{"id":5678,"date":"2018-05-20T00:48:00","date_gmt":"2018-05-19T22:48:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=5678"},"modified":"2018-05-20T12:11:09","modified_gmt":"2018-05-20T10:11:09","slug":"microsoft-security-update-releases-may-15-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/05\/20\/microsoft-security-update-releases-may-15-2018\/","title":{"rendered":"Microsoft Security Update Releases &#8211; May 15, 2018"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>Microsoft has revised some Security Update Releases on May 15, 2018. Here is a short list, what has been changed.\u00a0<strong>Addendum:<\/strong>\u00a0Update revision from May 18, 2018 added.<\/p>\n<p><!--more--><\/p>\n<p>********************************************************************<br \/>\nTitle: Microsoft Security Update Releases<br \/>\nIssued: May 15, 2018<br \/>\n********************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVEs have been published or have undergone a major<br \/>\nrevision increment:<\/p>\n<p>* CVE-2018-8147<br \/>\n* CVE-2018-8162<br \/>\n* CVE-2018-8176<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>&#8211; CVE-2018-8147 | Microsoft Excel Remote Code Execution<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: Microsoft is announcing the availability<br \/>\nof the 16.13.18051301 update for Microsoft Office 2016 for Mac.<br \/>\nCustomers running affected Mac software should install the<br \/>\nupdate for their product to be protected from this vulnerability.<br \/>\nCustomers running other Microsoft Office software do not need to<br \/>\ntake any action. See the Release Notes for more information and<br \/>\ndownload links.<br \/>\n&#8211; Originally posted: May 8, 2018<br \/>\n&#8211; Updated: May 15, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; CVE-2018-8162 | Microsoft Excel Remote Code Execution<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: Revised the Affected Products table to<br \/>\ninclude Microsoft Office 2016 for Mac because it is affected<br \/>\nby this CVE. Microsoft recommends that customers running<br \/>\nMicrosoft Office 2016 for Mac install the update to be protected<br \/>\nfrom this vulnerability.<br \/>\n&#8211; Originally posted: May 8, 2018<br \/>\n&#8211; Updated: May 15, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; CVE-2018-8176 | Microsoft PowerPoint Remote Code Execution<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: Information published. This CVE has<br \/>\nbeen added to this month's Security Updates. Microsoft<br \/>\nrecommends that customers running Microsoft Office 2016 for Mac<br \/>\ninstall the update to be protected from this vulnerability.<br \/>\n&#8211; Originally posted: May 15, 2018<br \/>\n&#8211; Updated: N\/A<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>The following advisory has undergone a major revision increment:<\/p>\n<p>* ADV180002<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>&#8211; ADV180002 | Guidance to mitigate speculative execution<br \/>\nside-channel vulnerabilities<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Version: 19.0<br \/>\n&#8211; Reason for Revision: Updated FAQ #14 to announce that a<br \/>\nstand-alone update for Windows 10 Version 1803 and Windows<br \/>\nServer, version 1803 is available via the Microsoft Update<br \/>\nCatalog. This update includes microcode updates from Intel.<br \/>\nSee Microsoft Knowledge Base Article 4100347 for more<br \/>\ninformation.<br \/>\n&#8211; Originally posted: January 3, 2018<br \/>\n&#8211; Updated: May 15, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>*******************************************************************<br \/>\nTitle: Microsoft Security Update Releases<br \/>\nIssued: May 18, 2018<br \/>\n********************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVE has been published or has undergone a major<br \/>\nrevision increment:<\/p>\n<p>* CVE-2018-0886<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>\u2013 CVE-2018-0886 | CredSSP Remote Code Execution Vulnerability<br \/>\n\u2013\u00a0<a class=\"moz-txt-link-freetext\" href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n\u2013 Reason for Revision: In the Affected Products table, reverted<br \/>\nthe security update entries for Windows 10 Version 1511 back to<br \/>\nthe March security update (4088779) because a May 2018 update is<br \/>\nnot available for this version. See the FAQ section for more<br \/>\ninformation about how to be protected from this vulnerability if<br \/>\nyou are running Windows 10 Version 1511.<br \/>\n\u2013 Originally posted: March 13, 2018<br \/>\n\u2013 Updated: May 18, 2018<br \/>\n\u2013 Aggregate CVE Severity Rating: Important<br \/>\n\u2013 Version: 3.0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has revised some Security Update Releases on May 15, 2018. Here is a short list, what has been changed.\u00a0Addendum:\u00a0Update revision from May 18, 2018 added.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22],"tags":[65,1421,69,195],"class_list":["post-5678","post","type-post","status-publish","format-standard","hentry","category-security","category-update","tag-microsoft","tag-revision","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=5678"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/5678\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=5678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=5678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=5678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}