{"id":5222,"date":"2018-03-19T08:11:28","date_gmt":"2018-03-19T07:11:28","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=5222"},"modified":"2024-10-05T18:55:41","modified_gmt":"2024-10-05T16:55:41","slug":"patchday-more-microsoft-updates-march-13-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/03\/19\/patchday-more-microsoft-updates-march-13-2018\/","title":{"rendered":"Patchday: More Microsoft Updates (March 13, 2018)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" title=\"Update\" style=\"border-left-width: 0px; border-right-width: 0px; border-bottom-width: 0px; float: left; margin: 0px 10px 0px 0px; display: inline; border-top-width: 0px\" border=\"0\" alt=\"Windows Update\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" width=\"54\" align=\"left\" height=\"54\">[<a href=\"https:\/\/www.borncity.com\/blog\/2018\/03\/16\/patchday-weitere-microsoft-updates-zum-13-mrz-2018\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Microsoft has released further updates for Internet Explorer, Windows Server, etc. for Patchday (March 13, 2018). Here are some more details about selected patches.<\/p>\n<p><!--more--><\/p>\n<h2>General remarks<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/4cfead1d0a1e4e09b54be91517dc8b2c\" width=\"1\" height=\"1\">The complete overview of all updates from Microsoft can be found on <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/894199\/software-update-services-and-windows-server-update-services-changes-in\" target=\"_blank\" rel=\"noopener\">this website<\/a>. Some of the updates mentioned there are described in separate blog posts (see link list at the end of the article).<\/p>\n<p>A vulnerability in the chakra script engine is closed in the Microsoft Edge browser. This prevents prepared web pages from provoking a memory overflow and an increase in rights. Another closed vulnerability in the Windows shell prevents code execution by a prepared file. Errors and other problems are listed in the blog posts linked at the end of the article. <\/p>\n<h2>Security updates<\/h2>\n<p>The following security updates have been released. <\/p>\n<h3>Update KB4056564 Windows Server 2008<\/h3>\n<p>Security update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4056564\/security-update-for-vulnerabilities-in-windows-server-2008\" target=\"_blank\" rel=\"noopener\">KB4056564<\/a> is available for Windows Server 2008 and Windows XP Embedded. It fixes the CredSSP Remote Code Execution vulnerability in Windows Server 2008, WES09 and POSReady 2009 and is available through Windows Update, WSUS, and <a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4073011\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>. <\/p>\n<h3>Update KB4073011 Windows Server 2008<\/h3>\n<p>Security update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4073011\/security-update-for-vulnerabilities-in-windows-server-2008\" target=\"_blank\" rel=\"noopener\">KB4073011<\/a> is available for Windows Server 2008. It is a security update against the Windows Hyper-V Denial of Service vulnerability (<a href=\"https:\/\/web.archive.org\/web\/20200227130712\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0885\" target=\"_blank\" rel=\"noopener\">CVE-2018-0885<\/a>) in Windows Server 2008. The update is available through Windows Update, WSUS, and <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/search.aspx?q=4073011\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>. <\/p>\n<h3>Update KB4087398 Windows Server 2008<\/h3>\n<p>Security update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4087398\/security-update-for-vulnerabilities-in-windows\" target=\"_blank\" rel=\"noopener\">KB4087398<\/a> is available for Windows Server 2008 and Windows XP Embedded. This security update closes a Privilege escalation vulnerability (<a href=\"https:\/\/web.archive.org\/web\/20201101182948\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0868\" target=\"_blank\" rel=\"noopener\">CVE-2018-0868<\/a>) in Windows Installer of Windows Server 2008 and WES09 and POSReady 2009. The update is available through Windows Update, WSUS, and <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/search.aspx?q=4087398\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>. <\/p>\n<h3>Update KB4088827 Windows Server 2008<\/h3>\n<p>Security update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4088827\/security-update-for-vulnerabilities-in-windows-server-2008\" target=\"_blank\" rel=\"noopener\">KB4088827<\/a> is available for Windows Server 2008 Service Pack 2, Windows Server 2008 Foundation and Windows Server 2008 Standard. This security update closes a Information Disclosure vulnerability (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/CVE-2018-0888\" target=\"_blank\" rel=\"noopener\">CVE-2018-0888<\/a>) in Hyper-V. Das The update is available through <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/search.aspx?q=4088827\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>. <\/p>\n<h3>Update KB4088877 for Windows Server 2012<\/h3>\n<p>Security update <a href=\"http:\/\/support.microsoft.com\/help\/4088877\" target=\"_blank\" rel=\"noopener\">KB4088877<\/a> (Security Monthly Quality Rollup for Windows Embedded 8 Standard and Windows Server 2012) addresses:<\/p>\n<ul>\n<li>Provides Spectre and Meltdown protections for 32-Bit (x86) and 64-Bit (x64) versions of Windows.\n<li>Security updates to Internet Explorer, the Microsoft Graphics component, Windows Kernel, Windows Shell, Windows MSXML, Windows Installer, and Windows Hyper-V.<\/li>\n<\/ul>\n<p>Das Update ist per Windows Update, WSUS, und <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/Search.aspx?q=KB4088877\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> erh\u00e4ltlich. Die Installation erfolgt nur, wenn die Antivirus-Kompatibilit\u00e4t per Registrierungseintrag (siehe KB-Artikel) best\u00e4tigt ist. <\/p>\n<h3>Update KB4088880 for Windows Server 2012<\/h3>\n<p>Update <a href=\"http:\/\/support.microsoft.com\/help\/4088880\" target=\"_blank\" rel=\"noopener\">KB4088880<\/a> ist das Security Monthly Quality Rollup for Windows Embedded 8 Standard and Windows Server 2012. Es adressiert folgendes:<\/p>\n<ul>\n<li>Provides Spectre and Meltdown protections for 32-Bit (x86) and 64-Bit (x64) versions of Windows.\n<li>Security updates to the Microsoft Graphics component, Windows Kernel, Windows Shell, Windows Installer, and Windows Hyper-V.<\/li>\n<\/ul>\n<p>The update is available through WSUS and <a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4088880\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>. The installation only takes place if the antivirus compatibility is confirmed by the registry entry (see KB article). <\/p>\n<h3>Update KB4089082 for Windows XP Embedded<\/h3>\n<p>Security Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4089082\/security-update-for-vulnerabilities-in-wes09-and-posready-2009\" target=\"_blank\" rel=\"noopener\">KB4089082<\/a> closes the Microsoft Video Control Elevation of Privilege vulnerability (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0881\" target=\"_blank\" rel=\"noopener\">CVE-2018-0881<\/a>) in WES09 and POSReady schlie\u00dft. The update is available through Windows Update and <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/search.aspx?q=4089082\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> erh\u00e4ltlich.<\/p>\n<h3>Update KB4089175 for Windows Server 2008\/Windows XP Embedded<\/h3>\n<p>Security Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4089175\/security-update-for-vulnerabilities-in-windows-server-2008\" target=\"_blank\" rel=\"noopener\">KB4089175<\/a> closes the Windows Shell Remote Code Execution-vulnerability (<a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0883\" target=\"_blank\" rel=\"noopener\">CVE-2018-0883<\/a>) in Windows Server 2008 and Windows XP Embedded. The update is available through Windows Update, WSUS And <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/search.aspx?q=4089175\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a> erh\u00e4ltlich.&nbsp; <\/p>\n<h3>Update KB4089229 for Windows Server 2008<\/h3>\n<p>Security Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4089229\/security-update-for-vulnerabilities-in-windows-server-2008\" target=\"_blank\" rel=\"noopener\">KB4089229<\/a> closes a Windows Kernel Information Disclosure vulnerability in Windows Server 2008. The installation only takes place if the antivirus compatibility is confirmed by the registry entry (see KB article). The update triggers a blue screen on 32-bit x86 machines with Physical Address Extension (PAE) mode disabled. Another stop error occurs on machines that do not support Streaming Single Instructions Multiple Data (SIMD) Extensions 2 (SSE2). The update is available via Windows Update, WSUS and <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/search.aspx?q=4089229\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>.&nbsp; <\/p>\n<h3>Update KB4089344 for Windows Server 2008<\/h3>\n<p>Security Update <a href=\"http:\/\/support.microsoft.com\/help\/4089344\" target=\"_blank\" rel=\"noopener\">KB4089344<\/a> is available for Windows Server 2008 and Windows XP Embedded (WES09 und POSReady 2009), and closes a&nbsp; another vulnerability . The vulnerability in the handling of objects in memory through the Windows Graphics Device Interface (GDI), which allows a privilege extension. After installing this security update, you may receive a stop error message: SESSION_HAS_VALID_POOL_ON_EXIT when logging off from the computer. The following commands can be executed in an administrative command prompt:<\/p>\n<p>sc config uxsms start= disabled<br \/>sc stop uxsms  <\/p>\n<p>These commands deactivate the Desktop Window Manager. The update is available via Windows Update, WSUS and <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/search.aspx?q=4089344\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>.&nbsp; <\/p>\n<h3>Update KB4089453 for Windows Server 2008<\/h3>\n<p>Security Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4089453\/security-update-for-vulnerabilities-in-windows-server-2008\" target=\"_blank\" rel=\"noopener\">KB4089453<\/a> is available for Windows Server 2008 and Windows XP Embedded. It closes information disclosure vulnerability <a href=\"https:\/\/web.archive.org\/web\/20200502234147\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-0878\" target=\"_blank\" rel=\"noopener\">CVE-2018-0878<\/a>. The update is available via Windows Update, WSUS and <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/search.aspx?q=4089453\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>.&nbsp; <\/p>\n<h3>Update KB4089694 for Windows XP Embedded<\/h3>\n<p>Security Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4089694\/security-update-for-vulnerabilities-in-wes09-and-posready-2009\" target=\"_blank\" rel=\"noopener\">KB4089694<\/a> for Windows Server 2008 closes information disclosure vulnerability (Windows Wireless WPA pairwise encryption key reinstallation vulnerability in WES09 and POSReady 2009) <a href=\"https:\/\/web.archive.org\/web\/20191221063655\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2017-13077\" target=\"_blank\" rel=\"noopener\">CVE-2017-13077<\/a>. The update is available via Windows Update, WSUS and <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/search.aspx?q=4089694\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>.&nbsp;&nbsp; <\/p>\n<h3>Update KB4090450 for Windows Server 2008<\/h3>\n<p>Security Update Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4090450\/security-update-for-vulnerabilities-in-windows-server-2008\" target=\"_blank\" rel=\"noopener\">KB4090450<\/a> for Windows Server 2008 contains the microcode updates for the speculative execution side-channel vulnerability (<a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/ADV180002\/ADV180002\" target=\"_blank\" rel=\"noopener\">ADV180002<\/a>). However, the update has several known and critical issues described in the KB article. The patch is available via Windows Update, WSUS and&nbsp; <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/search.aspx?q=4090450\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>.<\/p>\n<h3>Cumulative Security Update KB4089187 for Internet Explorer<\/h3>\n<p>Cumulative Security Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4089187\/cumulative-security-update-for-internet-explorer\" target=\"_blank\" rel=\"noopener\">KB4089187<\/a> for Internet Explorer closes several vulnerabilities in browser. It's available for Windows 7 up to Windows 10 and it's server pendants via Windows Update, WSUS and <a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/search.aspx?q=KB4089187\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>. <\/p>\n<h3>Flash Player Update KB4088785<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/4088785\/security-update-for-adobe-flash-player\" target=\"_blank\" rel=\"noopener\">KB4088785<\/a> (Adobe Flash Player) is available for Windows Server version 1709, Windows Server 2016, Windows 10 version 1709 (Fall Creators Update), Windows 10 version 1703 (Creators Update), Windows 10 version 1607, Windows 10 version 1511, Windows 10 RTM, Windows Server 2012 R2, Windows 8.1, and Windows RT 8.1. It addresses the vulnerabilities mentioned in document <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180006\" target=\"_blank\" rel=\"noopener\">ADV180006<\/a>. The update is available via Windows Update, WSUS, and <a href=\"Das Update ist per Windows Update, WSUS, und Microsoft Update Catalog erh&auml;ltlich.\" target=\"_blank\" rel=\"noopener\">Microsoft Update Catalog<\/a>. <\/p>\n<p><strong>Similar articles:<br \/><\/strong>Adobe Flash Player Update to Version 29.0.0.113<br \/><a href=\"https:\/\/web.archive.org\/web\/20221205004949\/https:\/\/borncity.com\/win\/2018\/03\/13\/microsoft-patchday-summary-march-13-2018\/\">Microsoft Patchday Summary March 13, 2018<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/03\/14\/security-updates-for-windows-7-8-1-march-13-2018\/\">Security Updates for Windows 7\/8.1 (March 13, 2018)<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2018\/03\/14\/patchday-windows-10-updates-march-13-2018\/\">Patchday: Windows 10 Updates (March 13, 2018)<\/a><br \/><a href=\"https:\/\/web.archive.org\/web\/20210512195851\/https:\/\/borncity.com\/win\/2018\/03\/15\/microsoft-office-patchday-march-13-2018\/\">Microsoft Office Patchday (March 13, 2018)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Microsoft has released further updates for Internet Explorer, Windows Server, etc. for Patchday (March 13, 2018). Here are some more details about selected patches.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,580,22,2],"tags":[193,42,195,194],"class_list":["post-5222","post","type-post","status-publish","format-standard","hentry","category-office","category-security","category-update","category-windows","tag-flash","tag-internet-explorer","tag-update","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=5222"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5222\/revisions"}],"predecessor-version":[{"id":35605,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5222\/revisions\/35605"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=5222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=5222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=5222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}