{"id":262458,"date":"2022-02-10T10:24:28","date_gmt":"2022-02-10T09:24:28","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=262458"},"modified":"2022-02-10T10:24:28","modified_gmt":"2022-02-10T09:24:28","slug":"microsoft-sicherheitsrevisionen-8-2-2022","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2022\/02\/10\/microsoft-sicherheitsrevisionen-8-2-2022\/","title":{"rendered":"Microsoft Sicherheitsrevisionen (8.2.2022)"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"margin: 0px 10px 0px 0px\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\" align=\"left\"\/>[English]Microsoft hat zum 8. Februar per Mail \u00fcber diverse Revisionen seiner Sicherheitshinweise hingewiesen. Es geht um eine Remote Desktop Services Remote Code Execution-Schwachstelle, einen Windows Kernel Memory Information Disclosure-Schwachstelle, eine Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege-Schwachstelle und eine Microsoft Power BI Information Disclosure-Schwachstelle. Zudem gab es im Feb. 2022 ein neues Servicing Stack Update (SSU), siehe <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/ADV990001\" target=\"_blank\" rel=\"noopener\">ADV990001<\/a>. Alles hat aber nur informellen Charakter, Microsoft hat nur die Beschreibungen angepasst. Ich stelle die betreffenden Informationen einfach mal unkommentiert hier im Blog ein.<\/p>\n<p><!--more--><\/p>\n<p>*********************************************************************<br \/><strong><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg04.met.vgwort.de\/na\/6162257a2baf43228dcd815c0772f852\" width=\"1\" height=\"1\"\/>Title: Microsoft Security Update Revisions<\/strong><br \/>Issued: February 8, 2022<br \/>*********************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs have undergone revision increments.<br \/>=====================================================================<\/p>\n<p>* CVE-2019-0887<br \/>* CVE-2021-34500<br \/>* CVE-2022-21871<br \/>* CVE-2022-23254<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2019-0887\" target=\"_blank\" rel=\"noopener\">CVE-2019-0887<\/a> | Remote Desktop Services Remote Code Execution Vulnerability<br \/>&#8211;&nbsp; Version: 3.0<br \/>&#8211; Reason for Revision: In the Security Updates table, added Remote Desktop client<br \/>&nbsp;&nbsp; for Windows Desktop as it is also affected by this vulnerability. Customers <br \/>&nbsp;&nbsp; running Remote Desktop client for Windows Desktop should ensure that they have <br \/>&nbsp;&nbsp; version 1.2.2691 or higher to be protected from this vulnerability.<br \/>&#8211; Originally posted: July 9, 2019<br \/>&#8211; Updated: February 8, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34500\" target=\"_blank\" rel=\"noopener\">CVE-2021-34500<\/a> | Windows Kernel Memory Information Disclosure Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: To comprehensively address CVE-2021-34500, Microsoft <br \/>&nbsp;&nbsp; has released Febuary 2022 security updates for the following supported <br \/>&nbsp;&nbsp; editions of Microsoft Windows: Windows 10, Windows 10 Version 1607, Windows 8.1,<br \/>&nbsp;&nbsp; Windows Server 2012 R2, Windows Server 2012, Windows 7, Windows Server 2008 R2,&nbsp; <br \/>&nbsp;&nbsp; and Windows Server 2008. Microsoft strongly recommends that customers install the<br \/>&nbsp;&nbsp; updates to be fully protected from the vulnerability. Customers whose systems are<br \/>&nbsp;&nbsp; configured to receive automatic updates do not need to take any further action.<br \/>&#8211; Originally posted: July 13, 2021<br \/>&#8211; Updated: February 8, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21871\" target=\"_blank\" rel=\"noopener\">CVE-2022-21871<\/a> | Microsoft Diagnostics Hub Standard Collector Runtime Elevation of<br \/>&nbsp;&nbsp; Privilege Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: In the Security Updates table, added the following versions<br \/>&nbsp;&nbsp; of Visual Studio as they also affected by CVE-2022-21871: Microsoft Visual Studio<br \/>&nbsp;&nbsp; 2019 version 16.9, Microsoft Visual Studio 2019 version 16.7, Microsoft Visual <br \/>&nbsp;&nbsp; Studio 2017 version 15.9, and Microsoft Visual Studio 2015 Update 3. Microsoft<br \/>&nbsp;&nbsp; strongly recommends that customers running any of these versions of Visual Studio<br \/>&nbsp;&nbsp; install the updates to be fully protected from the vulnerability. Customers whose<br \/>&nbsp;&nbsp; systems are configured to receive automatic updates do not need to take any <br \/>&nbsp;&nbsp; further action.<br \/>&#8211; Originally posted: January 11, 2022<br \/>&#8211; Updated: February 8, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23254\" target=\"_blank\" rel=\"noopener\">CVE-2022-23254<\/a> | Microsoft Power BI Information Disclosure Vulnerability<br \/> &#8211; Version: 1.1<br \/>&#8211; Reason for Revision: Corrected the CVE title and description to address the<br \/>&nbsp;&nbsp; vulnerability as Information Disclosure. In the Affected Products table, corrected<br \/>&nbsp;&nbsp; the Impact to Information Disclosure. This is an informational change only.<br \/>&#8211; Originally posted: February 8, 2022<br \/>&#8211; Updated: February 8, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Microsoft hat zum 8. Februar per Mail \u00fcber diverse Revisionen seiner Sicherheitshinweise hingewiesen. Es geht um eine Remote Desktop Services Remote Code Execution-Schwachstelle, einen Windows Kernel Memory Information Disclosure-Schwachstelle, eine Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege-Schwachstelle und &hellip; <a href=\"https:\/\/borncity.com\/blog\/2022\/02\/10\/microsoft-sicherheitsrevisionen-8-2-2022\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-262458","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/262458","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=262458"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/262458\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=262458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=262458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=262458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}