{"id":4996,"date":"2018-02-16T05:21:59","date_gmt":"2018-02-16T04:21:59","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=4996"},"modified":"2024-10-05T19:01:23","modified_gmt":"2024-10-05T17:01:23","slug":"patchday-other-microsoft-updates-february-13-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/02\/16\/patchday-other-microsoft-updates-february-13-2018\/","title":{"rendered":"Patchday: Other Microsoft Updates (February 13, 2018)"},"content":{"rendered":"<p>[<a href=\"https:\/\/www.borncity.com\/blog\/2018\/02\/15\/weitere-updates-zum-microsoft-februar-2018-patchday\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Microsoft has released further updates for Internet Explorer, Windows Server, etc. on the patchday (February 13,2018). Here are some details about selected patches.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/0171c16ccaed43c89b8cec65ea935680\" width=\"1\" height=\"1\">A complete overview of all updates from Microsoft can be found on <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/894199\/software-update-services-and-windows-server-update-services-changes-in\" target=\"_blank\" rel=\"noopener\">this website<\/a>. Some of the updates mentioned on this website are are described in separate blog posts (see link list at the end of this article).<\/p>\n<h2>Security updates<\/h2>\n<ul>\n<li>Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4034044\/security-update-for-the-scripting-engine-vulnerability\" target=\"_blank\" rel=\"noopener\">KB4034044<\/a> (2018-02 Security Update for Windows Server 2008 and Windows XP Embedded); closes a VBScript-Windows Scripting Engine vulnerability <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0947\" target=\"_blank\" rel=\"noopener\">CVE-2018-0947<\/a> that allows information disclosure.\n<li>Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4057893\/security-update-for-vulnerabilities-in-windows-wes09-and-posready-2009\" target=\"_blank\" rel=\"noopener\">KB4057893<\/a> (Windows Embedded POSReady \/Windows Embedded Standard 2009)\n<li>Update <a href=\"http:\/\/support.microsoft.com\/help\/4058165\" target=\"_blank\" rel=\"noopener\">KB4058165<\/a> (Description of the security update for the Windows Kernel information disclosure vulnerability in Windows Server 2008: February 13, 2018); closes vulnerability <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0829\" target=\"_blank\" rel=\"noopener\">CVE-2018-0829<\/a>, if the Windows kernel does not handle memory objects properly.\n<li>Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4073079\/security-update-for-vulnerabilities-in-windows-server-2008\" target=\"_blank\" rel=\"noopener\">KB4073079<\/a> (Description of the security update for the Windows Common Log file system driver elevation of privilege vulnerability in Windows Server 2008: February 13, 2018); This happens if the Windows Common Log File System (CLFS) driver does not handle objects in memory properly. Details can be found in <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0844\" target=\"_blank\" rel=\"noopener\">CVE-2018-0844<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0846\" target=\"_blank\" rel=\"noopener\">CVE-2018-0846<\/a>.\n<li>Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4073080\/security-update-for-vulnerabilities-in-windows-server-2008\" target=\"_blank\" rel=\"noopener\">KB4073080<\/a> (Description of the security update for the Windows Kernel vulnerability in Windows Server 2008: February 13, 2018); closes an information disclosure vulnerability and a authorization vulnerability occurs when the Windows kernel messes up memory objects. For more information about vulnerabilities, see <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/CVE-2018-0830\" target=\"_blank\" rel=\"noopener\">CVE-2018-0830<\/a> and <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0820\" target=\"_blank\" rel=\"noopener\">CVE-2018-0820<\/a>.\n<li>Update <a href=\"http:\/\/support.microsoft.com\/help\/4074589\" target=\"_blank\" rel=\"noopener\">KB4074589<\/a> (Security-only update) for Windows Server 2012 Standard;\n<li>Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4074593\/windows-server-2012-update-kb4074593\" target=\"_blank\" rel=\"noopener\">KB4074593<\/a> (Monthly Rollup) for Windows Server 2012 Standard;\n<li>Update <a href=\"http:\/\/support.microsoft.com\/help\/4074603\" target=\"_blank\" rel=\"noopener\">KB4074603<\/a> (Description of the security update for the Windows Kernel vulnerabilities in Windows Server 2008: February 13, 2018) for Windows Server 2008 Service Pack 2, Windows Server 2008 Foundation, Windows Server 2008 Standard. closes vulnerabilities:<br \/><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0742\" target=\"_blank\" rel=\"noopener\">CVE-2018-0742 | Windows Kernel Elevation of Privilege Vulnerability<\/a> <br \/><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0757\" target=\"_blank\" rel=\"noopener\">CVE-2018-0757 | Windows Kernel Information Disclosure Vulnerability<\/a> <br \/><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0810\" target=\"_blank\" rel=\"noopener\">CVE-2018-0810 | Windows Kernel Information Disclosure Vulnerability<\/a>\n<li>Update <a href=\"http:\/\/support.microsoft.com\/help\/4074836\" target=\"_blank\" rel=\"noopener\">KB4074836<\/a> (Description of the security update for the Windows remote code execution vulnerability in Windows Server 2008: February 13, 2018); closes a remote code execution vulnerability (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/CVE-2018-0842\" target=\"_blank\" rel=\"noopener\">CVE-2018-0842<\/a>).\n<li>Update <a href=\"http:\/\/support.microsoft.com\/help\/4074851\" target=\"_blank\" rel=\"noopener\">KB4074851<\/a> (Description of the security update for the StructuredQuery remote code execution vulnerability in Windows Server 2008: February 13, 2018); closes a remote code execution vulnerability (CVE-2018-0825).\n<li>Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4074852\/security-update-for-vulnerabilities-in-windows-wes09-and-posready-2009\" target=\"_blank\" rel=\"noopener\">KB4074852<\/a> (Description of the security update for WES09 and POSReady 2009: February 13, 2018); applies to Windows Embedded Standard 2009 and Windows Embedded POSReady. The update is intended to fix a security problem that may affect the system.\n<\/li>\n<\/ul>\n<blockquote>\n<p>According to this <a href=\"https:\/\/borncity.com\/win\/2018\/02\/14\/microsoft-patchday-summary-february-13-2018\/#comment-2669\" target=\"_blank\" rel=\"noopener\">comment<\/a> and to this foren entry, the update is causing issues. <\/p>\n<\/blockquote>\n<h2>Update KB4074736 Internet Explorer<\/h2>\n<p>Update <a href=\"\/\/support.microsoft.com\/kb\/4074736\" target=\"_blank\" rel=\"noopener\">KB4074736<\/a> (Cumulative security update for Internet Explorer: February 13, 2018) closes several vulnerabilities in Internet Explorer 11, Internet Explorer 10, and Windows Internet Explorer 9, and the most critical vulnerabilities can allow remote code execution. Details are available in the KB article. <\/p>\n<h2>Non security updates<\/h2>\n<ul>\n<li>Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4019276\/update-to-add-support-for-tls-1-1-and-tls-1-2-in-windows\" target=\"_blank\" rel=\"noopener\">KB4019276<\/a> WES09 and POSReady 2009 (support for TLS 1.1 and TLS 1.2 in Windows Server 2008 SP2 and Windows Embedded POSReady 2009)\n<li>Update <a href=\"http:\/\/support.microsoft.com\/kb\/4076492\" target=\"_blank\" rel=\"noopener\">KB4076492<\/a>; Quality Rollup for .NET Framework 3.5.1 Windows Embedded Standard 7, Windows 7, and Windows Server 2008 R2\n<li>Update <a href=\"http:\/\/support.microsoft.com\/kb\/4076493\" target=\"_blank\" rel=\"noopener\">KB4076493<\/a>; Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1 on Windows Embedded 8 Standard and Windows Server 2012\n<li>Update <a href=\"http:\/\/support.microsoft.com\/kb\/4076494\" target=\"_blank\" rel=\"noopener\">KB4076494<\/a>; Quality Rollup for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1 on Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2\n<li>Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4076495\/security-and-quality-rollup-for-net-framework-2-0-sp2-3-0-sp2-4-5-2-an\" target=\"_blank\" rel=\"noopener\">KB4076495<\/a>; Quality Rollup for .NET Framework 2.0, 3.0, 4.5.2, 4.6 on Windows Server 2008<\/li>\n<\/ul>\n<p>There was also an update <a href=\"http:\/\/support.microsoft.com\/kb\/890830\" target=\"_blank\" rel=\"noopener\">KB890830<\/a> (Windows Malicious Software Removal Tool &#8211; February 2018). Updates mentioned above, that are also compatible with Windows Vista can be found within <a href=\"https:\/\/www.borncity.com\/blog\/2017\/06\/23\/tipp-updates-fr-windows-vista-nach-supportende\/#comment-54166\" target=\"_blank\" rel=\"noopener\">this German comment<\/a>. <\/p>\n<p><strong>Similar articles:<br \/><\/strong>Adobe Flash Player: New Update 28.0.0.161<br \/><a href=\"https:\/\/web.archive.org\/web\/20230324002549\/https:\/\/borncity.com\/win\/2018\/02\/08\/update-kb4074595-flash-player-for-windows\/\">Update KB4074595 (Flash Player) for Windows<\/a><br \/><a href=\"https:\/\/web.archive.org\/web\/20230204040852\/https:\/\/borncity.com\/win\/2018\/02\/07\/microsoft-office-patchday-february-6-2018\/\">Microsoft Office Patchday (February 6, 2018)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/02\/14\/microsoft-patchday-summary-february-13-2018\/\">Microsoft Patchday Summary (February 13, 2018)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/02\/14\/patchday-updates-for-windows-7-8-1-february-13-2018\/\">Patchday: Updates for Windows 7\/8.1 (February 13, 2018)<\/a><br \/>Patchday: Windows 10 updates (February 13, 2018)<br \/><a href=\"https:\/\/web.archive.org\/web\/20220523220848\/https:\/\/borncity.com\/win\/2018\/02\/15\/patchday-ms-office-security-updates-february-13-2018\/\">Patchday: MS Office security updates (February 13, 2018)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Microsoft has released further updates for Internet Explorer, Windows Server, etc. on the patchday (February 13,2018). Here are some details about selected patches.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[872,22,2],"tags":[42,195,194],"class_list":["post-4996","post","type-post","status-publish","format-standard","hentry","category-browser","category-update","category-windows","tag-internet-explorer","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/4996","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=4996"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/4996\/revisions"}],"predecessor-version":[{"id":35599,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/4996\/revisions\/35599"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=4996"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=4996"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=4996"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}