{"id":7047,"date":"2018-09-17T00:22:02","date_gmt":"2018-09-16T22:22:02","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=7047"},"modified":"2022-01-24T17:38:44","modified_gmt":"2022-01-24T16:38:44","slug":"microsoft-security-advisories-and-update-revisions","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/09\/17\/microsoft-security-advisories-and-update-revisions\/","title":{"rendered":"Microsoft Security Advisories and Update revisions"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2018\/09\/16\/microsoft-security-advisories-und-update-nderungen\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Another addendum from last week regarding security advisories from Microsoft including changes to update descriptions.<\/p>\n<p><!--more--><\/p>\n<h2>FragmentSmack vulnerability (CVE-2018-5391)<\/h2>\n<p>The security warning about the FragmentSmack vulnerability CVE-2018-5391 was issued in August 2018 (see <a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/security-bulletin-for-august-2018\/\" target=\"_blank\" rel=\"noopener\">this Microsoft article<\/a>). The vulnerability allows attackers to execute a denial of service attack. It forces Windows systems to their knees and stops responding.  <\/p>\n<p>The vulnerability affects all versions of Windows 7 to 10 (including 8.1 RT), as well as Windows Server 2008, 2012, and 2016. On September 11, 2018, Microsoft released security updates for various versions of Windows for the FragmentSmack vulnerability CVE-2018-5391. These fix the vulnerability. A list of updates can be found <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">here<\/a> (search for the CVE). At Bleeping Computer there is <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/windows-systems-vulnerable-to-fragmentsmack-90s-like-dos-bug\/\" target=\"_blank\" rel=\"noopener\">this article<\/a>, which deals more extensively with the topic.  <\/p>\n<h2>More Security Messages<\/h2>\n<p>********************************************************************<br \/>Title: Microsoft Security Advisory Notification<br \/>Issued: September 11, 2018<br \/>********************************************************************  <\/p>\n<p>Security Advisories Released or Updated on September 11, 2018<br \/>======================================================  <\/p>\n<p>* Microsoft Security Advisory ADV180002  <\/p>\n<p>\u2013 Title: Guidance to mitigate speculative execution<br \/>&nbsp;&nbsp; side-channel vulnerabilities<br \/>\u2013 <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/ADV180002\/ADV180002\" target=\"_blank\" rel=\"noopener\">ADV180002<\/a><br \/>\u2013 Reason for Revision: The following updates have been made:<br \/>&nbsp;&nbsp; 1. Microsoft has released security update 4457128 for Windows<br \/>&nbsp;&nbsp; 10 Version 1803 for ARM64-based Systems to provide protection<br \/>&nbsp;&nbsp; against CVE-2017-5715. See the Affected Products table for links<br \/>&nbsp;&nbsp; to download and install the update. Note that this update is also<br \/>&nbsp;&nbsp; available via Windows Update. 2. Added FAQ #19 to explain where<br \/>&nbsp;&nbsp; customer can find and install ARM64 firmware that address<br \/>&nbsp;&nbsp; CVE-2017-5715 \u2013 Branch target injection (Spectre, Variant 2).<br \/>\u2013 Originally posted: January 3, 2018<br \/>\u2013 Updated: September 11, 2018<br \/>\u2013 Version: 25.0  <\/p>\n<p>* Microsoft Security Advisory ADV180018  <\/p>\n<p>\u2013 Title: Microsoft guidance to mitigate L1TF variant<br \/>\u2013 <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180018\" target=\"_blank\" rel=\"noopener\">ADV180018<\/a><br \/>\u2013 Reason for RevisioMicrosoft is announcing the release of<br \/>&nbsp;&nbsp; Monthly Rollup 4458010 and Security Only 4457984 for Windows<br \/>&nbsp;&nbsp; Server 2008 to provide additional protections against the<br \/>&nbsp;&nbsp; speculative execution side-channel vulnerability known as L1<br \/>&nbsp;&nbsp; Terminal Fault (L1TF) that affects Intel\u00c2\u00ae Core\u00c2\u00ae processors and<br \/>&nbsp;&nbsp; Intel\u00c2\u00ae Xeon\u00c2\u00ae processors (CVE-2018-3620 and CVE-2018-3646).<br \/>&nbsp;&nbsp; Customers running Windows Server 2008 should install either<br \/>&nbsp;&nbsp; 4458010 or 4457984 in addition to Security Update 4341832, which<br \/>&nbsp;&nbsp; was released on August 14, 2018.<br \/>&nbsp;&nbsp; See [<a href=\"https:\/\/cloudblogs.microsoft.com\/windowsserver\/2018\/06\/12\/windows-server-2008-sp2-servicing-changes\/\" target=\"_blank\" rel=\"noopener\">Windows Server 2008 SP2 servicing changes<\/a> ] for<br \/>&nbsp;&nbsp; more information. In addition, a note has been added to FAQ #2<br \/>&nbsp;&nbsp; to provide further information regarding enabling the mitigation<br \/>&nbsp;&nbsp; for CVE-2017-5754 (Meltdown).<br \/>\u2013 Originally posted: August 14, 2018<br \/>\u2013 Updated: September 11, 2018<br \/>\u2013 Version: 4.0  <\/p>\n<p>********************************************************************<br \/>Title: Microsoft Security Advisory Notification<br \/>Issued: September 12, 2018<br \/>********************************************************************<br \/>Security Advisories Released or Updated on September 12, 2018<br \/>=======================================================  <\/p>\n<p>* Microsoft Security Advisory ADV180022  <\/p>\n<p>\u2013 Title: Windows Denial of Service Vulnerability<br \/>\u2013 <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV180022\" target=\"_blank\" rel=\"noopener\">ADV180022<\/a><br \/>\u2013 Reason for Revision: Removed FAQ #3 regarding when the security<br \/>&nbsp;&nbsp; updates would be available for this vulnerability. The security<br \/>&nbsp;&nbsp; updates were released on September 9, 2018 at the same time the<br \/>&nbsp;&nbsp; advisory was published; therefore, the FAQ is not applicable. This<br \/>&nbsp;&nbsp; is an informational change only.<br \/>\u2013 Originally posted: September 11, 2018<br \/>\u2013 Updated: September 12, 2018<br \/>\u2013 Version: 1.1  <\/p>\n<p>********************************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: September 11, 2018<br \/>********************************************************************  <\/p>\n<p>Summary<br \/>=======  <\/p>\n<p>The following CVE has undergone a major revision increment:  <\/p>\n<p>* CVE-2018-8154<br \/>Revision Information:<br \/>=====================  <\/p>\n<p>\u2013 CVE-2018-8154 | Microsoft Exchange Memory Corruption<br \/>&nbsp;&nbsp; Vulnerability<br \/>\u2013 <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\u2013 Reason for Revision: To comprehensively address CVE-2018-8154,<br \/>&nbsp;&nbsp; Microsoft has released security update 4458311 for Microsoft<br \/>&nbsp;&nbsp; Exchange Server 2010 Service Pack 3. Microsoft recommends that<br \/>&nbsp;&nbsp; enterprise customers running Microsoft Exchange Server 2010<br \/>&nbsp;&nbsp; Service Pack 3 ensure that they have update 4458311 installed<br \/>&nbsp;&nbsp; to be protected from this vulnerability.<br \/>\u2013 Originally posted: May 8, 2018<br \/>\u2013 Updated: September 11, 2018<br \/>\u2013 Aggregate CVE Severity Rating: Critical<br \/>\u2013 Version: 2.0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Another addendum from last week regarding security advisories from Microsoft including changes to update descriptions.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22,2],"tags":[69,195],"class_list":["post-7047","post","type-post","status-publish","format-standard","hentry","category-security","category-update","category-windows","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/7047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=7047"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/7047\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=7047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=7047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=7047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}