Microsoft Security Update Releases – May 15, 2018

Microsoft has revised some Security Update Releases on May 15, 2018. Here is a short list, what has been changed. Addendum: Update revision from May 18, 2018 added.


Advertising

********************************************************************
Title: Microsoft Security Update Releases
Issued: May 15, 2018
********************************************************************

Summary
=======

The following CVEs have been published or have undergone a major
revision increment:

* CVE-2018-8147
* CVE-2018-8162
* CVE-2018-8176

Revision Information:
=====================


Advertising

– CVE-2018-8147 | Microsoft Excel Remote Code Execution
Vulnerability
https://portal.msrc.microsoft.com/en-us/security-guidance
– Version: 2.0
– Reason for Revision: Microsoft is announcing the availability
of the 16.13.18051301 update for Microsoft Office 2016 for Mac.
Customers running affected Mac software should install the
update for their product to be protected from this vulnerability.
Customers running other Microsoft Office software do not need to
take any action. See the Release Notes for more information and
download links.
– Originally posted: May 8, 2018
– Updated: May 15, 2018
– Aggregate CVE Severity Rating: Important

– CVE-2018-8162 | Microsoft Excel Remote Code Execution
Vulnerability
https://portal.msrc.microsoft.com/en-us/security-guidance
– Version: 2.0
– Reason for Revision: Revised the Affected Products table to
include Microsoft Office 2016 for Mac because it is affected
by this CVE. Microsoft recommends that customers running
Microsoft Office 2016 for Mac install the update to be protected
from this vulnerability.
– Originally posted: May 8, 2018
– Updated: May 15, 2018
– Aggregate CVE Severity Rating: Important

– CVE-2018-8176 | Microsoft PowerPoint Remote Code Execution
Vulnerability
https://portal.msrc.microsoft.com/en-us/security-guidance
– Version: 2.0
– Reason for Revision: Information published. This CVE has
been added to this month's Security Updates. Microsoft
recommends that customers running Microsoft Office 2016 for Mac
install the update to be protected from this vulnerability.
– Originally posted: May 15, 2018
– Updated: N/A
– Aggregate CVE Severity Rating: Important

The following advisory has undergone a major revision increment:

* ADV180002

Revision Information:
=====================

– ADV180002 | Guidance to mitigate speculative execution
side-channel vulnerabilities
https://portal.msrc.microsoft.com/en-us/security-guidance
– Version: 19.0
– Reason for Revision: Updated FAQ #14 to announce that a
stand-alone update for Windows 10 Version 1803 and Windows
Server, version 1803 is available via the Microsoft Update
Catalog. This update includes microcode updates from Intel.
See Microsoft Knowledge Base Article 4100347 for more
information.
– Originally posted: January 3, 2018
– Updated: May 15, 2018
– Aggregate CVE Severity Rating: Important

*******************************************************************
Title: Microsoft Security Update Releases
Issued: May 18, 2018
********************************************************************

Summary
=======

The following CVE has been published or has undergone a major
revision increment:

* CVE-2018-0886

Revision Information:
=====================

– CVE-2018-0886 | CredSSP Remote Code Execution Vulnerability
– https://portal.msrc.microsoft.com/en-us/security-guidance
– Reason for Revision: In the Affected Products table, reverted
the security update entries for Windows 10 Version 1511 back to
the March security update (4088779) because a May 2018 update is
not available for this version. See the FAQ section for more
information about how to be protected from this vulnerability if
you are running Windows 10 Version 1511.
– Originally posted: March 13, 2018
– Updated: May 18, 2018
– Aggregate CVE Severity Rating: Important
– Version: 3.0


Cookies helps to fund this blog: Cookie settings
Advertising


This entry was posted in Security, Update and tagged , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *