Skip to main content

Microsoft Security Update Releases Issued: February 19, 2019


TripleHelix
Moderator
Forum|alt.badge.img+63
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

********************************************************************
Title: Microsoft Security Update Releases
Issued: February 19, 2019
********************************************************************

Summary
=======

The following CVEs have undergone a major revision increment:

* CVE-2019-0627
* CVE-2019-0631
* CVE-2019-0632
* CVE-2019-0657
* CVE-2019-0663


Revision Information:
=====================

- https://portal.msrc.microsoft.com/en-us/security-guidance/
advisory/CVE-2019-0627
- Version: 2.0
- Reason for Revision: Revised the Security Updates table to include
PowerShell Core 6.1 and 6.2 because they are affected by this
vulnerability. See https://github.com/PowerShell/Announcements/
issues/13 for more information.
- Originally posted: February 12, 2019
- Updated: February 19, 2019
- Aggregate CVE Severity Rating: Important

- https://portal.msrc.microsoft.com/en-us/security-guidance/
advisory/CVE-2019-0631
- Version: 2.0
- Reason for Revision: Revised the Security Updates table to include
PowerShell Core 6.1 and 6.2 because they are affected by this
vulnerability. See https://github.com/PowerShell/Announcements/
issues/13 for more information.
- Originally posted: February 12, 2019
- Updated: February 19, 2019
- Aggregate CVE Severity Rating: Important

- https://portal.msrc.microsoft.com/en-us/security-guidance/
advisory/CVE-2019-0632
- Version: 2.0
- Reason for Revision: Revised the Security Updates table to include
PowerShell Core 6.1 and 6.2 because they are affected by this
vulnerability. See https://github.com/PowerShell/Announcements/
issues/13 for more information.
- Originally posted: February 12, 2019
- Updated: February 19, 2019
- Aggregate CVE Severity Rating: Important

- https://portal.msrc.microsoft.com/en-us/security-guidance/
advisory/CVE-2019-0657
- Version: 2.0
- Reason for Revision: Revised the Security Updates table to include
PowerShell Core 6.1 and 6.2 because they are affected by this
vulnerability. See https://github.com/PowerShell/Announcements/
issues/14 for more information.
- Originally posted: February 12, 2019
- Updated: February 19, 2019
- Aggregate CVE Severity Rating: Important

- https://portal.msrc.microsoft.com/en-us/security-guidance/
advisory/CVE-2019-0663
- Version: 1.0
- Reason for Revision: Information published.
- Originally posted: February 12, 2019
- Updated: N/A
- Aggregate CVE Severity Rating: Important


Other Information
=================

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.

2 replies

Ssherjj
Moderator
Forum|alt.badge.img+62
  • Moderator
  • 21952 replies
  • February 20, 2019
Thank you Daniel as always this is Patch Tuesday..already?🤗

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54
Thank you Daniel.

Reply