{"id":23721,"date":"2022-03-18T23:02:15","date_gmt":"2022-03-18T22:02:15","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=23721"},"modified":"2022-03-18T23:02:15","modified_gmt":"2022-03-18T22:02:15","slug":"microsoft-security-update-revisions-17-3-2022","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/03\/18\/microsoft-security-update-revisions-17-3-2022\/","title":{"rendered":"Microsoft Security Update Revisions (March 17, 2022)"},"content":{"rendered":"<p>Microsoft has released revisions to its security alerts and update descriptions as of March 17, 2022. Here is a summary of these revisions that I received by mail.<\/p>\n<p><!--more--><\/p>\n<p>*********************************************************<br \/>Title: Microsoft Security Update Revisions<br \/>Issued: March 17, 2022<br \/>*********************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg02.met.vgwort.de\/na\/f495bf70a5d2422bbee75ef489c439a1\" width=\"1\" height=\"1\">The following CVEs have undergone revision increments.<br \/>=========================================================<\/p>\n<p>* CVE-2020-8927<br \/>* CVE-2022-24512<br \/>* CVE-2022-24511<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2020-8927\" target=\"_blank\" rel=\"noopener\">CVE-2020-8927<\/a> | Brotli Library Buffer Overflow Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell 7.0,<br \/>&nbsp;&nbsp; PowerShell 7.1, and PowerShell 7.2 because these versions of PowerShell 7 are <br \/>&nbsp;&nbsp; affected by this vulnerability. See <br \/>&nbsp;&nbsp; <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/30\" target=\"_blank\" rel=\"noopener\">Github<\/a> for more information.<br \/>&#8211; Originally posted: March 8, 2022<br \/>&#8211; Updated: March 16, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24512\" target=\"_blank\" rel=\"noopener\">CVE-2022-24512<\/a> | .NET and Visual Studio Remote Code Execution Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell 7.0,<br \/>&nbsp;&nbsp; PowerShell 7.1, and PowerShell 7.2 because these versions of PowerShell 7 are <br \/>&nbsp;&nbsp; affected by this vulnerability. See <br \/>&nbsp;&nbsp; <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/29\" target=\"_blank\" rel=\"noopener\">Github<\/a> for more information.<br \/>&#8211; Originally posted: March 8, 2022<br \/>&#8211; Updated: March 16, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24511\" target=\"_blank\" rel=\"noopener\">CVE-2022-24511<\/a> | Microsoft Office Word Tampering Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: Microsoft is announcing the availability of the security <br \/>&nbsp;&nbsp; updates for Microsoft Office for Mac. Customers running affected Mac software<br \/>&nbsp;&nbsp; should install the update for their product to be protected from this <br \/>&nbsp;&nbsp; vulnerability. Customers running other Microsoft Office software do not need to<br \/>&nbsp;&nbsp; take any action. See the Release Notes for more information and download links.<br \/>&#8211; Originally posted: March 8, 2022<br \/>&#8211; Updated: March 16, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>Reason for Revision for the following CVEs: Corrected Download and Article links<br \/>in the Security Updates table. This is an informational change only.<\/p>\n<p>* CVE-2022-21977<br \/>* CVE-2022-22010<br \/>* CVE-2022-23283<br \/>* CVE-2022-23285<br \/>* CVE-2022-23299<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-21977\" target=\"_blank\" rel=\"noopener\">CVE-2022-21977<\/a> | Media Foundation Information Disclosure Vulnerability<br \/>&#8211; Version: 1.2<br \/>&#8211; Originally posted: March 8, 2022<br \/>&#8211; Updated: March 16, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-22010\" target=\"_blank\" rel=\"noopener\">CVE-2022-22010<\/a> | Media Foundation Information Disclosure Vulnerability<br \/>&#8211; Version: 1.1<br \/>&#8211; Originally posted: March 8, 2022<br \/>&#8211; Updated: March 16, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23283\" target=\"_blank\" rel=\"noopener\">CVE-2022-23283<\/a> | Windows ALPC Elevation of Privilege Vulnerability<br \/>&#8211; Version: 1.1<br \/>&#8211; Originally posted: March 8, 2022<br \/>&#8211; Updated: March 16, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23285\" target=\"_blank\" rel=\"noopener\">CVE-2022-23285<\/a> | Remote Desktop Client Remote Code Execution Vulnerability<br \/>&#8211; Version: 1.1<br \/>&#8211; Originally posted: March 8, 2022<br \/>&#8211; Updated: March 17, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-23299\" target=\"_blank\" rel=\"noopener\">CVE-2022-23299<\/a> | Windows PDEV Elevation of Privilege Vulnerability<br \/>&#8211; Version: 1.1<br \/>&#8211; Updated: March 17, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has released revisions to its security alerts and update descriptions as of March 17, 2022. Here is a summary of these revisions that I received by mail.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-23721","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/23721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=23721"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/23721\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=23721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=23721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=23721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}