{"id":24142,"date":"2022-04-20T07:42:20","date_gmt":"2022-04-20T05:42:20","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=24142"},"modified":"2022-04-20T07:42:20","modified_gmt":"2022-04-20T05:42:20","slug":"microsoft-security-update-revisions-19-april-2022","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/04\/20\/microsoft-security-update-revisions-19-april-2022\/","title":{"rendered":"Microsoft Security Update Revisions (April 19, 2022)"},"content":{"rendered":"<p>Brief addendum from last week. Microsoft has released some Microsoft Security Update revisions for April 19, 2022, which are changes to the documentation of various security updates. Here is an uncommented overview.<\/p>\n<p><!--more--><\/p>\n<p>**********************************************************<br \/>Title: Microsoft Security Update Revisions<br \/>Issued: April 19, 2022<br \/>**********************************************************<\/p>\n<p>Summary<br \/>=======<\/p>\n<p>The following CVEs have undergone a revision increment.<br \/>==========================================================<br \/>* CVE-2022-24543<br \/>* CVE-2022-26919<br \/>* CVE-2022-26809<br \/>* CVE-2022-26832<\/p>\n<p>* CVE-2022-24543<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-24543\" target=\"_blank\" rel=\"noopener\">CVE-2022-24543<\/a> | Windows Upgrade Assistant Remote Code Execution Vulnerability<br \/>&#8211; Version: 1.1<br \/>&#8211; Reason for Revision: Updated acknowledgment. This is an informational change only.<br \/>&#8211; Originally posted: April 12, 2022<br \/>&#8211; Updated: April 19, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>* CVE-2022-26919<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26919\" target=\"_blank\" rel=\"noopener\">CVE-2022-26919<\/a> | Windows LDAP Remote Code Execution Vulnerability<br \/>&#8211; Version: 1.1<br \/>&#8211; Reason for Revision: Removed one of the FAQs. This is an information change only.<br \/>&#8211; Originally posted: April 12, 2022<br \/>&#8211; Updated: April 19, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Critical<\/p>\n<p>* CVE-2022-26809<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26809\" target=\"_blank\" rel=\"noopener\">CVE-2022-26809<\/a> | Remote Procedure Call Runtime Remote Code Execution Vulnerability<br \/>&#8211; Version: 1.1<br \/>&#8211; Reason for Revision: Removed the Mitigation \"Block TCP port 445 at the enterprise<br \/>&nbsp;&nbsp; perimeter firewall\" and added an FAQ to explain that the mitigation does not directly<br \/>&nbsp;&nbsp; protect against all potential attack scenarios for this specific vulnerability. <br \/>&nbsp;&nbsp; Added information in FAQs to provide recommended best practices for port blocking<br \/>&nbsp;&nbsp; at the perimeter firewall. These are informational changes only.<br \/>&#8211; Originally posted: April 12, 2022<br \/>&#8211; Updated: April 19, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Critical<\/p>\n<p>* CVE-2022-26832<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-26832\" target=\"_blank\" rel=\"noopener\">CVE-2022-26832<\/a> | .NET Framework Denial of Service Vulnerability<br \/>&#8211; Version: 2.0<br \/>&#8211; Reason for Revision: In the Security Updates table, added .NET Framework 4.8<br \/>&nbsp;&nbsp; installed on Windows Server 2016 and Windows Server 2016 (Server Core installation),<br \/>&nbsp;&nbsp; .NET Framework 3.5 and 4.7.2 intalled on Windows Server 2019 and Windows Server 2019<br \/>&nbsp;&nbsp; (Server Core installation), and .NET Framework 3.5 and 4.8 installed on Windows<br \/>&nbsp;&nbsp; Server 2019 and Windows Server 2019 (Server Core installation) as these versions <br \/>&nbsp;&nbsp; of Windows Server with these versions of .NET Framework installed are affected by<br \/>&nbsp;&nbsp; this vulnerability. Customers running these versions of .NET Framework should<br \/>&nbsp;&nbsp; install the April 2022 security updates to be protected from this vulnerability.<br \/>&#8211; Originally posted: April 12, 2022<br \/>&#8211; Updated: April 19, 2022<br \/>&#8211; Aggregate CVE Severity Rating: Important<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Brief addendum from last week. Microsoft has released some Microsoft Security Update revisions for April 19, 2022, which are changes to the documentation of various security updates. Here is an uncommented overview.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22],"tags":[1079,195],"class_list":["post-24142","post","type-post","status-publish","format-standard","hentry","category-security","category-update","tag-sicherheit","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=24142"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/24142\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=24142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=24142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=24142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}