<p>&nbsp;&nbsp;&nbsp;&nbsp; Issue 7:&nbsp;&nbsp;&nbsp;&nbsp; (VRTS-3847)<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Certain vulnerabilities in Worry-Free Business <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Security may allow dll side loading at <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; libcurl\/openssl.<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br \/>&nbsp;&nbsp;&nbsp;&nbsp; Solution 7:&nbsp; This patch resolves the vulnerabilities to prevent<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; non-privileged access.<\/p>\n<p>&nbsp;&nbsp;&nbsp;&nbsp; Issue 8:&nbsp;&nbsp;&nbsp; (VRTS-3747)(VRTS-3749) (related to VRTS-3744)<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The combination of two possible 0-day directory <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; traversal vulnerabilities leads to a Remote Code<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Execution (RCE) vulnerability which can grant attackers <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; SYSTEM privileges to the management server. <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br \/>&nbsp;&nbsp;&nbsp;&nbsp; Solution 8: This patch updates the Worry-Free Business Security <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; server program to remove the vulnerability.<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br \/>&nbsp;&nbsp;&nbsp;&nbsp; Issue 9:&nbsp;&nbsp;&nbsp; (VRTS-4188)<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Worry-Free Business Security is affected by a<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Directory Traversal Authentication Bypass<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Vulnerability.<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~<br \/>&nbsp;&nbsp;&nbsp;&nbsp; Solution 9: This Patch updates the Worry-Free Business<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Security server program to remove the vulnerability.<\/p>\n<p>Der Download der Datei <em>WFBS_100_SP1_WIN_ALL_Patch_2190.exe<\/em> ist auf <a href=\"https:\/\/downloadcenter.trendmicro.com\/index.php?regs=nabu&amp;clk=tbl&amp;clkval=5276\" target=\"_blank\" rel=\"noopener noreferrer\">dieser Trend Micro-Seite<\/a> \u00fcber den Registerreiter <em>Produkt Patch <\/em>m\u00f6glich.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend Micro hat den Patch 2190 f\u00fcr sein Worry Free Business Security 10.0 (TM WFBS 10.0) f\u00fcr Windows 10 freigegeben.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[161],"tags":[4328,3836,4315,4313],"class_list":["post-229689","post","type-post","status-publish","format-standard","hentry","category-virenschutz","tag-sicherheit","tag-software","tag-update","tag-virenschutz"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/229689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=229689"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/229689\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=229689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=229689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=229689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}