{"id":9862,"date":"2019-05-24T01:08:03","date_gmt":"2019-05-23T23:08:03","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=9862"},"modified":"2022-11-03T10:36:36","modified_gmt":"2022-11-03T09:36:36","slug":"microsoft-security-update-releases-revisions-may-2019","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/05\/24\/microsoft-security-update-releases-revisions-may-2019\/","title":{"rendered":"Microsoft Security Update Releases\/Revisions May 2019"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Windows Update\" width=\"54\" height=\"54\" align=\"left\" border=\"0\" \/>In May 2019 Microsoft has published Security Update Releases for May 14, and 21, 2019. Here is the relevant information.<\/p>\n<p><!--more--><\/p>\n<p>***************************************************************************<br \/>\nTitle: Microsoft Security Update Releases<br \/>\nIssued: May 21, 2019<br \/>\n***************************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVEs have undergone a major revision increment:<\/p>\n<p>* CVE-2019-0733<br \/>\n* CVE-2019-0820<br \/>\n* CVE-2019-0980<br \/>\n* CVE-2019-0981<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>&#8211; <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-us\/vulnerability\/CVE-2020-17022CVE-2019-0733\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0733<\/a><br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell Core<br \/>\n6.1 and 6.2 because they are affected by CVE-2019-0733. See<br \/>\n<a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/18\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/18<\/a> for more information.<br \/>\n&#8211; Originally posted: May 14, 2019<br \/>\n&#8211; Updated: May 21, 2019<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-0820\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0820<\/a><br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell Core<br \/>\n6.1 and 6.2 because they are affected by CVE-2019-0820. See<br \/>\n<a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/15\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/15<\/a> for more information.<br \/>\n&#8211; Originally posted: May 14, 2019<br \/>\n&#8211; Updated: May 21, 2019<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-0980\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0980<\/a><br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell Core<br \/>\n6.1 and 6.2 because they are affected by CVE-2019-0980. See<br \/>\n<a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/16\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/16<\/a> for more information.<br \/>\n&#8211; Originally posted: May 14, 2019<br \/>\n&#8211; Updated: May 21, 2019<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-0981\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0981<\/a><br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: Revised the Security Updates table to include PowerShell Core<br \/>\n6.1 and 6.2 because they are affected by CVE-2019-0981. See<br \/>\n<a href=\"https:\/\/github.com\/PowerShell\/Announcements\/issues\/17\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/PowerShell\/Announcements\/issues\/17<\/a> for more information.<br \/>\n&#8211; Originally posted: May 14, 2019<br \/>\n&#8211; Updated: May 21, 2019<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>***************************************************************************<br \/>\nTitle: Microsoft Security Update Releases<br \/>\nIssued: May 14, 2019<br \/>\n***************************************************************************<\/p>\n<p>Summary<br \/>\n=======<\/p>\n<p>The following CVE has undergone a major revision increment:<\/p>\n<p>* CVE-2019-0683<\/p>\n<p>Revision Information:<br \/>\n=====================<\/p>\n<p>&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2019-0683\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-0683<\/a><br \/>\n&#8211; Version: 2.0<br \/>\n&#8211; Reason for Revision: On May 14, 2019, Microsoft released security updates for all<br \/>\nversions of Microsoft Windows to introduce a new trust flag to add a new safe default<br \/>\nconfiguration for CVE-2018-0683, the CVE that addresses the issue described in<br \/>\nADV190006. For more information please see <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4490425\/updates-to-tgt-delegation-across-incoming-trusts-in-windows-server\" target=\"_blank\" rel=\"noopener noreferrer\">4490425<\/a>.<br \/>\n&#8211; Originally posted: March 12, 2019<br \/>\n&#8211; Updated: May 14, 2019<br \/>\n&#8211; Aggregate CVE Severity Rating: Important<\/p>\n<p>***************************************************************************<br \/>\nTitle: Microsoft Security Advisory Notification<br \/>\nIssued: May 14, 2019<br \/>\n***************************************************************************<\/p>\n<p>Security Advisories Released or Updated on May 14, 2019<br \/>\n============================================================<\/p>\n<p>* Microsoft Security Advisory ADV990001<\/p>\n<p>&#8211; ADV990001 | Latest Servicing Stack Updates<br \/>\n&#8211;\u00a0 ADV990001<br \/>\n&#8211; Reason for Revision: A Servicing Stack Update has been released for Windows 10<br \/>\nversion 1507, Windows 10 version 1607, Windows Server 2016, Windows 10 version<br \/>\n1703, Windows 10 version 1709, Windows Server, version 1709, Windows 10 version<br \/>\n1803, Windows Server, version 1803, Windows 10 version 1809, Windows Server 2019,<br \/>\nWindows 10 version 1809 and Windows Server, version 1809. See the FAQ section for<br \/>\nmore information.<br \/>\n&#8211; Originally posted: November 13, 2018<br \/>\n&#8211; Updated: May 14, 2019<br \/>\n&#8211; Version: 8.0<\/p>\n<p>* Microsoft Security Advisory ADV190012<\/p>\n<p>&#8211; ADV190012 | May 2019 Adobe Flash Security Update<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190012\" target=\"_blank\" rel=\"noopener noreferrer\">ADV190012<\/a><br \/>\n&#8211; Reason for Revision: Information published.<br \/>\n&#8211; Originally posted: May 14, 2019<br \/>\n&#8211; Updated: N\/A<br \/>\n&#8211; Version: 1.0<\/p>\n<p>* Microsoft Security Advisory ADV190013<\/p>\n<p>&#8211; ADV190013 | Microsoft Guidance to mitigate Microarchitectural Data Sampling<br \/>\nvulnerabilities<br \/>\n&#8211; <a href=\"https:\/\/web.archive.org\/web\/20200916142137\/https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190013\" target=\"_blank\" rel=\"noopener noreferrer\">ADV190013<\/a><br \/>\n&#8211; Reason for Revision: Information published.<br \/>\n&#8211; Originally posted: May 14, 2018<br \/>\n&#8211; Updated: N\/A<br \/>\n&#8211; Version: 1.0<\/p>\n<p>* Microsoft Security Advisory ADV190006<\/p>\n<p>&#8211; ADV190006 | Guidance to mitigate unconstrained delegation vulnerabilities<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190006\" target=\"_blank\" rel=\"noopener noreferrer\">ADV190006<\/a><br \/>\n&#8211; Reason for Revision: On May 14, 2019, Microsoft released security updates to<br \/>\nintroduce a new trust flag to add a new safe default configuration for<br \/>\nCVE-2018-0683, the CVE that addresses the issue described in this vulnerability.<br \/>\nFor more information please see <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4490425\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/support.microsoft.com\/en-us\/help\/4490425\/<\/a><br \/>\nSee CVE-2019-0863 for links to download the updates.<br \/>\n&#8211; Originally posted: February 12, 2019<br \/>\n&#8211; Updated: May 14, 2019<br \/>\n&#8211; Version: 1.3<\/p>\n<p>* Microsoft Security Advisory ADV190009<\/p>\n<p>&#8211; ADV190009 | SHA-2 Code Sign Support Advisory<br \/>\n&#8211; <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV190009\" target=\"_blank\" rel=\"noopener noreferrer\">ADV190009<\/a><br \/>\n&#8211; Reason for Revision: Microsoft is announcing the availability of the support<br \/>\nSHA-2 code sign support for Windows Server 2008 Service Pack 2.<br \/>\n&#8211; Originally posted: March 12, 2019<br \/>\n&#8211; Updated: May 14, 2019<br \/>\n&#8211; Version: 2.0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In May 2019 Microsoft has published Security Update Releases for May 14, and 21, 2019. Here is the relevant information.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[195],"class_list":["post-9862","post","type-post","status-publish","format-standard","hentry","category-update","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/9862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=9862"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/9862\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=9862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=9862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=9862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}