The Microsoft February security updates have been released and consist of 99 CVEs. Of these 12 CVEs, rated Critical and 83 are rated Important in severity. According to Microsoft, five of these bugs are publicly known and one is currently under active attack.
The updates apply to the following: Microsoft Windows, Microsoft Edge (EdgeHTML-based), Microsoft Edge Chromium-based), ChakraCore, Internet Explorer, Microsoft Exchange Server, Microsoft SQL Server, Microsoft Office and Microsoft Office Services and Web Apps, Windows Malicious Software Removal Tool, and Windows Surface Hub.
The following KBs contain information about known issues with the security updates.
Known Issues
KB Article | Applies To |
---|---|
4532691 | Windows 10 Version 1809, Windows Server 2019 |
4536987 | Microsoft Exchange Server 2016 & 2019 |
4536988 | Microsoft Exchange Server 2013 |
4536989 | Microsoft Exchange Server 2010 |
4537762 | Windows 10, version 1803, Windows Server version 1803 |
4537764 | Windows 10, version 1607, Windows Server 2016 |
4537776 | Windows 10 |
4537789 | Windows 10, version 1709 |
4537794 | Windows Server 2012 (Security-only update) |
4537803 | Windows 8.1, Windows Server 2012 R2 (Security-only update) |
4537813 | Windows 7, Windows Server 2008 R2 (Security-only update) |
4537814 | Windows Server 2012 (Monthly Rollup) |
4537821 | Windows 8.1, Windows Server 2012 R2 (Monthly Rollup) |
Recommended Reading:
See Dustin Childs review and analysis in Zero Day Initiative — The February 2020 Security Update Review.
For more information about the updates released today, see https://portal.msrc.microsoft.com/en-us/security-guidance/summary. Updates can be sorted by OS from the search box. Information about the update for Windows 10 is available at Windows 10 Update history.
Additional Update Notes:
- Adobe Flash Player -- For Windows Server 2012, Windows 8.1, Windows Server 2012 R2, Windows RT 8.1 and Windows 10, Adobe Flash Player is now a security bulletin rather than a security advisory and is included with the updates as identified above.
- MSRT -- Microsoft released an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services, and the Download Center. Note: Users who are paranoid about the remote possibility of a FP can opt to run this tool from a Command Prompt, appending a /N parameter [for "detect only" mode].
- Servicing Stack Updates -- A list of the latest servicing stack updates for each operating system can be found in ADV990001. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update. Learn more about SSU's in Servicing Stack Updates (SSU)
- Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are also available via the Microsoft Update Catalog.
- For information on lifecycle and support dates for Windows 10 operating systems, please see Windows Lifecycle Facts Sheet.
- Windows Update History:
References
Remember - "A day without laughter is a day wasted."
May the wind sing to you and the sun rise in your heart...
No comments:
Post a Comment
Neither spam nor comments containing vulgarities will be approved.