{"id":6719,"date":"2018-08-25T09:35:07","date_gmt":"2018-08-25T07:35:07","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=6719"},"modified":"2021-01-24T11:58:49","modified_gmt":"2021-01-24T10:58:49","slug":"security-advisory-update-adv180018","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/08\/25\/security-advisory-update-adv180018\/","title":{"rendered":"Security Advisory-Update ADV180018"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/win102.jpg\" width=\"58\" height=\"58\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2018\/08\/25\/security-advisory-update-adv180018\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Microsoft released several updates for Windows with Intel Microcode updates on August 14. New a revision of the Microsoft Security Advisory Notification for ADV180018 was published on August 24. Here is the notification from Microsoft\u00a0 &#8211; and also an addendum with notes from me.<\/p>\n<p><!--more--><\/p>\n<p>********************************************************************<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg06.met.vgwort.de\/na\/e0780b469cb549a5b9fbb36ef4f2ae44\" alt=\"\" width=\"1\" height=\"1\" \/>Title: Microsoft Security Advisory Notification<br \/>\nIssued: August 24, 2018<br \/>\n********************************************************************<\/p>\n<p>Security Advisories Released or Updated on August 24, 2018<br \/>\n===================================================<\/p>\n<p>* Microsoft Security Advisory ADV180018<\/p>\n<p>&#8211; Title: Microsoft guidance to mitigate L1TF variant<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">ADV180018<\/a><br \/>\n&#8211; Reason for Revision: Microsoft is announcing the availability of<br \/>\nIntel-validated microcode updates for Windows 10 operating<br \/>\nsystems. Please see Microsoft Knowledge Base Article 4093836<br \/>\n(https:\/\/support.microsoft.com\/en-us\/help\/4093836) for the<br \/>\ncurrent Intel microcode updates.<br \/>\n&#8211; Originally posted: August 14, 2018<br \/>\n&#8211; Updated: August 24, 2018<br \/>\n&#8211; Version: 2.0<\/p>\n<h2>Warning: Microsoft's FAQ advices are wrong!<\/h2>\n<p>The\u00a0Microsoft Security Advisory <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">ADV180018<\/a>\u00a0contains also a section '<strong class=\"\">2. How do I enable the mitigation for CVE-2017-5754<\/strong>' where they are writing:<\/p>\n<blockquote><p>To enable protection for CVE-2017-5715 and CVE 2017-5754:<\/p>\n<p>reg add \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management\" \/v FeatureSettingsOverride \/t REG_DWORD \/d <strong>0<\/strong> \/f<\/p>\n<p>reg add \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management\" \/v FeatureSettingsOverrideMask \/t REG_DWORD \/d <strong>3<\/strong> \/f<\/p>\n<p>Restart the computer for the changes to take effect.<\/p><\/blockquote>\n<p>Also\u00a0the\u00a0article\u00a0<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4072698\/windows-server-guidance-to-protect-against-the-speculative-execution\" target=\"_blank\" rel=\"noopener\">Windows Server guidance to protect against speculative execution side-channel vulnerabilities<\/a>\u00a0contains these registry settings.<\/p>\n<p>German blog reader Karl Wester-Ebbinghaus (a consultant in Windows area) pointed out <a href=\"https:\/\/www.borncity.com\/blog\/2018\/08\/25\/security-advisory-update-adv180018\/#comment-61774\" target=\"_blank\" rel=\"noopener\">in a comment<\/a> at my German blog, that Microsoft's advice is simply wrong. He wrote within this comment:\u00a0<em>This [the registry entries given above] leads to the deactivation of Microsoft's protection measures to SpectreNG v4 (SSB).\u00a0<\/em>Karl then pointed out, that the correct registry settings\u00a0 for server and clients (AMD and Intel) are:<\/p>\n<p>reg add \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management\" \/v FeatureSettingsOverride \/t REG_DWORD \/d <strong>8<\/strong> \/f<\/p>\n<p>reg add \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Session Manager\\Memory Management\" \/v FeatureSettingsOverrideMask<br \/>\n\/t REG_DWORD \/d <strong>3<\/strong> \/f<\/p>\n<p>And for Hyper-V<\/p>\n<p>reg add \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Virtualization\" \/v MinVmVersionForCpuBasedMitigations \/t REG_SZ \/d \"1.0\" \/f<\/p>\n<p>So please note the amended values.<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2018\/08\/25\/microsoft-issues-with-updates-kb4456688-kb4100347\/\">Microsoft: Issues with Updates KB4456688\/KB4100347?<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2018\/08\/22\/intel-microcode-updates-kb4346084-kb4346085-kb4346086-kb4346087-kb434608-august-20-21-2018\/\">Intel Microcode Updates KB4346084, KB4346085, KB4346086, KB4346087, KB4346088 (August 20\/21, 2018)<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Microsoft released several updates for Windows with Intel Microcode updates on August 14. New a revision of the Microsoft Security Advisory Notification for ADV180018 was published on August 24. Here is the notification from Microsoft\u00a0 &#8211; and also an addendum &hellip; <a href=\"https:\/\/borncity.com\/win\/2018\/08\/25\/security-advisory-update-adv180018\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-6719","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/6719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=6719"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/6719\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=6719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=6719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=6719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}