{"id":251136,"date":"2021-03-17T01:50:51","date_gmt":"2021-03-17T00:50:51","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=251136"},"modified":"2021-03-17T09:57:03","modified_gmt":"2021-03-17T08:57:03","slug":"exchange-server-2013-sicherheitsupdate-fr-service-pack-1","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2021\/03\/17\/exchange-server-2013-sicherheitsupdate-fr-service-pack-1\/","title":{"rendered":"Sicherheitsupdate f&uuml;r Exchange Server 2013 Service Pack 1 &#8211; Neue CUs f\u00fcr Exchange 2019 und 2016 (16.3.2021)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/win\/2021\/03\/17\/exchange-server-2013-sicherheitsupdate-fr-service-pack-1\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Microsoft hat die Nacht eine Sicherheitsinformation zur Revision seiner Sonder-Updates f\u00fcr \u00e4ltere CUs f\u00fcr den On-Premises Microsoft Exchange Servern (die bereits aus dem Support gefallen sind) ver\u00f6ffentlicht. Konkret hat Microsoft ein Sicherheitsupdate f\u00fcr das aus dem Support gefallene Microsoft Exchange Server 2013 Service Pack 1 freigegeben. <strong>Erg\u00e4nzung:<\/strong> Zudem wurden CU 9 f\u00fcr Exchange Server 2019 und CU 20 f\u00fcr Exchange Server 2016 ver\u00f6ffentlicht.<\/p>\n<p><!--more--><\/p>\n<h2>Update f\u00fcr Exchange Server 2013 SP 1<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg08.met.vgwort.de\/na\/ada72dec78be4aeba3413fe9de95b8c0\" alt=\"\" width=\"1\" height=\"1\" \/>F\u00fcr den Exchange Server 2013 Service Pack 1 wurde gem\u00e4\u00df nachfolgendem Sicherheitshinweis ein neues Sicherheitsupdate freigegeben.<\/p>\n<p>****************************************************************<br \/>\nTitle: Microsoft Security Update Releases<br \/>\nIssued: March 16, 2021<br \/>\n****************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>Critical CVEs<br \/>\n============================<\/p>\n<p>*\u00a0 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26855\" target=\"_blank\" rel=\"noopener\">CVE-2021-26855<\/a><br \/>\n*\u00a0 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-27065\" target=\"_blank\" rel=\"noopener\">CVE-2021-27065<\/a><br \/>\n* <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26857\" target=\"_blank\" rel=\"noopener\">CVE-2021-26857<\/a><\/p>\n<p>Important CVEs<br \/>\n============================<\/p>\n<p>* <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26858\" target=\"_blank\" rel=\"noopener\">CVE-2021-26858<\/a><\/p>\n<p>Publication information<br \/>\n===========================<\/p>\n<p>&#8211; Microsoft Exchange Server Remote Code Execution Vulnerability<br \/>\n&#8211; See preceding list for links<br \/>\n&#8211; Version 5.0<br \/>\n&#8211; Reason for Revision: Microsoft is releasing a security update for CVE-2021-27065,<br \/>\nCVE-2021-26855, CVE-2021-26857, and CVE-2021-26858 for Microsoft Exchange Server 2013 Service Pack 1. This update addresses only those CVEs. Customers who want to be protected from these vulnerabilities can apply this update if they are not on a supported cumulative update. Microsoft strongly recommends that customers update to the latest supported cumulative updates.<br \/>\n&#8211; Originally posted: March 2, 2021<br \/>\n&#8211; Updated: March 16, 2021<\/p>\n<h2>Neue CUs f\u00fcr Exchange Server 2016\/2019<\/h2>\n<p>Erg\u00e4nzung: Zum 16. M\u00e4rz 2021 hat Microsoft zudem die nachfolgenden viertelj\u00e4hrlichen kumulativen Updates f\u00fcr Exchange Server 2016\/2019 freigegeben.<\/p>\n<ul>\n<li><a href=\"https:\/\/support.microsoft.com\/help\/4602569\" target=\"_blank\" rel=\"noopener noreferrer\">KB4602569<\/a>: f\u00fcr Exchange Server 2016 CU 20<\/li>\n<li><a href=\"https:\/\/support.microsoft.com\/help\/4602570\" target=\"_blank\" rel=\"noopener noreferrer\">KB4602570<\/a>: f\u00fcr Exchange Server 2019 CU 9<\/li>\n<\/ul>\n<p>Microsoft hat dazu den Techcommunity-Beitrag\u00a0<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/released-march-2021-quarterly-exchange-updates\/ba-p\/2205283\" target=\"_blank\" rel=\"noopener\">Released: March 2021 Quarterly Exchange Updates<\/a> ver\u00f6ffentlicht. Dort empfiehlt man, dass Administratoren diese kumulativen Updates vor dem Ausrollen testet. Danke an den Nutzer in nachfolgendem Kommentar und an Toni f\u00fcr die Mail.<\/p>\n<p><strong>\u00c4hnliche Artikel:<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/03\/03\/exchange-server-0-day-exploits-werden-aktiv-ausgenutzt-patchen\/\">Exchange-Server 0-day-Exploits werden aktiv ausgenutzt, patchen!<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/03\/06\/wichtige-hinweise-microsofts-und-des-bsi-zum-exchange-server-sicherheitsupdate-mrz-2021\/\">Wichtige Hinweise Microsofts und des BSI zum Exchange-Server Sicherheitsupdate (M\u00e4rz 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/03\/05\/exchange-probleme-mit-ecp-nach-sicherheitsupdate-mrz-2021\/\">Exchange-Probleme mit ECP\/OWA-Suche nach Sicherheitsupdate (M\u00e4rz 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/03\/07\/neues-zum-exchange-hack-testtools-von-microsoft-co\/\">Neues zum Exchange-Hack \u2013 Testtools von Microsoft &amp; Co.<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/03\/08\/microsoft-msert-hilft-bei-exchange-server-scans\/\">Microsoft MSERT hilft bei Exchange-Server-Scans<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/03\/09\/exchange-hack-neue-patches-und-neue-erkenntnisse\/\">Exchange-Hack: Neue Patches und neue Erkenntnisse<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/03\/11\/anatomie-des-proxylogon-hafinum-exchange-server-hacks\/\">Anatomie des ProxyLogon Hafinum-Exchange Server Hacks<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/03\/11\/exchange-hack-neue-opfer-neue-patches-neue-angriffe\/\">Exchange-Hack: Neue Opfer, neue Patches, neue Angriffe<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/03\/12\/neues-zur-proxylogon-hafnium-exchange-problematik-12-3-2021\/\">Neues zur ProxyLogon-Hafnium-Exchange-Problematik (12.3.2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/03\/13\/gab-es-beim-exchange-massenhack-ein-leck-bei-microsoft\/\">Gab es beim Exchange-Massenhack ein Leck bei Microsoft?<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/03\/13\/proxylogon-hack-repository-fr-betroffene-exchange-administratoren\/\">ProxyLogon-Hack: Repository f\u00fcr betroffene Exchange-Administratoren<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/03\/16\/microsoft-exchange-on-premises-one-click-mitigation-tool-eomt-freigegeben\/\">Microsoft Exchange (On-Premises) one-click Mitigation Tool (EOMT) freigegeben<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Microsoft hat die Nacht eine Sicherheitsinformation zur Revision seiner Sonder-Updates f\u00fcr \u00e4ltere CUs f\u00fcr den On-Premises Microsoft Exchange Servern (die bereits aus dem Support gefallen sind) ver\u00f6ffentlicht. Konkret hat Microsoft ein Sicherheitsupdate f\u00fcr das aus dem Support gefallene Microsoft Exchange &hellip; <a href=\"https:\/\/borncity.com\/blog\/2021\/03\/17\/exchange-server-2013-sicherheitsupdate-fr-service-pack-1\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,7459,185],"tags":[5359,4328,4315],"class_list":["post-251136","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-software","category-update","tag-exchange","tag-sicherheit","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/251136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=251136"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/251136\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=251136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=251136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=251136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}