{"id":15160,"date":"2020-07-27T10:20:20","date_gmt":"2020-07-27T08:20:20","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=15160"},"modified":"2023-01-03T13:50:59","modified_gmt":"2023-01-03T12:50:59","slug":"microsoft-sicherheitshinweise-und-weitere-patches-juli-2020","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/07\/27\/microsoft-sicherheitshinweise-und-weitere-patches-juli-2020\/","title":{"rendered":"Microsoft Security Advisories and other Patches (July 2020)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/07\/27\/microsoft-sicherheitshinweise-und-weitere-patches-juli-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]Microsoft has published some security advisories about vulnerabilities and released further updates around 14 July 2020. I would like to add this information to the blog post.<\/p>\n<p><!--more--><\/p>\n<h2>IIS-Server Request Smuggling Filter<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg04.met.vgwort.de\/na\/943f5f62e2e44158b9c4565c0705b280\" width=\"1\" height=\"1\">Microsoft&nbsp; is aware of a manipulation capability in the IIS server that can be used to modify sequences of HTTP requests (such as HTTP proxies (front-end) and web servers (back-end)) that come from multiple sources. An attacker who successfully exploited the vulnerability could merge multiple requests into the body of a single request to a Web server, which could allow him to modify responses or retrieve information from another user's HTTP session. <\/p>\n<p>Microsoft recommends that administrators check the front-end environment configurations and, if necessary, enable the Request Smuggling Filter of requests. Testing is required to determine that front-end load balancers and proxies do not forward faulty requests; these requests are rejected when the filter is enabled and may interfere with communication. Details can be found in <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/ADV200008\" target=\"_blank\" rel=\"noopener noreferrer\">ADV200008<\/a>.<\/p>\n<h2>Servicing Stack Update mitigates vulnerability<\/h2>\n<p>Microsoft has released a Servicing Stack Update (SSU) for various versions of Windows. This update introduces quality improvements to the service stack, but also fixes a more critical vulnerability in the module installer. The update ensures that the Windows Modules Installer handles file operations correctly. For more information, see <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2020-1346\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-1346 | Windows Modules Installer Elevation of Privilege Vulnerability<\/a>. For a list of SSUs for various versions of Windows, see ADV990001.<\/p>\n<h2>Revisions to security advisories<\/h2>\n<p>Microsoft has also revised security advisories CVE-2020-0762, CVE-2020-0763 and CVE-2020-1469. <\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/CVE-2020-0762\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-0762<\/a> | Windows Defender Security Center Elevation of Privilege Vulnerability<br \/>&#8211; Version: 3.0<br \/>&#8211; Reason for Revision: In the Security Updates table the following revisions were<br \/>&nbsp;&nbsp; made: 1. Added Windows Server 2019 and Windows Server 2019 (Server Core<br \/>&nbsp;&nbsp; installation) because they are affected by this vulnerability. 2. Removed all<br \/>&nbsp;&nbsp; supported versions of Window 10 Version 1709 because they are not affected by<br \/>&nbsp;&nbsp; this vulnerability. 3. Corrected the Article and Download links.<br \/>&#8211; Originally posted: March 10, 2020<br \/>&#8211; Updated: July 14, 2020<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/CVE-2020-0762\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-0763<\/a> | Windows Defender Security Center Elevation of Privilege Vulnerability<br \/>&#8211; Version: 3.0<br \/>&#8211; Reason for Revision: In the Security Updates table the following revisions were <br \/>&nbsp;&nbsp; made: 1. Added all supported versions of Window 10 Version 1709 because they are<br \/>&nbsp;&nbsp; affected by this vulnerability. 2. Corrected the Article and Download links.<br \/>&#8211; Originally posted: March 10, 2020 <br \/>&#8211; Updated: July 14, 2020<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>CVE-2019-1469 | Win32k Information Disclosure Vulnerability<br \/>&#8211; Version: 3.0<br \/>&#8211; Reason for Revision: Added all versions of Windows 10 Version 2004 to the Security<br \/>&nbsp;&nbsp; Updates table because it is affected by this vulnerability. Microsoft recommends<br \/>&nbsp;&nbsp; that customers running Windows 10 Version 2004 install the latest security updates<br \/>&nbsp;&nbsp; to be fully protected from this vulnerability.<br \/>&#8211; Originally posted: December 10, 2020<br \/>&#8211; Updated: July 14, 2020<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<h2>Further updates as of 14 July 2020<\/h2>\n<p>On patchday, July 14, 2020, Microsoft has released further security updates for software.<\/p>\n<h3>Internet Explorer Security Update KB4565479<\/h3>\n<p>For Internet Explorer 11, Microsoft has released the cumulative security update KB4565479. This security update resolves vulnerabilities in Internet Explorer.&nbsp; If you are running Windows 7 through Windows 8.1 or their server counterparts and you install the security only security updates, you should also install the IE security update.<\/p>\n<h3>.NET Framework Update KB4566517<\/h3>\n<p>Microsoft has released a .NET Framework Update<a href=\"https:\/\/support.microsoft.com\/help\/4566517\/\" target=\"_blank\" rel=\"noopener noreferrer\">KB4566517<\/a> for Windows 7 SP1 and Windows Server 2008 R2 SP1, but it causes installation issues. I refer to the discussion in <a href=\"https:\/\/www.borncity.com\/blog\/2020\/07\/15\/patchday-updates-fr-windows-7-server-2008-r2-14-7-2020\/#comment-92332\" target=\"_blank\" rel=\"noopener noreferrer\">the German blog<\/a> and the <a href=\"https:\/\/www.askwoody.com\/forums\/topic\/recent-win7-kb4566517-update-failed-to-install\/\" target=\"_blank\" rel=\"noopener noreferrer\">forum thread at askwoody.com<\/a>.<\/p>\n<p>Update f\u00fcr Windows 7 SP1 und Windows Server 2008 R2 SP1 freigegeben, welches aber Installationsprobleme verursacht. Ich verweise auf <a href=\"https:\/\/www.borncity.com\/blog\/2020\/07\/15\/patchday-updates-fr-windows-7-server-2008-r2-14-7-2020\/#comment-92332\" target=\"_blank\" rel=\"noopener noreferrer\">die Diskussion<\/a> hier im Blog sowie den <a href=\"https:\/\/www.askwoody.com\/forums\/topic\/recent-win7-kb4566517-update-failed-to-install\/\" target=\"_blank\" rel=\"noopener noreferrer\">Forenthread bei askwoody.com<\/a>.<\/p>\n<p>There is also a new version of the .Net Framework Update KB4565636, called KB4565636-v2 (dated July 23, 2020), which is intended to resolve installation issues that ESU licensees may encounter with KB4565636. It may be downloaded from <a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4565636\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Update Catalog<\/a>.<\/p>\n<p><strong>Similar articles:<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/07\/08\/microsoft-office-patchday-july-72020\/\">Microsoft Office Patchday (July 7, 2020)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/07\/15\/microsoft-security-update-summary-july-14-2020\/\">Microsoft Security Update Summary (14. Juli 2020)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/07\/15\/patchday-windows-10-updates-july-14-2020\/\">Patchday: Windows 10-Updates (14. Juli 2020)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/07\/15\/patchday-windows-8-1-server-2012-updates-july-14-2020\/\">Patchday: Windows 8.1\/Server 2012-Updates (July 14, 2020)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/07\/15\/patchday-windows-7-server-2008-r2-updates-07-14-2020\/\">Patchday: Windows 7\/Server 2008 R2 Updates (07\/14\/2020)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Microsoft has published some security advisories about vulnerabilities and released further updates around 14 July 2020. I would like to add this information to the blog post.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547],"tags":[69,195],"class_list":["post-15160","post","type-post","status-publish","format-standard","hentry","category-security","category-software","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/15160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=15160"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/15160\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=15160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=15160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=15160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}