{"id":7425,"date":"2018-10-18T15:58:27","date_gmt":"2018-10-18T13:58:27","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=7425"},"modified":"2018-10-18T16:02:08","modified_gmt":"2018-10-18T14:02:08","slug":"microsoft-security-update-releases-oct-17-2019","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/10\/18\/microsoft-security-update-releases-oct-17-2019\/","title":{"rendered":"Microsoft Security Update Releases (Oct 17, 2019)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>Microsoft has published a revised security update notification as of October 17, 2018, which I would like to briefly describe below. It is about MFC in connection with the cumulative update 11 for Exchange Server 2016 (KB4134118) and the SQL Server Management Studio.<\/p>\n<p><!--more--><\/p>\n<p>********************************************************************<br \/>\nTitle: Microsoft Security Update Releases<br \/>\nIssued: October 17, 2018<br \/>\n********************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2010-3190<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>&#8211; CVE-2010-3190 | MFC Insecure Library Loading Vulnerability<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Reason for Revision: Microsoft is announcing the release of<br \/>\nCumulative Update 11 for Exchange Server 2016 (KB4134118). This<br \/>\nupdate fully resolves the issue identified in CVE-2010-3190 for<br \/>\nExchange Server 2016.<br \/>\n&#8211; Originally posted: October 9, 2018<br \/>\n&#8211; Updated: October 17, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<br \/>\n&#8211; Version: 2.0<\/p>\n<p>On this topic I had published today the article <a href=\"https:\/\/borncity.com\/win\/2018\/10\/18\/exchange-server-active-sync-client-has-connect-sync-issues\/\">Exchange Server: Active Sync client has connect\/sync issues<\/a>. The following three CVEs have also been revised:<\/p>\n<p>* CVE-2018-8527<br \/>\n* CVE-2018-8532<br \/>\n* CVE-2018-8533<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>&#8211; SQL Server Management Studio Information Disclosure<br \/>\nVulnerability<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>\n&#8211; Reason for Revision: The following updates have been made:<br \/>\nThe following updates have been made: 1. In the Security Updates<br \/>\ntable, removed SQL Server Management Studio 18.0 (Preview 4)<br \/>\nbecause it is not affected by this vulnerability. 2. Removed the<br \/>\nlinks for SSMS 17.9 because this vulnerability is mitigated by<br \/>\nchanging settings. 3. Added an FAQ to explain how customers<br \/>\nrunning any version of SSMS can protect themselves from this<br \/>\nvulnerability. 4. Added a workaround to describe how customers<br \/>\ncan protect themselves from this vulnerability if they are unable<br \/>\nto clean-install SSMS 17.9.<br \/>\n&#8211; Originally posted: October 9, 2018<br \/>\n&#8211; Updated: October 17, 2018<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<br \/>\n&#8211; Version: 2.0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has published a revised security update notification as of October 17, 2018, which I would like to briefly describe below. It is about MFC in connection with the cumulative update 11 for Exchange Server 2016 (KB4134118) and the SQL &hellip; <a href=\"https:\/\/borncity.com\/win\/2018\/10\/18\/microsoft-security-update-releases-oct-17-2019\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22],"tags":[69,195],"class_list":["post-7425","post","type-post","status-publish","format-standard","hentry","category-security","category-update","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/7425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=7425"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/7425\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=7425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=7425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=7425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}