{"id":6597,"date":"2018-08-16T02:46:45","date_gmt":"2018-08-16T00:46:45","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=6597"},"modified":"2022-01-24T17:38:44","modified_gmt":"2022-01-24T16:38:44","slug":"microsoft-security-advisory-notification-august-14-2018","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/08\/16\/microsoft-security-advisory-notification-august-14-2018\/","title":{"rendered":"Microsoft Security Advisory Notification (August 14, 2018)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>On August 14, 2018, Microsoft published two more Security Advisory Notifications dealing with the newly discovered vulnerabilities (L1TF). <strong>Addendum:\u00a0\u00a0<\/strong>Security Advisory from\u00a0August 15, 2018 added.<\/p>\n<p><!--more--><br \/>\n********************************************************************<br \/>\n<strong>Security Advisories Released or Updated on August 14, 2018<br \/>\n<\/strong>********************************************************************<br \/>\nMicrosoft Security Advisory ADV180018<\/p>\n<p>&#8211; Title: Microsoft guidance to mitigate L1TF variant<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">ADV180018<\/a><br \/>\n&#8211; Reason for Revision: Information published.<br \/>\n&#8211; Originally posted: August 14, 2018<br \/>\n&#8211; Updated: N\/A<br \/>\n&#8211; Version: 1.0<\/p>\n<p>* Microsoft Security Advisory ADV180016<\/p>\n<p>&#8211; Title: Microsoft Guidance for Lazy FP State Restore<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180016\" target=\"_blank\" rel=\"noopener\">ADV180016<\/a><br \/>\n&#8211; Reason for Revision: Microsoft is announcing that the Windows<br \/>\nsecurity updates released on August 14, 2018 provide mitigations<br \/>\nfor CVE-2018-3665 &#8211; Lazy FP State Restore. These updates are<br \/>\navailable for 32-bit versions of Windows 7 and Windows Server<br \/>\n2008. See the Affected Products table to download and install<br \/>\nthe security updates.<br \/>\n&#8211; Originally posted: June 13, 2018<br \/>\n&#8211; Updated: August 14, 2018<br \/>\n&#8211; Version: 4.0<\/p>\n<p>********************************************************************<br \/>\n<strong>Microsoft Security Update Releases August 15, 2018<\/strong><strong><br \/>\n<\/strong>********************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2018-8202<br \/>\n* CVE-2018-8284<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>&#8211; CVE-2018-8202 | .NET Framework Elevation of Privilege<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Reason for Revision: Microsoft is releasing the August Monthly<br \/>\nRollup, Security Only, and Security Updates to fully resolve known<br \/>\nissues some customers experienced after installing the July security<br \/>\nupdates for .NET Framework. Customers who installed either the<br \/>\nStandalone updates or Alternate Cumulative update should also install<br \/>\nthe August updates. See the Affected Products table for links<br \/>\nto download and install the August updates.<br \/>\n&#8211; Originally posted: July 10, 2018<br \/>\n&#8211; Updated: August 15, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<br \/>\n&#8211; Version: 5.0<\/p>\n<p>&#8211; CVE-2018-8284 | .NET Framework Remote Code Injection<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Reason for Revision: Updated the Affected Products to include<br \/>\naffected versions of Microsoft SharePoint Server, Microsoft<br \/>\nSharePoint Foundation, Microsoft SharePoint Enterprise Server,<br \/>\nand Microsoft Project Server. Customers running any of the<br \/>\nSharePoint products listed in the Affected Products table and<br \/>\nwho are also running any affected versions of .NET Framework<br \/>\nneed to install the security updates for the versions of .NET<br \/>\nrunning on their system to be fully protected from this<br \/>\nvulnerability.<br \/>\n&#8211; Originally posted: July 10, 2018<br \/>\n&#8211; Updated: August 14, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<br \/>\n&#8211; Version: 3.0<\/p>\n<p>********************************************************************<br \/>\n<strong>Microsoft Security Advisory Notification August 15, 2018<\/strong><strong><br \/>\n<\/strong>********************************************************************<\/p>\n<p>Security Advisories Released or Updated on August 15, 2018<br \/>\n======================================================<\/p>\n<p>Users of an AMD system should read Microsoft Security Advisory ADV180002.<\/p>\n<p>* Microsoft Security Advisory ADV180002<\/p>\n<p>&#8211; Title: Guidance to mitigate speculative execution side-channel<br \/>\nvulnerabilities<br \/>\n&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/ADV180002\/ADV180002\" target=\"_blank\" rel=\"noopener\">ADV180002<\/a><br \/>\n&#8211; Reason for Revision: Updated FAQ #18 to announce that with the<br \/>\nWindows security updates released on Augus 18, 2918, Microsoft<br \/>\nis providing the solution for customers with AMD-based devices<br \/>\nwho experienced high CPU utilization after installing the June<br \/>\nor July security updates and updated microcode from AMD. Microsoft<br \/>\nrecommends that these customers install the August Windows<br \/>\nsecrurity updates and re-enable the Spectre Variant 2 mitigations<br \/>\nif they were previously disabled. This solution is available in<br \/>\nthe August Windows security updates for: Windows 10 version 1607.<br \/>\nWindows 10 version 1709. Windows 10 version 1803, Windows 7<br \/>\nService Pack 1, Windows Server 2016, Windows Server, version 1709<br \/>\n(Server Core Installation), Windows Server, version 1803 (Server<br \/>\nCore Installation), and Windows Server 2008 R2 Service Pack 1.<br \/>\nThe FAQ will be updated as further updates become available.<br \/>\n&#8211; Originally posted: January 3, 2018<br \/>\n&#8211; Updated: August 15, 2018<br \/>\n&#8211; Version: 24.0<\/p>\n<p>* Microsoft Security Advisory ADV180021<\/p>\n<p>&#8211; Title: Microsoft Office Defense in Depth Update<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180021\" target=\"_blank\" rel=\"noopener\">ADV180021<\/a><br \/>\n&#8211; Reason for Revision: Information published.<br \/>\n&#8211; Originally posted: August 15, 2018<br \/>\n&#8211; Updated: N\/A<br \/>\n&#8211; Version: 1.0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On August 14, 2018, Microsoft published two more Security Advisory Notifications dealing with the newly discovered vulnerabilities (L1TF). Addendum:\u00a0\u00a0Security Advisory from\u00a0August 15, 2018 added.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-6597","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/6597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=6597"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/6597\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=6597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=6597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=6597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}