{"id":4974,"date":"2018-02-14T00:17:58","date_gmt":"2018-02-13T23:17:58","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=4974"},"modified":"2024-10-05T19:01:23","modified_gmt":"2024-10-05T17:01:23","slug":"microsoft-patchday-summary-february-13-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/02\/14\/microsoft-patchday-summary-february-13-2018\/","title":{"rendered":"Microsoft Patchday Summary (February 13, 2018)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Windows Update\" width=\"40\" height=\"40\" align=\"left\" border=\"0\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2018\/02\/14\/microsoft-patchday-summary-13-februar-2018\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Microsoft released a series of security updates for Windows and other products on February 13, 2018. Here is a brief overview of critical and non-critical security updates, a list of all 50 CVEs and details to an updated Microsoft Security Advisory Notification.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/0d250daa6605410aa70aa29181bac8ab\" alt=\"\" width=\"1\" height=\"1\" \/>Details of these security updates can be found in the Microsoft <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">Security TechCenter<\/a>. I will also document the updates in separate blog posts.<\/p>\n<h2>Critical Security Updates<\/h2>\n<p>ChakraCore<br \/>\nMicrosoft Edge<br \/>\nInternet Explorer 9<br \/>\nInternet Explorer 11<br \/>\nWindows 7 for 32-bit Systems Service Pack 1<br \/>\nWindows 7 for x64-based Systems Service Pack 1<br \/>\nWindows Server 2008 for 32-bit Systems Service Pack 2<br \/>\nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core<br \/>\ninstallation)<br \/>\nWindows Server 2008 for Itanium-Based Systems Service Pack 2<br \/>\nWindows Server 2008 for x64-based Systems Service Pack 2<br \/>\nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core<br \/>\ninstallation)<br \/>\nWindows Server 2008 R2 for Itanium-Based Systems Service Pack 1<br \/>\nWindows Server 2008 R2 for x64-based Systems Service Pack 1<br \/>\nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core<br \/>\ninstallation)<br \/>\nWindows 8.1 for 32-bit systems<br \/>\nWindows 8.1 for x64-based systems<br \/>\nWindows RT 8.1<br \/>\nWindows Server 2012<br \/>\nWindows Server 2012 (Server Core installation)<br \/>\nWindows Server 2012 R2<br \/>\nWindows Server 2012 R2 (Server Core installation)<br \/>\nWindows 10 for 32-bit Systems<br \/>\nWindows 10 for x64-based Systems<br \/>\nWindows 10 Version 1511 for 32-bit Systems<br \/>\nWindows 10 Version 1511 for x64-based Systems<br \/>\nWindows 10 Version 1607 for 32-bit Systems<br \/>\nWindows 10 Version 1607 for x64-based Systems<br \/>\nWindows 10 Version 1703 for 32-bit Systems<br \/>\nWindows 10 Version 1703 for x64-based Systems<br \/>\nWindows 10 Version 1709 for 32-bit Systems<br \/>\nWindows 10 Version 1709 for x64-based Systems<br \/>\nWindows Server 2016<br \/>\nWindows Server 2016 (Server Core installation)<br \/>\nWindows Server, version 1709 (Server Core Installation)<br \/>\nMicrosoft Outlook 2007 Service Pack 3<br \/>\nMicrosoft Outlook 2010 Service Pack 2 (32-bit editions)<br \/>\nMicrosoft Outlook 2010 Service Pack 2 (64-bit editions)<br \/>\nMicrosoft Outlook 2013 RT Service Pack 1<br \/>\nMicrosoft Outlook 2013 Service Pack 1 (32-bit editions)<br \/>\nMicrosoft Outlook 2013 Service Pack 1 (64-bit editions)<br \/>\nMicrosoft Outlook 2016 (32-bit edition)<br \/>\nMicrosoft Outlook 2016 (64-bit edition)<br \/>\nMicrosoft Office 2016 Click-to-Run (C2R) for 32-bit editions<br \/>\nMicrosoft Office 2016 Click-to-Run (C2R) for 64-bit editions<\/p>\n<h2>Important Security Updates<\/h2>\n<p>Microsoft Office Word Viewer<br \/>\nMicrosoft Project Server 2013 Service Pack 1<br \/>\nMicrosoft SharePoint Enterprise Server 2016<\/p>\n<h2>Moderate Security Updates<\/h2>\n<p>Internet Explorer 10<\/p>\n<h2>Overview: Closed CVEs<\/h2>\n<p>Here is the list of all 50 vulnerabilities that have been closed (see <a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-february-patch-tuesday-fixes-50-security-issues\/\" target=\"_blank\" rel=\"noopener\">also<\/a>). Details will follow in separate articles.<\/p>\n<table id=\"tableOfContents\" style=\"width: 100%;\">\n<tbody>\n<tr>\n<th>Tag<\/th>\n<th>CVE ID<\/th>\n<th>CVE Title<\/th>\n<\/tr>\n<tr>\n<td>Side-Channel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV180002\" target=\"_blank\" rel=\"nofollow noopener\">ADV180002<\/a><\/td>\n<td>Guidance to mitigate speculative execution side-channel vulnerabilities<\/td>\n<\/tr>\n<tr>\n<td>Adobe Flash Player<\/td>\n<td>ADV180004<\/td>\n<td>February 2018 Adobe Flash Security Update<\/td>\n<\/tr>\n<tr>\n<td>Common Log File System Driver<\/td>\n<td>CVE-2018-0844<\/td>\n<td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Common Log File System Driver<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0846\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0846<\/a><\/td>\n<td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Device Guard<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132039\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0827\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0827<\/a><\/td>\n<td>Windows Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Graphic Fonts<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-0855\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0855<\/a><\/td>\n<td>Windows EOT Font Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Graphic Fonts<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0755\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0755<\/a><\/td>\n<td>Windows EOT Font Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Graphic Fonts<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0760\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0760<\/a><\/td>\n<td>Windows EOT Font Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Graphic Fonts<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132039\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0761\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0761<\/a><\/td>\n<td>Windows EOT Font Engine Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Internet Explorer<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0866\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0866<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Browsers<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0840\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0840<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-0839\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0839<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0771\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0771<\/a><\/td>\n<td>Microsoft Edge Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Edge<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132138\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0763\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0763<\/a><\/td>\n<td>Microsoft Edge Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0869\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0869<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0864\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0864<\/a><\/td>\n<td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0852\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0852<\/a><\/td>\n<td>Microsoft Outlook Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0851\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0851<\/a><\/td>\n<td>Microsoft Office Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0850\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0850<\/a><\/td>\n<td>Microsoft Outlook Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132139\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0853\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0853<\/a><\/td>\n<td>Microsoft Office Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Office<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0841\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0841<\/a><\/td>\n<td>Microsoft Excel Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-0859\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0859<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0860\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0860<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0861\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0861<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td>CVE-2018-0858<\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132142\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0836\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0836<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-0835\/CVE-2018-0835\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0835<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0837\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0837<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-0838\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0838<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0856\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0856<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0857\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0857<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Scripting Engine<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0834\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0834<\/a><\/td>\n<td>Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0822\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0822<\/a><\/td>\n<td>Windows NTFS Global Reparse Point Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td>CVE-2018-0823<\/td>\n<td>Named Pipe File System Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200510184305\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0825\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0825<\/a><\/td>\n<td>StructuredQuery Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132036\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0828\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0828<\/a><\/td>\n<td>Windows Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0826\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0826<\/a><\/td>\n<td>Windows Storage Services Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0821\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0821<\/a><\/td>\n<td>Windows AppContainer Elevation Of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0847\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0847<\/a><\/td>\n<td>Windows Scripting Engine Memory Corruption Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Microsoft Windows<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20201104070354\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0820\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0820<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0831\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0831<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td>CVE-2018-0832<\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20201104044423\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0830\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0830<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0829\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0829<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0757\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0757<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0742\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0742<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0756\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0756<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0809\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0809<\/a><\/td>\n<td>Windows Kernel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0810\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0810<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200227132038\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0843\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0843<\/a><\/td>\n<td>Windows Kernel Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows Kernel<\/td>\n<td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-0842\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0842<\/a><\/td>\n<td>Windows Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td>Windows SMB Server<\/td>\n<td><a href=\"https:\/\/web.archive.org\/web\/20200509012712\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0833\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2018-0833<\/a><\/td>\n<td>Windows Denial of Service Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>MS Security Advisory Notification (February 13, 2018)<\/h2>\n<p>Microsoft Security Advisory ADV180002 Updated on February 13<\/p>\n<p>&#8211; Title: Guidance to mitigate speculative execution side-channel<br \/>\nvulnerabilities<br \/>\n&#8211; https:<a href=\"https:\/\/web.archive.org\/web\/20201101051813\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\">https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/<\/a><br \/>\nadvisory\/ADV180002<br \/>\n&#8211; Reason for Revision: Microsoft has released security updates to<br \/>\nprovide additional protections for the 32-bit (x86) versions of<br \/>\nWindows 10 as follows: 4074596 for Windows 10, 4074591 for Windows<br \/>\n10 Version 1511, 4074590 for Windows 10 Version 1607, and 4074592<br \/>\nfor Windows 10 Version 1703. Microsoft recommends that customers<br \/>\nrunning 32-bit systems install the applicable update as soon as<br \/>\npossible. Microsoft continues to work to provide 32-bit (x86)<br \/>\nprotections for other supported Windows versions but does not<br \/>\nhave a release schedule at this time. These update will be<br \/>\nincluded in subsequent updates, and do not apply to x64<br \/>\n(64-bit) systems. Added a section under Advisory Details to<br \/>\nannounce that Microsoft has released mitigations for Windows<br \/>\nHolographic to Microsoft HoloLens customers that are provided<br \/>\nautomatically as part of the February 2018 Windows Security<br \/>\nUpdate to Windows 10 Version 1607 for HoloLens. HoloLens<br \/>\ncustomers do not need to take any additional action to update<br \/>\ntheir device firmware. Added FAQ#12 and FAQ#13 to provide<br \/>\nfurther information for installing the February 2018<br \/>\nsecurity updates.<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong>Adobe Flash Player: New Update 28.0.0.161<br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20230324002549\/https:\/\/borncity.com\/win\/2018\/02\/08\/update-kb4074595-flash-player-for-windows\/\">Update KB4074595 (Flash Player) for Windows<\/a><br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20230204040852\/https:\/\/borncity.com\/win\/2018\/02\/07\/microsoft-office-patchday-february-6-2018\/\">Microsoft Office Patchday (February 6, 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2018\/02\/14\/microsoft-patchday-summary-february-13-2018\/\">Microsoft Patchday Summary (February 13, 2018)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2018\/02\/14\/patchday-updates-for-windows-7-8-1-february-13-2018\/\">Patchday: Updates for Windows 7\/8.1 (February 13, 2018)<\/a><br \/>\nPatchday: Windows 10 updates (February 13, 2018)<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2018\/02\/16\/patchday-other-microsoft-updates-february-13-2018\/\" rel=\"bookmark\">Patchday: Other Microsoft Updates (February 13, 2018)<\/a><\/p>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>[German]Microsoft released a series of security updates for Windows and other products on February 13, 2018. Here is a brief overview of critical and non-critical security updates, a list of all 50 CVEs and details to an updated Microsoft Security &hellip; <a href=\"https:\/\/borncity.com\/win\/2018\/02\/14\/microsoft-patchday-summary-february-13-2018\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[872,11,580,22,2],"tags":[125,69,195,194],"class_list":["post-4974","post","type-post","status-publish","format-standard","hentry","category-browser","category-office","category-security","category-update","category-windows","tag-office","tag-security","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/4974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=4974"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/4974\/revisions"}],"predecessor-version":[{"id":35597,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/4974\/revisions\/35597"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=4974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=4974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=4974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}