{"id":256644,"date":"2021-08-13T06:05:49","date_gmt":"2021-08-13T04:05:49","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=256644"},"modified":"2021-08-14T05:22:19","modified_gmt":"2021-08-14T03:22:19","slug":"microsoft-security-update-revisions-august-2021-patchday-sicherheitsfixes","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2021\/08\/13\/microsoft-security-update-revisions-august-2021-patchday-sicherheitsfixes\/","title":{"rendered":"Microsoft Security Update Revisions, August 2021-Patchday Sicherheitsfixes"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\" align=\"left\"\/>[<a href=\"https:\/\/borncity.com\/win\/2021\/08\/13\/microsoft-security-update-revisions-august-2021-patchday-sicherheitsfixes\/\" rel=\"noopener\" target=\"_blank\">English<\/a>]Zum Patchday (10. August 2021) hat Microsoft ja eine Reihe an Schwachstellen durch Updates geschlossen. Mir liegt eine \u00dcbersicht vor, die ich der Vollst\u00e4ndigkeit halber einstelle. Zudem hat Microsoft die Tage in Mails zwei Security Update Revisions verteilt, die ich hier ebenfalls ver\u00f6ffentliche. Vielleicht ist das f\u00fcr jemanden von Interesse.<\/p>\n<p><!--more--><\/p>\n<h2>Microsoft Security Update Revisions<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg02.met.vgwort.de\/na\/8dfa7e09d05a4cfda06cd8ea9a4d24d5\" width=\"1\" height=\"1\"\/>Zum 11. August hat Microsoft die nachfolgende Information zur Print-Spooler-Dienst-Schwachstelle ver\u00f6ffentlicht.<\/p>\n<p>***********************************************************************<br \/>Title: Microsoft Security Update Revisions<br \/>Issued: August 11, 2021<br \/>***********************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVE has been published to the Security Update Guide.<\/p>\n<p>=======================================================================<\/p>\n<p>* CVE-2021-36958<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36958\" rel=\"noopener\" target=\"_blank\">CVE-2021-36958<\/a> | Windows Print Spooler Remote Code Execution Vulnerability<br \/>&#8211; Version: 1.0<br \/>&#8211; Reason for Revision: Information published.<br \/>&#8211; Originally posted: August 11, 2021<br \/>&#8211; Updated: N\/A<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>Zu diesem Sachverhalt hatte ich bereits etwas im Artikel <a href=\"https:\/\/borncity.com\/blog\/2021\/08\/12\/windows-printnightmare-neue-runde-mit-cve-2021-36958\/\">Windows PrintNightmare, neue Runde mit CVE-2021-36958<\/a> geschrieben. Die PrintNightmare-Schwachstellen werden bereits in freier Wildbahn ausgenutzt (siehe <a href=\"https:\/\/borncity.com\/blog\/2021\/08\/12\/ransomware-gang-nutzt-printnightmare-fr-angriffe-auf-windows-server\/\">Ransomware-Gang nutzt PrintNightmare f\u00fcr Angriffe auf Windows Server<\/a>). Zudem wurde das nachfolgende Dokument mit Hinweisen auf weitere Revisionen ver\u00f6ffentlicht.<\/p>\n<p>***********************************************************************<br \/>Title: Microsoft Security Update Revisions<br \/>Issued: August 11, 2021<br \/>***********************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs have undergone a major revision increment.<\/p>\n<p>=======================================================================<\/p>\n<p>* CVE-2021-34524<br \/>* CVE-2021-36949<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34524\" rel=\"noopener\" target=\"_blank\">CVE-2021-34524<\/a> | Microsoft Dynamics 365 (on-premises) Remote Code Execution<br \/>Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Microsoft is announcing the availability of the security<br \/>updates for Microsoft Dynamics 365 (on-premises) version 9.1. Customers running<br \/>affected Dynamics software should install the update for their product to be<br \/>protected from this vulnerability. Customers running other versions of Microsoft<br \/>Dynamics 365 (on-premises) do not need to take any action. See the KB4618809<br \/>for more information and download links.<br \/>&#8211; Originally posted: August 10, 2021<br \/>&#8211; Updated: August 11, 2021<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36949\" rel=\"noopener\" target=\"_blank\">CVE-2021-36949<\/a> | Microsoft Azure Active Directory Connect Authentication Bypass<br \/>Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: The following revisions have been made: 1) In the Security<br \/>Updates table, added Azure Active Directory Connect Provisioning Agent as it<br \/>is also affected by this vulnerability 2) Updated FAQs.<br \/>&#8211; Originally posted: August 10, 2021<br \/>&#8211; Updated: August 10, 2021<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>***********************************************************************<br \/>Title: Microsoft Security Update Revisions<br \/>Issued: August 12, 2021<br \/>***********************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVE has undergone informational revisions.<\/p>\n<p>=======================================================================<\/p>\n<p>The following CVEs have undergone a major revision increment.<\/p>\n<p> &#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26423\" target=\"_blank\" rel=\"noopener\">CVE-2021-26423<\/a> | .NET Core and Visual Studio Denial of Service Vulnerability<br \/> &#8211; Version: 2.0<br \/> &#8211; Reason for Revision: Revised the Security Updates table to include PowerShell 7.0 <br \/>&nbsp;&nbsp; and PowerShell 7.1 because these versions of PowerShell 7 incorporate the versions<br \/>&nbsp;&nbsp; of .NET Core that are affected by this vulnerability. See<br \/>&nbsp;&nbsp; <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/25\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/25<\/a> for more information. <br \/> &#8211; Originally posted: August 10, 2021<br \/> &#8211; Updated: August 12, 2021<br \/> &#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>* CVE-2021-34485<\/p>\n<p> &#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34485\" target=\"_blank\" rel=\"noopener\">CVE-2021-34485<\/a> | .NET Core and Visual Studio Denial of Service Vulnerability<br \/> &#8211; Version: 2.0<br \/> &#8211; Reason for Revision: Revised the Security Updates table to include PowerShell 7.0 <br \/>&nbsp;&nbsp; and PowerShell 7.1 because these versions of PowerShell 7 incorporate the versions<br \/>&nbsp;&nbsp; of .NET Core that are affected by this vulnerability. See<br \/>&nbsp;&nbsp; <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/24\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/24<\/a> for more information. <br \/> &#8211; Originally posted: August 10, 2021<br \/> &#8211; Updated: August 12, 2021<br \/> &#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>The following CVEs have undergone informational revisions.<\/p>\n<p> &#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-26432\" target=\"_blank\" rel=\"noopener\">CVE-2021-26432<\/a> | Windows Services for NFS ONCRPC XDR Driver Remote Code Execution <br \/>&nbsp;&nbsp; Vulnerability<br \/> &#8211; Version: 1.1<br \/> &#8211; Reason for Revision: Added FAQ to provide further vulnerability details. <br \/>&nbsp;&nbsp; This is an informational change only.<br \/> &#8211; Originally posted: August 10, 2021<br \/> &#8211; Updated: August 12, 2021<br \/> &#8211; Aggregate CVE Severity Rating: Critical<\/p>\n<p> &#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36934\" target=\"_blank\" rel=\"noopener\">CVE-2021-36934<\/a> | Windows Elevation of Privilege Vulnerability<br \/> &#8211; Version: 5.1<br \/> &#8211; Reason for Revision: Updated FAQ information. This is an informational change<br \/>&nbsp;&nbsp; only.<br \/> &#8211; Originally posted: July 20, 2021<br \/> &#8211; Updated: August 12, 2021<br \/> &#8211; Aggregate CVE Severity Rating: Important<\/p>\n<h2>Qualys August 2021 Patchday-\u00dcbersicht<\/h2>\n<p>Microsoft und Adobe haben am Patch Tuesday (10 August 2021) Sicherheitsupdates f\u00fcr diverse Produkte freigegeben. Von Microsoft wurden 51 Schwachstellen, davon 7 kritisch, und 3 waren 0-days, geschlossen. Adobe hat 29 Schwachstellen durch Sicherheitsupdate geschlossen. Eine detaillierte \u00dcbersicht der gepatchten Schwachstellen findet sich in <a href=\"https:\/\/blog.qualys.com\/vulnerabilities-threat-research\/2021\/08\/10\/microsoft-and-adobe-patch-tuesday-august-2021-microsoft-51-vulnerabilities-with-7-critical-adobe-29-vulnerabilities\" rel=\"noopener\" target=\"_blank\">diesem Qualys-Bericht<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Zum Patchday (10. August 2021) hat Microsoft ja eine Reihe an Schwachstellen durch Updates geschlossen. Mir liegt eine \u00dcbersicht vor, die ich der Vollst\u00e4ndigkeit halber einstelle. Zudem hat Microsoft die Tage in Mails zwei Security Update Revisions verteilt, die ich &hellip; <a href=\"https:\/\/borncity.com\/blog\/2021\/08\/13\/microsoft-security-update-revisions-august-2021-patchday-sicherheitsfixes\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[8271,4328,4315],"class_list":["post-256644","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-patchday-8-2021","tag-sicherheit","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/256644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=256644"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/256644\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=256644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=256644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=256644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}