{"id":10499,"date":"2019-07-18T00:38:00","date_gmt":"2019-07-17T22:38:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=10499"},"modified":"2022-11-03T10:36:38","modified_gmt":"2022-11-03T09:36:38","slug":"microsoft-sicherheitshinweise-juli-2019","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/07\/18\/microsoft-sicherheitshinweise-juli-2019\/","title":{"rendered":"Microsoft Security Advisories July 2019"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2019\/07\/17\/microsoft-sicherheitshinweise-juli-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]One more small addendum: In July 2019 Microsoft published some security advisories, which I don't want to withhold from you. Among other things there is an update in PowerShell Core 6.1.5 and 6.2.2 to fix a security vulnerability.<\/p>\n<p><!--more--><\/p>\n<h2>Security Update for PowerShell Core 6.1.5 and 6.2.2<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg05.met.vgwort.de\/na\/ee09035622124730986927b9579b5c17\" width=\"1\" height=\"1\">On July 16, 2019, Microsoft released the security advisory CVE-2019-1167 titled <em>Windows Defender Application Control Security Feature Bypass Vulnerability<\/em>. The information was sent to me by mail the night before:<\/p>\n<p>Revision Information: CVE-2019-1167&nbsp; <br \/>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-1167\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-1167<\/a><br \/>&#8211; Version: 1.0<br \/>&#8211; Reason for Revision: Information published.<br \/>&#8211; Originally posted: July 16, 2019<br \/>&#8211; Updated: N\/A<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>A vulnerability exists in the Windows Defender Application Control (WDAC) that could allow an attacker to bypass the WDAC mechanisms. An attacker who has successfully exploited this vulnerability could bypass the PowerShell Core Constrained Language Mode on the computer. For more details, see the articles linked in security advisory <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-1167\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-1167<\/a> . <\/p>\n<p>**************************************************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: July 9, 2019<br \/>**************************************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2019-0683<br \/>* CVE-2019-0998<br \/>* CVE-2019-1072<\/p>\n<p>&nbsp; <br \/>Revision Information:<br \/>=====================<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-0683\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0683<\/a><br \/>&#8211; Version: 3.0<br \/>&#8211; Reason for Revision: On July 9, 2019, Microsoft released security updates for all<br \/>&nbsp;&nbsp; versions of Microsoft Windows to set the new trust flag to Yes for CVE-2018-0683, <br \/>&nbsp;&nbsp; the CVE that addresses the issue described in ADV190006. For more information please<br \/>&nbsp;&nbsp; see <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4490425\/updates-to-tgt-delegation-across-incoming-trusts-in-windows-server\" target=\"_blank\" rel=\"noopener noreferrer\">KB4490425<\/a>.<br \/>&#8211; Originally posted: March 12, 2019<br \/>&#8211; Updated: June 11, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-0998\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0998<\/a><br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Information revised to announce the release of a new Windows<br \/>&nbsp;&nbsp; 10 Version 1903 security update (4507453) for CVE-2019-0998. The update adds to <br \/>&nbsp;&nbsp; the original release to comprehensively address CVE-2019-0998. Microsoft <br \/>&nbsp;&nbsp; recommends that customers running the affected software install the security<br \/>&nbsp;&nbsp; update to be fully protected from the vulnerability described in this CVE.<br \/>&#8211; Originally posted: June 11, 2019<br \/>&#8211; Updated: July 9, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-1072\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-1072<\/a><br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Added Team Foundation Server 2010 SP1 (x86) and Team <br \/>&nbsp;&nbsp; Foundation Server 2010 SP1 (x64) to the Security Updates table as there are<br \/>&nbsp;&nbsp; unique security updates for each architecture. Corrected Security Update <br \/>&nbsp;&nbsp; download links for Team Foundation Server 2012 Update 4, Team Foundation Server<br \/>&nbsp;&nbsp; 2013 Update 5, and Azure DevOps Server 2019.0.1. <br \/>&#8211; Originally posted: July 9, 2019<br \/>&#8211; Updated: July 9, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Critical<\/p>\n<p>**************************************************************************************<br \/>Title: Microsoft Security Advisory Notification<br \/>Issued: July 9, 2019<br \/>**************************************************************************************<\/p>\n<p>Security Advisories Released or Updated on July 9, 2019<br \/>======================================================================================<\/p>\n<p>* Microsoft Security Advisory ADV990001<\/p>\n<p>&#8211; ADV990001 | Latest Servicing Stack Updates<br \/>&#8211; Reason for Revision: A Servicing Stack Update has been released for all supported <br \/>&nbsp;&nbsp; versions of Windows 10, Windows 8.1, Windows Server 2012 R2 and Windows Server <br \/>&nbsp;&nbsp; 2012. See the FAQ section for more information.<br \/>&#8211; Originally posted: November 13, 2018<br \/>&#8211; Updated: July 9, 2019<br \/>&#8211; Version: 11.0<\/p>\n<p>* Microsoft Security Advisory ADV190006<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190006\" target=\"_blank\" rel=\"noopener noreferrer\">ADV190006<\/a> <\/p>\n<p>| Guidance to mitigate unconstrained delegation vulnerabilities<br \/>&#8211; Reason for Revision: On July 9, 2019, Microsoft released security updates for all<br \/>&nbsp;&nbsp; versions of Microsoft Windows to set the new trust flag to Yes for CVE-2019-0683, <br \/>&nbsp;&nbsp; the CVE that addresses the issue described in ADV190006. For more information<br \/>&nbsp;&nbsp; please see <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4490425\/updates-to-tgt-delegation-across-incoming-trusts-in-windows-server\" target=\"_blank\" rel=\"noopener noreferrer\">KB4490425<\/a>.<br \/>&#8211; Originally posted: February 12, 2019<br \/>&#8211; Updated: July 9, 2019<br \/>&#8211; Version: 1.4<\/p>\n<p>* Microsoft Security Advisory ADV190021<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20191204113334\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190021\" target=\"_blank\" rel=\"noopener noreferrer\">ADV190021<\/a> | Outlook on the web Cross-Site Scripting Vulnerability<br \/>&#8211; Reason for Revision: Information published.<br \/>&#8211; Originally posted: July 9, 2019<br \/>&#8211; Updated: N\/A<br \/>&#8211; Version: 1.0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]One more small addendum: In July 2019 Microsoft published some security advisories, which I don't want to withhold from you. Among other things there is an update in PowerShell Core 6.1.5 and 6.2.2 to fix a security vulnerability.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[65,69],"class_list":["post-10499","post","type-post","status-publish","format-standard","hentry","category-security","tag-microsoft","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/10499","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=10499"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/10499\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=10499"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=10499"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=10499"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}