{"id":11142,"date":"2019-09-12T00:08:00","date_gmt":"2019-09-11T22:08:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=11142"},"modified":"2022-11-03T10:36:55","modified_gmt":"2022-11-03T09:36:55","slug":"microsoft-security-advisory-notifications-and-revisions-sept-2019","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/09\/12\/microsoft-security-advisory-notifications-and-revisions-sept-2019\/","title":{"rendered":"Microsoft Security Advisory Notifications and Revisions (Sept. 2019)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">Microsoft has released some security notifications and revision info for the patchday and afterwards. I'll just post them here in the blog for information. <\/p>\n<p><!--more--><\/p>\n<p>********************************************************************************<br \/>Title: Microsoft Security <img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg06.met.vgwort.de\/na\/dbd754ae4b3746b9a8d50acdd2b24632\" width=\"1\" height=\"1\">Advisory Notification<br \/>Issued: September 10, 2019<br \/>********************************************************************************<\/p>\n<p>Security Advisories Released or Updated on September 10, 2019<br \/>================================================================<\/p>\n<p>* Microsoft Security Advisory ADV990001<\/p>\n<p>&#8211; ADV990001 | Latest Servicing Stack Updates<br \/>&#8211; Reason for Revision: A Servicing Stack Update has been released for all supported<br \/>&nbsp;&nbsp; versions of Windows. See the FAQ section for more information.<br \/>&#8211; Originally posted: November 13, 2018<br \/>&#8211; Updated: September 10, 2019<br \/>&#8211; Version: 14.0<\/p>\n<p>* Microsoft Security Advisory ADV190009 <\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190009\" target=\"_blank\" rel=\"noopener noreferrer\">ADV19000<\/a>9 | SHA-2 Code Sign Support Advisory<br \/>&#8211; Reason for Revision: TTo address a known issue on systems running Windows 7 Service<br \/>&nbsp;&nbsp; Pack 1, Windows Server 2008 R2 Service Pack 1, and Windows Server 2008 Service <br \/>&nbsp;&nbsp; Pack 2, Microsoft is re-releasing KB4474419. Microsoft recommends that customers <br \/>&nbsp;&nbsp; running these versions of Windows reinstall update 4474419. <br \/>&#8211; Originally posted: March 12, 2019<br \/>&#8211; Updated: September 10, 2019<br \/>&#8211; Version: 5.0<\/p>\n<p>* Microsoft Security Advisory ADV190013<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20200916142137\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190013\" target=\"_blank\" rel=\"noopener noreferrer\">ADV190013<\/a> | Microsoft Guidance to mitigate Microarchitectural Data Sampling<br \/>&nbsp;&nbsp; vulnerabilities<br \/>&#8211; &#8211; Reason for Revision: The following updates have been made: 1. Microsoft has <br \/>&nbsp;&nbsp; released security updates to provide protections against the Microarchitectural<br \/>&nbsp;&nbsp; Data Sampling vulnerabilities for the 32-bit (x86) versions of Windows Server<br \/>&nbsp;&nbsp; 2008, Windows 7, Windows 8.1, Windows 10 Version 1607, Windows 10 Version 1703, <br \/>&nbsp;&nbsp; Windows 10 Version 1709, Windows 10 Version 1803, Windows 10 Version 1809, and<br \/>&nbsp;&nbsp; Windows 10 Version 1903. These updates are included in the September Security Only<br \/>&nbsp;&nbsp; and Monthly Rollup updates. See the Affected Products table for links to download <br \/>&nbsp;&nbsp; and install the updates. 2. Removed FAQ #3 regarding updates for Windows Server <br \/>&nbsp;&nbsp; 2008 for x64-based Systems as these updates are now available. 3. Replaced FAQ #3<br \/>&nbsp;&nbsp; with information about the availability of protections for customers running Windows<br \/>&nbsp;&nbsp; 10 for 32-bit Systems. 4. In the Recommended Actions section, removed the<br \/>&nbsp;&nbsp; \"Important\" note stating that microcode updates related to Microarchitectural Data<br \/>&nbsp;&nbsp; Sampling vulnerabilities were not available for supported editions of Windows 10 <br \/>&nbsp;&nbsp; version 1803, Windows 10 version 1903, and Windows Server 2019 because these<br \/>&nbsp;&nbsp; microcode updates are now available. See [<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4093836\/summary-of-intel-microcode-updates\" target=\"_blank\" rel=\"noopener noreferrer\">Summary of Intel microcode updates<\/a>].<br \/>&nbsp;&nbsp; for more information.<br \/>&#8211; Originally posted: May 14, 2019<br \/>&#8211; Updated: September 10, 2019<br \/>&#8211; Version: 3.0<\/p>\n<p>* Microsoft Security Advisory ADV190023<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190023\" target=\"_blank\" rel=\"noopener noreferrer\">ADV190023<\/a> | Microsoft Guidance for Enabling LDAP Channel Binding and LDAP Signing<br \/>&#8211; Reason for Revision: Revised Recommended Actions section to provide customers with<br \/>&nbsp;&nbsp; more detailed information about actions to take to make LDAP channel binding and <br \/>&nbsp;&nbsp; LDAP signing on Active Directory Domain Controllers more secure.<br \/>&#8211; Originally posted: August 13, 2019<br \/>&#8211; Updated: September 10, 2019<br \/>&#8211; Version: 1.1<\/p>\n<p>********************************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: October 9, 2018<br \/>********************************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following bulletin has undergone a major revision increment:<\/p>\n<p>* MS11-025<br \/>&nbsp;<br \/>Revision Information:<br \/>=====================<\/p>\n<p>&#8211; <a href=\"https:\/\/docs.microsoft.com\/en-us\/security-updates\/SecurityBulletins\/2011\/ms11-025\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2010-3190<\/a>: MFC Insecure Library Loading Vulnerability<br \/>&#8211; Reason for Revision: Added Exchange Servers to the Affected <br \/>&nbsp;&nbsp; Products table. Customers who have any supported Exchange Server <br \/>&nbsp;&nbsp; installed (Microsoft Exchange Server 2010 Service Pack 3, <br \/>&nbsp;&nbsp; Microsoft Exchange Server 2013, Microsoft Exchange Server 2016) <br \/>&nbsp;&nbsp; should reinstall KB2565063. <br \/>&#8211; Originally posted: April 12, 2011<br \/>&#8211; Updated: October 9, 2018<br \/>&#8211; Aggregate CVE Severity Rating: Important<br \/>&#8211; Version: 5.0<\/p>\n<p>**************************************************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: September 10, 2019<br \/>**************************************************************************************<\/p>\n<p>On September 10, the Major Revision Mailer that was sent contained incorrect <br \/>information. Following is the corrected mailer. We apologize for any inconvenience.<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2018-15664<br \/>* CVE-2018-8269<br \/>* CVE-2019-1183<\/p>\n<p>Revision Information:<br \/>=====================<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-15664\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-15664<\/a> | Docker Elevation of Privilege Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Microsoft has released an update to provide protection for <br \/>&nbsp;&nbsp; Azure Kubernetes Service. Please see the Security Updates table and the FAQs for<br \/>&nbsp;&nbsp; more information.<br \/>&#8211; Originally posted: July 9, 2019<br \/>&#8211; Updated: September 10, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-8269\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2018-8269<\/a> | OData Denial of Service Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Revised the Security Updates table to include ASP.NET Core 2.1 <br \/>&nbsp;&nbsp; and 6.2 because they are affected by CVE-2018-8269. See (Add link to issue in GitHub)<br \/>&nbsp;&nbsp; for more information.<br \/>&#8211; Originally posted: September 11, 2018<br \/>&#8211; Updated: September 10, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20191219152712\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-1183\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-1183<\/a> | Windows VBScript Engine Remote Code Execution Vulnerability<br \/>&#8211;&nbsp; Version: 2.0<br \/>&#8211; Reason for Revision: This information is being revised to indicate that this CVE <br \/>&nbsp;&nbsp; (CVE-2019-1183) is fully mitigated by the security updates for the vulnerability<br \/>&nbsp;&nbsp; discussed in CVE-2019-1194. No update is required.<br \/>&#8211; Originally posted: August 13, 2019<br \/>&#8211; Updated: September 10, 2019<br \/>&#8211; Aggregate CVE Severity Rating: N\/A<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has released some security notifications and revision info for the patchday and afterwards. I'll just post them here in the blog for information.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-11142","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/11142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=11142"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/11142\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=11142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=11142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=11142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}