{"id":256574,"date":"2021-08-11T09:23:56","date_gmt":"2021-08-11T07:23:56","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=256574"},"modified":"2022-06-28T07:07:59","modified_gmt":"2022-06-28T05:07:59","slug":"patchday-updates-fr-windows-7-server-2008-r2-10-august-2021","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2021\/08\/11\/patchday-updates-fr-windows-7-server-2008-r2-10-august-2021\/","title":{"rendered":"Patchday: Updates f&uuml;r Windows 7\/Server 2008 R2 (10. August 2021)"},"content":{"rendered":"<p><img decoding=\"async\" style=\"margin: 0px 10px 0px 0px;\" title=\"Update\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2021\/06\/Update-01.jpg\" alt=\"Update\" align=\"left\" border=\"0\" \/>[<a href=\"https:\/\/borncity.com\/win\/2021\/08\/11\/patchday-updates-fr-windows-7-server-2008-r2-10-august-2021\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Zum 10. August hat Microsoft diverse Updates f\u00fcr Windows 7 SP1-Systeme, die noch im ESU-Support sind freigegeben. Auch mit ESU Bypass v11 funktioniert das Ganze weiterhin. Diese Sicherheitsupdates sind aber auch f\u00fcr Windows Server 2008 R2 mit ESU-Support verf\u00fcgbar. Hier einige Informationen zu den Monthly Rollup und Security only Updates f\u00fcr diese Betriebssystem.<\/p>\n<p><!--more--><\/p>\n<h2>Updates f\u00fcr Windows 7\/Windows Server 2008 R2<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg02.met.vgwort.de\/na\/fcb1aa77dd21489c9b41810d22a0b3aa\" alt=\"\" width=\"1\" height=\"1\" \/>F\u00fcr Windows 7 SP1 und Windows Server 2008 R2 SP1 wurden ein Rollup und ein Security-only Update freigegeben. Diese Updates stehen aber nur noch f\u00fcr Systeme mit ESU-Lizenz (2. Jahr) zur Verf\u00fcgung. Die Update-Historie f\u00fcr Windows 7 ist auf <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4009469\" target=\"_blank\" rel=\"noopener\">dieser Microsoft-Seite<\/a> zu finden.<\/p>\n<blockquote><p>Ab Juli 2020 deaktivieren alle Windows-Updates die <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/virtualization\/hyper-v\/deploy\/deploy-graphics-devices-using-remotefx-vgpu\" target=\"_blank\" rel=\"noopener\">RemoteFX vGPU-Funktion<\/a> aufgrund der Sicherheitsl\u00fccke <a href=\"https:\/\/web.archive.org\/web\/20201103231655\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1036\" target=\"_blank\" rel=\"noopener\">CVE-2020-1036<\/a> (siehe auch <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4570006\" target=\"_blank\" rel=\"noopener\">KB4570006<\/a>). Nach der Installation dieses Updates schlagen Versuche, virtuelle Maschinen (VM) mit aktivierter RemoteFX vGPU zu starten, fehl. KB5003209 (Monatliches Rollup) f\u00fcr Windows 8.1\/Server 2012 R2.<\/p>\n<p>Die Update-Installation erfordert entweder eine g\u00fcltige ESU-Lizenz f\u00fcr 2021, oder ESU Bypass v11 (<a href=\"https:\/\/www.deskmodder.de\/blog\/2019\/12\/07\/windows-7-erweiterte-sicherheitsupdates-esu-erhalten-wird-moeglich-sein\/\" target=\"_blank\" rel=\"noopener\">siehe<\/a>).<\/p><\/blockquote>\n<h3>KB5005088 (Monthly Rollup) f\u00fcr Windows 7\/Windows Server 2008 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/help\/5005088\" target=\"_blank\" rel=\"noopener\">KB5005088<\/a> (Monthly Quality Rollup for Windows 7 SP1 and Windows Server 2008 R2 SP1) enth\u00e4lt (neben den Sicherheitsfixes vom Vormonat) Verbesserungen und Bug-Fixes und adressiert folgendes:<\/p>\n<ul>\n<li>Changes the default privilege requirement for installing drivers when using Point and Print. After installing this update, you must have administrative privileges to install drivers. If you use Point and Print, see <a href=\"https:\/\/support.microsoft.com\/topic\/873642bf-2634-49c5-a23b-6d8e9a302872\" target=\"_blank\" rel=\"noopener\">KB5005652<\/a>, <a href=\"https:\/\/aka.ms\/PointPrintMSRCBlog\" target=\"_blank\" rel=\"noopener\">Point and Print Default Behavior Change<\/a>, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34481\" target=\"_blank\" rel=\"noopener\">CVE-2021-34481<\/a> for more information.<\/li>\n<li>Addresses an issue in which Smart Card Authentication (PIV) fails on non-RFC compliant printers and scanners requiring smartcard authentication. For more information, see <a href=\"https:\/\/support.microsoft.com\/help\/5005392\" target=\"_blank\" rel=\"noopener\">KB5005392<\/a>.<\/li>\n<li>This update also contains miscellaneous security improvements to internal OS functionality.<\/li>\n<\/ul>\n<p>Details zu den gefixten Sicherheitsl\u00fccken kann man \u00fcber <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/\" target=\"_blank\" rel=\"noopener\">diese Seite<\/a> herausfinden. Dieses Update wird automatisch per Windows Update heruntergeladen und installiert. Das Paket ist aber auch per <a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB5005088\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> erh\u00e4ltlich und wird per WSUS verteilt. Details zu den Requirements und bekannten Problemen finden sich im KB-Artikel.<\/p>\n<blockquote><p>Bez\u00fcglich des Point and Print-Fixes bin ich nicht so sicher, ob das wirklich behoben ist (<a href=\"https:\/\/twitter.com\/gentilkiwi\/status\/1425185541142814720\" target=\"_blank\" rel=\"noopener\">siehe<\/a>).<\/p><\/blockquote>\n<h3>KB5005089 (Security Only) f\u00fcr Windows 7\/Windows Server 2008 R2<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/help\/5005089\" target=\"_blank\" rel=\"noopener\">KB5005089<\/a> (Security-only update) steht f\u00fcr Windows 7 SP1 und Windows Server 2008 R2 SP1 mit ESU-Lizenz zur Verf\u00fcgung. Das Update adressiert folgende Punkte.<\/p>\n<ul>\n<li>Changes the default privilege requirement for installing drivers when using Point and Print. After installing this update, you must have administrative privileges to install drivers. If you use Point and Print, see <a href=\"https:\/\/support.microsoft.com\/topic\/873642bf-2634-49c5-a23b-6d8e9a302872\" target=\"_blank\" rel=\"noopener\">KB5005652<\/a>, <a href=\"https:\/\/aka.ms\/PointPrintMSRCBlog\" target=\"_blank\" rel=\"noopener\">Point and Print Default Behavior Change<\/a>, and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34481\" target=\"_blank\" rel=\"noopener\">CVE-2021-34481<\/a> for more information.<\/li>\n<li>Addresses an issue in which Smart Card Authentication (PIV) fails on non-RFC compliant printers and scanners requiring smartcard authentication. For more information, see <a href=\"https:\/\/support.microsoft.com\/help\/5005392\" target=\"_blank\" rel=\"noopener\">KB5005392<\/a>.<\/li>\n<li>This update also contains miscellaneous security improvements to internal OS functionality.<\/li>\n<\/ul>\n<p>Das Update gibt es per WSUS oder im <a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB5005089\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>. Um das Update zu installieren, sind die im KB-Artikel und oben beim Rollup Update aufgef\u00fchrten Vorbedingungen zu erf\u00fcllen. Das Update weist die im KB-Artikel beschriebenen Fehler auf. Zudem sollte das Internet Explorer 11 Sicherheitsupdate <a href=\"https:\/\/support.microsoft.com\/help\/5005036\" target=\"_blank\" rel=\"noopener\">KB5005036<\/a> von August 2021 installiert werden (der Support f\u00fcr den IE 11 endet nun). Achtet darauf, das neueste Servicing Stack Update vorher zu installieren.<\/p>\n<p><strong>\u00c4hnliche Artikel:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/blog\/2021\/08\/04\/microsoft-office-patchday-3-august-2021\/\" rel=\"noopener noreferrer\" data-wpel-link=\"internal\">Microsoft Office Patchday (3. August<\/a><a href=\"https:\/\/borncity.com\/blog\/2021\/08\/04\/microsoft-office-patchday-3-august-2021\/\" rel=\"noopener noreferrer\" data-wpel-link=\"internal\">\u00a02021)<\/a><strong><br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/blog\/2021\/08\/11\/microsoft-security-update-summary-10-august-2021\/\" rel=\"noopener noreferrer\" data-wpel-link=\"internal\">Microsoft Security Update Summary (10. August 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/08\/11\/patchday-windows-10-updates-10-august-2021\/\" rel=\"noopener noreferrer\" data-wpel-link=\"internal\">Patchday: Windows 10-Updates (10. August 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/08\/11\/patchday-updates-fr-windows-7-server-2008-r2-10-august-2021\/\" rel=\"noopener noreferrer\" data-wpel-link=\"internal\">Patchday: Updates f\u00fcr Windows 7\/Server 2008 R2 (10. August 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2021\/08\/11\/patchday-windows-8-1-server-2012-updates-10-august-2021\/\" rel=\"noopener noreferrer\" data-wpel-link=\"internal\">Patchday: Windows 8.1\/Server 2012-Updates (10. August 2021)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/?p=256600\" rel=\"noopener noreferrer\" data-wpel-link=\"internal\">Patchday Microsoft Office Updates (10. August 2021)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Zum 10. August hat Microsoft diverse Updates f\u00fcr Windows 7 SP1-Systeme, die noch im ESU-Support sind freigegeben. Auch mit ESU Bypass v11 funktioniert das Ganze weiterhin. Diese Sicherheitsupdates sind aber auch f\u00fcr Windows Server 2008 R2 mit ESU-Support verf\u00fcgbar. Hier &hellip; <a href=\"https:\/\/borncity.com\/blog\/2021\/08\/11\/patchday-updates-fr-windows-7-server-2008-r2-10-august-2021\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426,185,2557],"tags":[8271,4328,4315,4294,2916],"class_list":["post-256574","post","type-post","status-publish","format-standard","hentry","category-sicherheit","category-update","category-windows-server","tag-patchday-8-2021","tag-sicherheit","tag-update","tag-windows-7","tag-windows-server-2008-r2"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/256574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=256574"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/256574\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=256574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=256574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=256574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}