{"id":238793,"date":"2020-12-11T07:14:26","date_gmt":"2020-12-11T06:14:26","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=238793"},"modified":"2020-12-11T07:30:13","modified_gmt":"2020-12-11T06:30:13","slug":"microsoft-update-und-sicherheitshinweise-8-und-10-dez-2020","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2020\/12\/11\/microsoft-update-und-sicherheitshinweise-8-und-10-dez-2020\/","title":{"rendered":"Microsoft Update- und Sicherheitshinweise 8. und 10. Dez. 2020"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\"\/>[<a href=\"https:\/\/borncity.com\/win\/2020\/12\/11\/microsoft-update-and-security-advisories-dez-8-10-2020\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Microsoft hat zum 8. Dezember und nochmals zum 10. Dezember 2020 einige Hinweise zu Sicherheitupdates und Revisionen ver\u00f6ffentlicht. Ich trage diese unkommentiert hier im Blog nach. <\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg05.met.vgwort.de\/na\/fd593951d2d840dd86a38423f3d0ad8b\" width=\"1\" height=\"1\"\/>Hier die Security Update Releases zum 8. Dezember 2020.<\/p>\n<p>**************************************************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: <strong>December 8, 2020<br \/><\/strong>**************************************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2020-1325<br \/>* CVE-2020-1596<br \/>* CVE-2020-17049<br \/>&nbsp;<\/p>\n<p>Revision Information:<br \/>=====================<\/p>\n<p>* CVE-2020-1325<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-1325\" target=\"_blank\" rel=\"noopener\">CVE-2020-1325 | Azure DevOps Server and Team Foundation Services Spoofing Vulnerability<\/a><br \/>&#8211; Version 2.0<br \/>&#8211; Reason for Revision: Microsoft is announcing the availability of the security update<br \/>&nbsp;&nbsp; for Azure DevOps Server 2019 Update 1.1 to address this vulnerability. Customers <br \/>&nbsp;&nbsp; running Azure DevOps Server 2019 Update 1.1 should install the update to be protected<br \/>&nbsp;&nbsp; from this vulnerability.<br \/>&#8211; Originally posted: November 10, 2020<br \/>&#8211; Updated: December 8, 2020<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>* CVE-2020-1596<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-1596\" target=\"_blank\" rel=\"noopener\">CVE-2020-1596 | TLS Information Disclosure Vulnerability<\/a><br \/>&#8211; Version 3.0<br \/>&#8211; Reason for Revision: To address a known issue customers running Windows Server 2008 <br \/>&nbsp;&nbsp; experienced after installing the September 2020 security updates, Microsoft has<br \/>&nbsp;&nbsp; released the December 2020 Monthly Rollup and Security Only updates for all affected<br \/>&nbsp;&nbsp; versions of Windows Server 2008. Microsoft strongly recommends that customers <br \/>&nbsp;&nbsp; enrolled in the Extended Security Update (ESU) program install the updates to <br \/>&nbsp;&nbsp; correct this known issue.<br \/>&#8211; Originally posted: September 8, 2020<br \/>&#8211; Updated: December 8, 2020<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>* CVE-2020-17049<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17049\" target=\"_blank\" rel=\"noopener\">CVE-2020-17049 | Kerberos KDC Security Feature Bypass Vulnerability<\/a><br \/>&#8211;&nbsp; Version 3.0<br \/>&#8211; Reason for Revision: To comprehensively address CVE-2020-17049, Microsoft has<br \/>&nbsp;&nbsp; released the following: December 2020 Security Updates for all affected Windows 10<br \/>&nbsp;&nbsp; servers, Windows Server 2012 R2, and Windows Server 2012; December 2020 Monthly <br \/>&nbsp;&nbsp; Rollup updates and Security Only updates for all affected versions of Windows <br \/>&nbsp;&nbsp; Server 2008 R2 and Windows Server 2008. These updates include fixes for all known<br \/>&nbsp;&nbsp; issues originally introduced by the November 10, 2020 security updates for <br \/>&nbsp;&nbsp; CVE-2020-17049. Microsoft strongly recommends that customers running any of these<br \/>&nbsp;&nbsp; versions of Windows Server install the updates and then follow the steps outlined<br \/>&nbsp;&nbsp; in <a href=\"https:\/\/support.microsoft.com\/help\/4598347\">https:\/\/support.microsoft.com\/help\/4598347<\/a> to enable full protection on domain<br \/>&nbsp;&nbsp; controller servers.<br \/>&#8211; Originally posted: November 10, 2020<br \/>&#8211; Updated: December 8, 2020<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>Das Thema hatte ich im Blog-Beitrag <a href=\"https:\/\/borncity.com\/blog\/2020\/12\/10\/microsoft-patcht-windows-kerberos-schwachstelle-cve-2020-16996-mit-dez-2020-updates\/\">Microsoft patcht Windows Kerberos-Schwachstelle CVE-2020-16996 mit Dez. 2020-Updates<\/a> angesprochen. <\/p>\n<p>***************************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: <strong>December 10, 2020<\/strong><br \/>***************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2020-17002<br \/>* CVE-2020-17049<br \/>* CVE-2020-17160<\/p>\n<p>Revision Information:<br \/>=====================<\/p>\n<p>* CVE-2020-17002<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17002\" target=\"_blank\" rel=\"noopener\">CVE-2020-17002 | Azure SDK for C Security Feature Bypass Vulnerability<\/a><br \/>&#8211; Version 2.0<br \/>&#8211; Reason for Revision: In the Security Updates table, added the following:<br \/>&nbsp;&nbsp; azure-c-shared-utility Release LTS_07_2020 and LTS_02_2020; C SDK for Azure <br \/>&nbsp;&nbsp; IoT Release LTS_07_2020 and LTS_02_2020; all supported releases of the following<br \/>&nbsp;&nbsp; protocol submodules: azure-uamqp-c, azure-umqtt-c, azure-uhttp-c, and azure-utpm-c.<br \/>&nbsp;&nbsp; These releases all contain a security fix, addressed by CVE-2020-17002, affecting<br \/>&nbsp;&nbsp; applications using c-utility in conjunction with OpenSSL or WolfSSL.<br \/>&#8211; Originally posted: December 8, 2020<br \/>&#8211; Updated: December 10, 2020<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>* CVE-2020-17049<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17049\" target=\"_blank\" rel=\"noopener\">CVE-2020-17049 | Kerberos KDC Security Feature Bypass Vulnerability<\/a><br \/>&#8211; Version 4.0<br \/>&#8211; Reason for Revision: In the Security Updates table, corrected the Download and <br \/>&nbsp;&nbsp; Article links for all affected Windows 10 servers, Windows Server 2012 R2, and <br \/>&nbsp;&nbsp; Windows Server 2012 R2. Note that the December 2020 Security Updates supercede<br \/>&nbsp;&nbsp; the security updates released on November 10, 2020 and the updates released <br \/>&nbsp;&nbsp; between November 17, 2020 and November 19, 2020 to address this vulnerability.<br \/>&#8211; Originally posted: November 10, 2020<br \/>&#8211; Updated: December 8, 2020<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>Das Thema hatte ich im Blog-Beitrag <a href=\"https:\/\/borncity.com\/blog\/2020\/12\/10\/microsoft-patcht-windows-kerberos-schwachstelle-cve-2020-16996-mit-dez-2020-updates\/\">Microsoft patcht Windows Kerberos-Schwachstelle CVE-2020-16996 mit Dez. 2020-Updates<\/a> angesprochen.<\/p>\n<p>Hier die Sicherheitshinweise zum 8. Dezember, wobei die letzten SSUs und der Edge bereits in separaten Beitr\u00e4gen behandelt wurden. <\/p>\n<p>*************************************************************************<br \/>Title: Microsoft Security Advisory Notification<br \/>Issued: <strong>December 8, 2020<\/strong><br \/>*************************************************************************<\/p>\n<p>Security Advisories Released or Updated on December 8, 2020<br \/>=========================================================================<\/p>\n<p>*ADV200013<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/ADV200013\" target=\"_blank\" rel=\"noopener\">ADV200013 | Microsoft Guidance for Addressing Spoofing Vulnerability in DNS Resolver<\/a><br \/>&#8211; Reason for Revision: Information published.<br \/>&#8211; Originally posted: December 8, 2020<br \/>&#8211; Updated: N\/A<br \/>&#8211; Version: 1.0<\/p>\n<p>* ADV990001<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/ADV990001\" target=\"_blank\" rel=\"noopener\">ADV990001 | Latest Servicing Stack Updates<\/a><br \/>&#8211; Reason for Revision: Advisory updated to announce new versions of Servicing Stack<br \/>&nbsp;&nbsp; Updates are available. Please see the FAQ for details.<br \/>&#8211; Originally posted: November 13, 2018<br \/>&#8211; Updated: December 8, 2020<br \/>&#8211; Version: 29.0<\/p>\n<p>* ADV200002<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/ADV200002\" target=\"_blank\" rel=\"noopener\">ADV200002 | Chromium Security Updates for Microsoft Edge (Chromium-Based)<\/a><br \/>&#8211; Reason for Revision: Updated advisory to announce a new version of Microsoft <br \/>&nbsp;&nbsp; Edge (Chromium-based). Please see the table for more information.<br \/>&#8211; Originally posted: January 28, 2020<br \/>&#8211; Updated: December 8, 2020<br \/>&#8211; Version: 30.0<\/p>\n<p>* CVE-2020-17160<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17160\" target=\"_blank\" rel=\"noopener\">CVE-2020-17160 | RETRACTED<\/a>&nbsp; &#8211; Version 2.0<br \/>&#8211; Reason for Revision: This CVE was published in error and has been retracted. <br \/>&nbsp;&nbsp; For the correct CVE information see <br \/>&nbsp;&nbsp; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17002\">https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-17002<\/a>.<br \/>&#8211; Originally posted: December 8, 2020<br \/>&#8211; Updated: December 9, 2020<br \/>&#8211; Aggregate CVE Severity Rating: N\/A<\/p>\n<p>Die CVE zur Azure SDK for C Security Feature Bypass Vulnerability wurde f\u00e4lschlich herausgegeben<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Microsoft hat zum 8. Dezember und nochmals zum 10. Dezember 2020 einige Hinweise zu Sicherheitupdates und Revisionen ver\u00f6ffentlicht. Ich trage diese unkommentiert hier im Blog nach.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,185],"tags":[4328,4315],"class_list":["post-238793","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-update","tag-sicherheit","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/238793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=238793"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/238793\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=238793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=238793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=238793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}