{"id":263520,"date":"2022-03-18T22:59:35","date_gmt":"2022-03-18T21:59:35","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=263520"},"modified":"2022-03-18T22:59:35","modified_gmt":"2022-03-18T21:59:35","slug":"microsoft-security-update-revisions-17-3-2022","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2022\/03\/18\/microsoft-security-update-revisions-17-3-2022\/","title":{"rendered":"Microsoft Security Update Revisions (17.3.2022)"},"content":{"rendered":"<p>Microsoft hat zum 17. M\u00e4rz 2022 Revisionen seiner Sicherheitswarnungen und Update-Beschreibungen ver\u00f6ffentlicht. Hier eine Zusammenfassung dieser Revisionen, die mir per Mail zuging.<\/p>\n<p><!--more--><\/p>\n<p>*********************************************************<br \/>Title: Microsoft Security Update Revisions<br \/>Issued: March 17, 2022<br \/>*********************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg02.met.vgwort.de\/na\/f495bf70a5d2422bbee75ef489c439a1\" width=\"1\" height=\"1\"\/>The following CVEs have undergone revision increments.<br \/>=========================================================<\/p>\n<p>* CVE-2020-8927<br \/>* CVE-2022-24512<br \/>* CVE-2022-24511<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-8927\" target=\"_blank\" rel=\"noopener\">CVE-2020-8927<\/a> | Brotli Library Buffer Overflow Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell 7.0,<br \/>&nbsp;&nbsp; PowerShell 7.1, and PowerShell 7.2 because these versions of PowerShell 7 are <br \/>&nbsp;&nbsp; affected by this vulnerability. See <br \/>&nbsp;&nbsp; <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/30\" target=\"_blank\" rel=\"noopener\">Github<\/a> for more information.<br \/>&#8211; Originally posted: March 8, 2022<br \/>&#8211; Updated: March 16, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24512\" target=\"_blank\" rel=\"noopener\">CVE-2022-24512<\/a> | .NET and Visual Studio Remote Code Execution Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell 7.0,<br \/>&nbsp;&nbsp; PowerShell 7.1, and PowerShell 7.2 because these versions of PowerShell 7 are <br \/>&nbsp;&nbsp; affected by this vulnerability. See <br \/>&nbsp;&nbsp; <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/29\" target=\"_blank\" rel=\"noopener\">Github<\/a> for more information.<br \/>&#8211; Originally posted: March 8, 2022<br \/>&#8211; Updated: March 16, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24511\" target=\"_blank\" rel=\"noopener\">CVE-2022-24511<\/a> | Microsoft Office Word Tampering Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Microsoft is announcing the availability of the security <br \/>&nbsp;&nbsp; updates for Microsoft Office for Mac. Customers running affected Mac software<br \/>&nbsp;&nbsp; should install the update for their product to be protected from this <br \/>&nbsp;&nbsp; vulnerability. Customers running other Microsoft Office software do not need to<br \/>&nbsp;&nbsp; take any action. See the Release Notes for more information and download links.<br \/>&#8211; Originally posted: March 8, 2022<br \/>&#8211; Updated: March 16, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>Reason for Revision for the following CVEs: Corrected Download and Article links<br \/>in the Security Updates table. This is an informational change only.<\/p>\n<p>* CVE-2022-21977<br \/>* CVE-2022-22010<br \/>* CVE-2022-23283<br \/>* CVE-2022-23285<br \/>* CVE-2022-23299<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21977\" target=\"_blank\" rel=\"noopener\">CVE-2022-21977<\/a> | Media Foundation Information Disclosure Vulnerability<br \/>&#8211; Version: 1.2<br \/>&#8211; Originally posted: March 8, 2022<br \/>&#8211; Updated: March 16, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-22010\" target=\"_blank\" rel=\"noopener\">CVE-2022-22010<\/a> | Media Foundation Information Disclosure Vulnerability<br \/>&#8211; Version: 1.1<br \/>&#8211; Originally posted: March 8, 2022<br \/>&#8211; Updated: March 16, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23283\" target=\"_blank\" rel=\"noopener\">CVE-2022-23283<\/a> | Windows ALPC Elevation of Privilege Vulnerability<br \/>&#8211; Version: 1.1<br \/>&#8211; Originally posted: March 8, 2022<br \/>&#8211; Updated: March 16, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23285\" target=\"_blank\" rel=\"noopener\">CVE-2022-23285<\/a> | Remote Desktop Client Remote Code Execution Vulnerability<br \/>&#8211; Version: 1.1<br \/>&#8211; Originally posted: March 8, 2022<br \/>&#8211; Updated: March 17, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23299\" target=\"_blank\" rel=\"noopener\">CVE-2022-23299<\/a> | Windows PDEV Elevation of Privilege Vulnerability<br \/>&#8211; Version: 1.1<br \/>&#8211; Updated: March 17, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft hat zum 17. M\u00e4rz 2022 Revisionen seiner Sicherheitswarnungen und Update-Beschreibungen ver\u00f6ffentlicht. Hier eine Zusammenfassung dieser Revisionen, die mir per Mail zuging.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[426],"tags":[4328],"class_list":["post-263520","post","type-post","status-publish","format-standard","hentry","category-sicherheit","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/263520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=263520"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/263520\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=263520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=263520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=263520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}