Addendum: Microsoft Security Update Releases (Aug. 11, 2020)

[German]Another addendum from this week as a follow-up to Patchday. Microsoft has issued a document 'Microsoft Security Update Releases' with two warnings about patched vulnerabilities. The message was required due to a revision of the CVEs.


Advertising

CVE-2020-0794 and CVE-2020-1347 have been revised, as reported in the document dated August 11, 2020. The advisory relates to the following vulnerabilities.

* CVE-2020-0794

CVE-2020-0794 | Windows Denial of Service Vulnerability
– Version 2.0
– Reason for Revision: In the Security Updates table, added all supported versions
   of Windows 10 for 32-bit Systems, Windows 10 for x64-based Systems, Windows 10
   Version 1607, and Windows Server 2016 because these versions of Windows 10 and
   Windows Server are also affected by this vulnerability. Microsoft strongly
   recommends that customers running any of these versions of Windows 10 or Windows
   Server install the updates to be fully protected from the vulnerability.
   Customers whose systems are configured to receive automatic updates do not need
   to take any further action.
– Originally posted: April 14, 2020
– Updated: August 11, 2020
– Aggregate CVE Severity Rating: Important

* CVE-2020-1347

CVE-2020-1347 | Windows Storage Services Elevation of Privilege Vulnerability
– Version: 2.0
– Reason for Revision: In the Security Updates table, added all supported versions
   of Windows 10 for 32-bit Systems, Windows 10 for x64-based Systems, Windows 10
   Version 1607, and Windows Server 2016 because these versions of Windows 10 and
   Windows Server are also affected by this vulnerability. Microsoft strongly
   recommends that customers running any of these versions of Windows 10 or Windows
   Server install the updates to be fully protected from the vulnerability.
   Customers whose systems are configured to receive automatic updates do not need
   to take any further action.
– Originally posted: July 14, 2020
– Updated: August 11, 2020
– Aggregate CVE Severity Rating: Important


Cookies helps to fund this blog: Cookie settings
Advertising


This entry was posted in Security and tagged . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *