{"id":6009,"date":"2018-06-25T07:52:11","date_gmt":"2018-06-25T05:52:11","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=6009"},"modified":"2018-06-25T07:52:11","modified_gmt":"2018-06-25T05:52:11","slug":"microsoft-security-update-minor-revisions-june-22-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/06\/25\/microsoft-security-update-minor-revisions-june-22-2018\/","title":{"rendered":"Microsoft Security Update Minor Revisions (June 22, 2018)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">Microsoft has made some minor revisions to update descriptions as of June 22, 2018. I stumbled uppon the corresponding information <a href=\"http:\/\/seclists.org\/microsoft\/2018\/q2\/27\" target=\"_blank\">on seclists.org<\/a>. Here are the unedited details.<br clear=\"all\"><\/p>\n<p><!--more--><\/p>\n<pre>********************************************************************\nTitle: Microsoft Security Update Minor Revisions\nIssued: June 22, 2018\n********************************************************************\n\nSummary\n=======\n\nThe following CVE has been revised in the June 2018 Security \nUpdates.\n\n* CVE-2018-0978\n* CVE-2018-8113\n* CVE-2018-8249\n* CVE-2018-8267\n\nRevision Information:\n=====================\n\nCVE-2018-0978\n\n - Title: CVE-2018-0978 | Internet Explorer Memory Corruption\n   Vulnerability\n - <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a>\n - Reasons for Revision: This CVE has been revised to announce\n   a detection change to correct an offering issue for the Internet\n   Explorer Cumulative update. This is a detection change only.\n   There were no changes to the update files. Customers who have\n   already successfully installed the update do not need to take\n   any action.\n - Originally posted: June 12, 2018\n - Updated: June 22, 2018\n - CVE Severity Rating: Important\n - Version: 1.1\n\nCVE-2018-8113\n\n - Title: CVE-2018-8113 | Internet Explorer Security Feature Bypass\n   Vulnerability\n - <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a>\n - Reasons for Revision: This CVE has been revised to announce\n   a detection change to correct an offering issue for the Internet\n   Explorer Cumulative update. This is a detection change only.\n   There were no changes to the update files. Customers who have\n   already successfully installed the update do not need to take\n   any action.\n - Originally posted: June 12, 2018\n - Updated: June 22, 2018\n - CVE Severity Rating: Important\n - Version: 1.1\n\nCVE-2018-8249\n\n - Title: CVE-2018-8249 | Internet Explorer Memory Corruption\n   Vulnerability\n - <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a>\n - Reasons for Revision: This CVE has been revised to announce\n   a detection change to correct an offering issue for the Internet\n   Explorer Cumulative update. This is a detection change only.\n   There were no changes to the update files. Customers who have\n   already successfully installed the update do not need to take\n   any action.\n - Originally posted: June 12, 2018\n - Updated: June 22, 2018\n - CVE Severity Rating: Critical\n - Version: 1.1\n\nCVE-2018-8267\n\n - Title: CVE-2018-8267 | Scripting Engine Memory Corruption\n   Vulnerability\n - <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a>\n - Reasons for Revision: This CVE has been revised to announce\n   a detection change to correct an offering issue for the Internet\n   Explorer Cumulative update. This is a detection change only.\n   There were no changes to the update files. Customers who have\n   already successfully installed the update do not need to take\n   any action.\n - Originally posted: June 12, 2018\n - Updated: June 22, 2018\n - CVE Severity Rating: Critical\n - Version: 1.1<\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has made some minor revisions to update descriptions as of June 22, 2018. I stumbled uppon the corresponding information on seclists.org. Here are the unedited details.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-6009","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/6009","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=6009"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/6009\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=6009"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=6009"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=6009"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}