{"id":8675,"date":"2019-02-20T12:18:01","date_gmt":"2019-02-20T11:18:01","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=8675"},"modified":"2022-05-04T16:04:48","modified_gmt":"2022-05-04T14:04:48","slug":"microsoft-security-update-releases-feb-19-2019","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/02\/20\/microsoft-security-update-releases-feb-19-2019\/","title":{"rendered":"Microsoft Security Update Releases (Feb. 19,\/20, 2019)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>On\u00a0 February 19, and 20, 2019, Microsoft has released several (informational) Security Update Releases that deal with changes in CVE descriptions, etc. Here is the corresponding raw text for your information.<\/p>\n<p><!--more--><\/p>\n<p>********************************************************************<br \/>\nTitle: Microsoft Security Update Releases<br \/>\nIssued: February 19, 2019<br \/>\n********************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2019-0627<br \/>\n* CVE-2019-0631<br \/>\n* CVE-2019-0632<br \/>\n* CVE-2019-0657<br \/>\n* CVE-2019-0663<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-0627\" target=\"_blank\" rel=\"noopener\">CVE-2019-0627<\/a><br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: Revised the Security Updates table to include<br \/>\nPowerShell Core 6.1 and 6.2 because they are affected by this<br \/>\nvulnerability. See <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/13\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/13<\/a> for more information.<br \/>\n&#8211; Originally posted: February 12, 2019<br \/>\n&#8211; Updated: February 19, 2019<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20200227090729\/https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-0631\" target=\"_blank\" rel=\"noopener\">CVE-2019-0631<\/a><br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: Revised the Security Updates table to include<br \/>\nPowerShell Core 6.1 and 6.2 because they are affected by this<br \/>\nvulnerability. See <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/13\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/13<\/a> for more information.<br \/>\n&#8211; Originally posted: February 12, 2019<br \/>\n&#8211; Updated: February 19, 2019<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/CVE-2019-0632CVE-2019-0632\" target=\"_blank\" rel=\"noopener\">CVE-2019-0632<\/a><br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: Revised the Security Updates table to include<br \/>\nPowerShell Core 6.1 and 6.2 because they are affected by this<br \/>\nvulnerability. See <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/13\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/13<\/a> for more information.<br \/>\n&#8211; Originally posted: February 12, 2019<br \/>\n&#8211; Updated: February 19, 2019<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/web.archive.org\/web\/20201004124939\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-0657\" target=\"_blank\" rel=\"noopener\">CVE-2019-0657<\/a><br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: Revised the Security Updates table to include<br \/>\nPowerShell Core 6.1 and 6.2 because they are affected by this<br \/>\nvulnerability. See <a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/14\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/14<\/a> for more information.<br \/>\n&#8211; Originally posted: February 12, 2019<br \/>\n&#8211; Updated: February 19, 2019<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-0663\" target=\"_blank\" rel=\"noopener\">CVE-2019-0663<\/a><br \/>\n&#8211; Version: 1.0<br \/>\n&#8211; Reason for Revision: Information published.<br \/>\n&#8211; Originally posted: February 12, 2019<br \/>\n&#8211; Updated: N\/A<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>********************************************************************<br \/>\nTitle: Microsoft Security Advisory Notification<br \/>\nIssued: February 20, 2019<br \/>\n********************************************************************<\/p>\n<p>Security Advisories Released or Updated on February 20, 2019<br \/>\n===================================================================<\/p>\n<p>* Microsoft Security Advisory ADV190005<\/p>\n<p>&#8211; ADV190005 | Guidance to adjust HTTP\/2 SETTINGS frames<br \/>\n&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV190005\" target=\"_blank\" rel=\"noopener\">https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190005<\/a><br \/>\n&#8211; Reason for Revision: Information published.<br \/>\n&#8211; Originally posted: February 20, 2019<br \/>\n&#8211; Updated: N\/A<br \/>\n&#8211; Version: 1.0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On\u00a0 February 19, and 20, 2019, Microsoft has released several (informational) Security Update Releases that deal with changes in CVE descriptions, etc. Here is the corresponding raw text for your information.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[69],"class_list":["post-8675","post","type-post","status-publish","format-standard","hentry","category-security","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/8675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=8675"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/8675\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=8675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=8675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=8675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}