{"id":271263,"date":"2022-08-05T23:36:56","date_gmt":"2022-08-05T21:36:56","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=271263"},"modified":"2024-07-12T11:48:11","modified_gmt":"2024-07-12T09:48:11","slug":"microsoft-edge-104-0-1293-47-5-august-2022-mit-fixes-fr-schwachstellen","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2022\/08\/05\/microsoft-edge-104-0-1293-47-5-august-2022-mit-fixes-fr-schwachstellen\/","title":{"rendered":"Microsoft Edge 104.0.1293.47 (5. August 2022) mit Fixes f&uuml;r Schwachstellen"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"margin: 0px 10px 0px 0px;\" title=\"Edge\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2020\/01\/Edge.jpg\" alt=\"Edge\" width=\"65\" height=\"67\" align=\"left\" border=\"0\" \/>Microsoft hat zum 5. August 2022 den Edge-Browser im Stable Channel auf die Version 104.0.1293.47 aktualisiert. Es ist ein Sicherheitsupdate, welches auch einen Fix f\u00fcr Schwachstellen umfasst und gleichzeitig den 104er Entwicklungszweig einleitet.<\/p>\n<p><!--more--><\/p>\n<p>Die <a href=\"https:\/\/docs.microsoft.com\/en-us\/deployedge\/microsoft-edge-relnotes-security\" target=\"_blank\" rel=\"noopener\">Release Notes<\/a> geben keine weiteren Details zum Update her, au\u00dfer dass die Schwachstellen<\/p>\n<ul>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-33636\" target=\"_blank\" rel=\"noopener\">CVE-2022-33636<\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-33649\" target=\"_blank\" rel=\"noopener\">CVE-2022-33649<\/a><\/li>\n<li><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35796\" target=\"_blank\" rel=\"noopener\">CVE-2022-35796<\/a><\/li>\n<\/ul>\n<p>beseitigt werden. Der Browser sollte automatisch aktualisiert werden, kann aber auch auf der Edge-Seite (<a href=\"https:\/\/www.microsoft.com\/de-de\/edge\" target=\"_blank\" rel=\"noopener\">deutsch<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/edge\" target=\"_blank\" rel=\"noopener\">englisch<\/a>) heruntergeladen werden.<\/p>\n<p>Erg\u00e4nzung: Von Microsoft ist mir noch folgende Auflistung zugegangen:<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-33636\" target=\"_blank\" rel=\"noopener\">CVE-2022-33636<\/a> | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability<br \/>\n&#8211; Reason for Revision: Information published.<br \/>\n&#8211; Originally posted: August 5, 2022<br \/>\n&#8211; Updated: N\/A<br \/>\n&#8211; Aggregate CVE Severity Rating: Moderate<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-33649\" target=\"_blank\" rel=\"noopener\">CVE-2022-33649<\/a> | Microsoft Edge (Chromium-based) Security Feature Bypass<br \/>\nVulnerability<br \/>\n&#8211; Reason for Revision: Information published.<br \/>\n&#8211; Originally posted: August 5, 2022<br \/>\n&#8211; Updated: N\/A<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-35796\" target=\"_blank\" rel=\"noopener\">CVE-2022-35796<\/a> | Microsoft Edge (Chromium-based) Elevation of Privilege<br \/>\nVulnerability<br \/>\n&#8211;<br \/>\n&#8211; Reason for Revision: Information published.<br \/>\n&#8211; Originally posted: August 5, 2022<br \/>\n&#8211; Updated: N\/A<br \/>\n&#8211; Aggregate CVE Severity Rating: Low<\/p>\n<p>The following CVEs were assigned by Chrome. Microsoft Edge<br \/>\n(Chromium-based) ingests Chromium, which addresses these vulnerabilities. Please see<br \/>\n<a href=\"https:\/\/chromereleases.googleblog.com\/2022\" target=\"_blank\" rel=\"noopener\">Google Chrome Releases<\/a> for more information.\u00a0See <a href=\"https:\/\/web.archive.org\/web\/20221202135942\/https:\/\/msrc-blog.microsoft.com\/2021\/01\/13\/security-update-guide-supports-cves-assigned-by-industry-partners\/\" target=\"_blank\" rel=\"noopener\">this page<\/a> for more information about third-party CVEs in the Security Update Guide.<\/p>\n<p>* CVE-2022-2603<br \/>\n* CVE-2022-2604<br \/>\n* CVE-2022-2605<br \/>\n* CVE-2022-2606<br \/>\n* CVE-2022-2610<br \/>\n* CVE-2022-2611<br \/>\n* CVE-2022-2612<br \/>\n* CVE-2022-2614<br \/>\n* CVE-2022-2615<br \/>\n* CVE-2022-2616<br \/>\n* CVE-2022-2617<br \/>\n* CVE-2022-2618<br \/>\n* CVE-2022-2619<br \/>\n* CVE-2022-2621<br \/>\n* CVE-2022-2622<br \/>\n* CVE-2022-2623<br \/>\n* CVE-2022-2624<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>&#8211; Version 1.0<br \/>\n&#8211; Reason for Revision: Information published.<br \/>\n&#8211; Originally posted: August 5, 2022<\/p>\n<p>Blog-Leser Robert hat mir per Mail noch folgende Infos zukommen lassen (danke daf\u00fcr).<\/p>\n<blockquote><p>passend zu der Benachrichtigung unten aktualisiert sich MSEdge jetzt auf die Version 104.0.1293.47 (Offizielles Build) (64-Bit)<\/p>\n<p>Evergreen findet die Version auch schon unter diesen direkten Download-Links:<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20221213234225\/https:\/\/msedge.sf.dl.delivery.mp.microsoft.com\/filestreamingservice\/files\/ae74ef31-bf5b-4f40-85c4-3ffbaffa865f\/MicrosoftEdgeEnterpriseX64.msi\" target=\"_blank\" rel=\"noopener\">05.08.2022 21:49:52<\/a><br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20221213225520\/https:\/\/msedge.sf.dl.delivery.mp.microsoft.com\/filestreamingservice\/files\/3cb618d3-63b0-46c6-8bb2-960494ad4c66\/MicrosoftEdgeWebView2RuntimeInstallerX64.exe\" target=\"_blank\" rel=\"noopener\">05.08.2022 21:50:12<\/a><\/p>\n<p>Der extended Kanal ist noch auf der 102.x, wird aber sicher auch bald nachziehen. Im WSUS oder Winget ist davon ebenfalls noch nichts zu sehen.<\/p><\/blockquote>\n<p>Erg\u00e4nzung: Die Updates sind laut Robert inzwischen auch am WSUS eingetroffen.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft hat zum 5. August 2022 den Edge-Browser im Stable Channel auf die Version 104.0.1293.47 aktualisiert. Es ist ein Sicherheitsupdate, welches auch einen Fix f\u00fcr Schwachstellen umfasst und gleichzeitig den 104er Entwicklungszweig einleitet.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4461,426],"tags":[4201,4328],"class_list":["post-271263","post","type-post","status-publish","format-standard","hentry","category-edge","category-sicherheit","tag-edge","tag-sicherheit"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/271263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=271263"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/271263\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=271263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=271263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=271263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}