The February security updates have been released and consist of 77 CVE's and three security advisories in which 20 are rated Critical, 54 are rated Important, and three are rated Moderate in severity. Four are listed as publicly known and one is listed as being under active attack at the time of release.
In addition to
defense-in-depth updates, the updates address Remote Code Execution, Security Feature Bypass, Information Disclosure, Elevation of Privilege, Spoofing, and Security Feature Bypass
and apply to the following: Adobe Flash Player, Internet Explorer, Microsoft Edge, Microsoft Windows, Microsoft Office and Microsoft Office Services and Web Apps, ChakraCore, .NET Framework, Microsoft Exchange Server, Microsoft Visual Studio, Azure IoT SDK, Microsoft Dynamics, Team Foundation Server, and Visual Studio Code.
Important: A Servicing Stack Update has been released for the following operating systems. Windows 10 Version 1607, Windows Server 2016, and Windows Server 2016 (Server Core installation); Windows 10 Version 1703; Windows 10 Version 1709 and Windows Server, version 1709 (Server& Core Installation); Windows 10 Version 1803, and Windows Server, version 1803 (Server Core Installation). See the "Additional Update Notes" below for more information.
Known Issues In the February Update:
Recommended Reading:
Note: See Dustin Childs review and analysis in Zero Day Initiative — The February 2019 Security Update Review.
More: For more information about the updates released today, see https://portal.msrc.microsoft.com/en-us/security-guidance/summary. Updates can be sorted by OS from the search box. Information about the update for Windows 10 is available at Windows 10 Update history.
Additional Update Notes:
- Adobe Flash Player -- For Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1 and Windows 10, Adobe Flash Player is now a security bulletin rather than a security advisory and is included with the updates as identified above.
- MSRT -- Microsoft released an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center. Note: Users who are paranoid about the remote possibility of a FP can opt to run this tool from a Command Prompt, appending a /N parameter [for "detect only" mode].
- Servicing Stack Updates -- A list of the latest servicing stack updates for each operating system can be found in ADV990001. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.
- Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the Microsoft Update Catalog.
- Updates for Windows RT 8.1 and Microsoft Office RT software are only available via Windows Update.
- For information on lifecycle and support dates for Windows 10 operating systems, please see Windows Lifecycle Facts Sheet.
References
Remember - "A day without laughter is a day wasted."
May the wind sing to you and the sun rise in your heart...