{"id":8300,"date":"2019-01-16T00:41:41","date_gmt":"2019-01-15T23:41:41","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=8300"},"modified":"2019-01-16T00:42:04","modified_gmt":"2019-01-15T23:42:04","slug":"microsoft-security-update-releases-january-15-2019","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/01\/16\/microsoft-security-update-releases-january-15-2019\/","title":{"rendered":"Microsoft Security Update Releases (January 15, 2019)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">Microsoft has released a comprehensive security update release as of January 15, 2019. This describes update revisions for various products and is classified as important.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg04.met.vgwort.de\/na\/d1b928c2a79845a883e60bef967b38fe\" width=\"1\" height=\"1\">Here is the information from the Microsoft Security Update Releases <\/p>\n<p>********************************************************************<br \/>Title: Microsoft Security Update Releases<br \/>Issued: January 15, 2019<br \/>********************************************************************<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2018-8416<br \/>* CVE-2019-0545<br \/>* CVE-2019-0546<br \/>* CVE-2019-0624<br \/>* CVE-2019-0646<br \/>* CVE-2019-0647<\/p>\n<p>Revision Information:<br \/>=====================<\/p>\n<p>&#8211; CVE-2018-8416 | .NET Core Tampering <br \/>&nbsp;&nbsp; Vulnerability<br \/>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: Revised the Security Updates table to<br \/>&nbsp;&nbsp; include PowerShell Core 6.1 and 6.2 because they are affected<br \/>&nbsp;&nbsp; by CVE-2018-8416. See <br \/>&nbsp;&nbsp; <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/11\" target=\"_blank\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/11<\/a> for more<br \/>&nbsp;&nbsp; information.<br \/>&#8211; Originally posted: November 13, 2018<br \/>&#8211; Updated: January 15, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Moderate<br \/>&#8211; Version: 2.0<\/p>\n<p>&#8211; CVE-2019-0545 | .NET Framework Information Disclosure<br \/>&nbsp;&nbsp; Vulnerability<br \/>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: Revised the Security Updates table to<br \/>&nbsp;&nbsp; include PowerShell Core 6.1 and 6.2 because they are affected<br \/>&nbsp;&nbsp; by CVE-2019-0545. See <br \/>&nbsp;&nbsp; <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/10\" target=\"_blank\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/10<\/a> for more<br \/>&nbsp;&nbsp; information.<br \/>&#8211; Originally posted: January 8, 2018<br \/>&#8211; Updated: January 15, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<br \/>&#8211; Version: 2.0<\/p>\n<p>&#8211; CVE-2019-0564 | ASP.NET Core Denial of Service Vulnerability<br \/>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: Revised the Security Updates table to<br \/>&nbsp;&nbsp; include PowerShell Core 6.1 and 6.2 because they are affected<br \/>&nbsp;&nbsp; by CVE-2019-0564. See <br \/>&nbsp;&nbsp; <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/12\" target=\"_blank\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/12<\/a> for more<br \/>&nbsp;&nbsp; information.<br \/>&#8211; Originally posted: January 8, 2018<br \/>&#8211; Updated: January 15, 2019<br \/>&#8211; Aggregate CVE Severity Rating: Important<br \/>&#8211; Version: 2.0<\/p>\n<p>&#8211; CVE-2019-0624 | Skype for Business 2015 Spoofing Vulnerability<br \/>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: Information published.<br \/>&#8211; Originally posted: January 15, 2018<br \/>&#8211; Updated: N\/A<br \/>&#8211; Aggregate CVE Severity Rating: Important<br \/>&#8211; Version: 1.0<\/p>\n<p>&#8211; CVE-2019-0646 | Team Foundation Server Cross-site Scripting<br \/>&nbsp;&nbsp; Vulnerability<br \/>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: Information published.<br \/>&#8211; Originally posted: January 15, 2018<br \/>&#8211; Updated: N\/A<br \/>&#8211; Aggregate CVE Severity Rating: Important<br \/>&#8211; Version: 1.0<\/p>\n<p>&#8211; CVE-2019-0647 | Team Foundation Server Information Disclosure<br \/>&nbsp;&nbsp; Vulnerability<br \/>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" target=\"_blank\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance<\/a><br \/>&#8211; Reason for Revision: Information published.<br \/>&#8211; Originally posted: January 15, 2018<br \/>&#8211; Updated: N\/A<br \/>&#8211; Aggregate CVE Severity Rating: Moderate<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has released a comprehensive security update release as of January 15, 2019. This describes update revisions for various products and is classified as important.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,22],"tags":[69,195],"class_list":["post-8300","post","type-post","status-publish","format-standard","hentry","category-security","category-update","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/8300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=8300"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/8300\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=8300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=8300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=8300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}