{"id":256229,"date":"2021-07-29T10:35:02","date_gmt":"2021-07-29T08:35:02","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=256229"},"modified":"2021-07-29T11:06:54","modified_gmt":"2021-07-29T09:06:54","slug":"microsoft-security-update-revisions-29-juli-2021","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2021\/07\/29\/microsoft-security-update-revisions-29-juli-2021\/","title":{"rendered":"Microsoft Security Update Revisions (29. Juli 2021)"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" width=\"200\" align=\"left\" \/>[<a href=\"https:\/\/borncity.com\/win\/2021\/07\/29\/microsoft-security-update-revisions-29-juli-2021\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Kurzinformation f\u00fcr Windows-Admins im Firmenumfeld. Microsoft hat die Nacht zum 29.7.2021 revidierte Sicherheitsupdates zur Abschw\u00e4chung der NTLM Relay Attacken auf Active Directory-Zertifikate und zur Schwachstelle CVE-2021-36934 (Windows Elevation of Privilege Vulnerability, HiveNightmare) ver\u00f6ffentlicht. Ich stelle es mal unkommentiert hier zur Info ein.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg02.met.vgwort.de\/na\/925ab63df6714cd18e0f81e7d80b4672\" alt=\"\" width=\"1\" height=\"1\" \/><br \/>\n**********************************************************************<br \/>\nTitle: Microsoft Security Update Revisions<br \/>\nIssued: July 28, 2021<br \/>\n**********************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following advisory and CVE have undergone major revision increments.<\/p>\n<p>=======================================================================<\/p>\n<p>* ADV210003<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/ADV210003\" target=\"_blank\" rel=\"noopener\">ADV210003<\/a> | Mitigating NTLM Relay Attacks on Active Directory Certificate<br \/>\nServices (AD CS)<br \/>\n&#8211; Version: 1.1<br \/>\n&#8211; Reason for Revision: Executive Summary text has been revised, and a statement has been added to inform customers that <a href=\"https:\/\/support.microsoft.com\/help\/5005413\" target=\"_blank\" rel=\"noopener\">KB5005413<\/a>\u00a0 has been revised. These are informational changes only.<br \/>\n&#8211; Originally posted: July 24, 2021<br \/>\n&#8211; Updated: July 28, 2021<br \/>\n&#8211; Aggregate CVE Severity Rating: N\/A<\/p>\n<p>* CVE-2021-36934<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36934\" target=\"_blank\" rel=\"noopener\">CVE-2021-36934<\/a> | Windows Elevation of Privilege Vulnerability (HiveNightmare)<br \/>\n&#8211; Version: 4.0<br \/>\n&#8211; Reason for Revision: The following revisions have been made: 1) Removed Windows<br \/>\nServer versions from the Security Updates table as they are not affected by this<br \/>\nvulnerability. 2) Updated the Workaround information with a Caution regarding<br \/>\nrestoring a system from backup.<br \/>\n&#8211; Originally posted: July 20, 2021<br \/>\n&#8211; Updated: July 27, 2021<br \/>\n&#8211; Aggregate CVE Severity Rating: N\/A<\/p>\n<p><strong>\u00c4hnliche Artikel:<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/07\/24\/petitpotam-angriff-erlaubt-windows-domain-bernahme\/\">PetitPotam-Angriff erlaubt Windows Domain-\u00dcbernahme<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/07\/21\/hivenightmare-neue-details-zur-windows-schwachstelle-cve-2021-36934\/\">HiveNightmare: Neue Details zur Windows-Schwachstelle CVE-2021-36934<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/07\/24\/neue-infos-zur-windows-10-schwachstelle-hivenightmare\/\">Neue Infos zur Windows 10-Schwachstelle HiveNightmare<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/07\/19\/printnightmare-point-and-print-erlaubt-die-installation-beliebiger-dateien\/\">PrintNightmare: Point-and-Print erlaubt die Installation beliebiger Dateien<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/07\/25\/microsoft-liefert-workaround-fr-windows-petitpotam-ntlm-relay-angriffe\/\">Microsofts Workaround gegen Windows PetitPotam NTLM-Relay-Angriffe<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/01\/26\/details-zur-windows-ntlm-schwachstelle-cve-2021-1678-verffentlicht\/\">Details zur Windows NTLM-Schwachstelle CVE-2021-1678 ver\u00f6ffentlicht<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/07\/21\/hivenightmare-neue-details-zur-windows-schwachstelle-cve-2021-36934\/\">HiveNightmare: Neue Details zur Windows-Schwachstelle CVE-2021-36934<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/07\/26\/remotepotato0-privilege-escalation-schwachstelle-im-windows-rpc-protocol\/\">RemotePotato0: Privilege Escalation-Schwachstelle im Windows RPC Protocol<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Kurzinformation f\u00fcr Windows-Admins im Firmenumfeld. Microsoft hat die Nacht zum 29.7.2021 revidierte Sicherheitsupdates zur Abschw\u00e4chung der NTLM Relay Attacken auf Active Directory-Zertifikate und zur Schwachstelle CVE-2021-36934 (Windows Elevation of Privilege Vulnerability, HiveNightmare) ver\u00f6ffentlicht. Ich stelle es mal unkommentiert hier zur &hellip; <a href=\"https:\/\/borncity.com\/blog\/2021\/07\/29\/microsoft-security-update-revisions-29-juli-2021\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,301],"tags":[4328,3288],"class_list":["post-256229","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-windows","tag-sicherheit","tag-windows-en"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/256229","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=256229"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/256229\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=256229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=256229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=256229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}