Skip to main content

Microsoft Security Update Releases Issued: August 11, 2020

  • August 11, 2020
  • 2 replies
  • 55 views

TripleHelix
Moderator
Forum|alt.badge.img+63

-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA256

 

**************************************************************************************

Title: Microsoft Security Update Releases

Issued: August 11, 2020

**************************************************************************************

 

Summary

=======

 

The following CVEs have undergone a major revision increment:

 

* CVE-2020-0794

* CVE-2020-1347

 

 

Revision Information:

=====================

 

* CVE-2020-0794

 

 - CVE-2020-0794 | Windows Denial of Service Vulnerability

 - https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0794

 - Version 2.0

 - Reason for Revision: In the Security Updates table, added all supported versions

   of Windows 10 for 32-bit Systems, Windows 10 for x64-based Systems, Windows 10

   Version 1607, and Windows Server 2016 because these versions of Windows 10 and

   Windows Server are also affected by this vulnerability. Microsoft strongly

   recommends that customers running any of these versions of Windows 10 or Windows

   Server install the updates to be fully protected from the vulnerability.

   Customers whose systems are configured to receive automatic updates do not need

   to take any further action.

 - Originally posted: April 14, 2020

 - Updated: August 11, 2020

 - Aggregate CVE Severity Rating: Important

 

 

* CVE-2020-1347

 

 - CVE-2020-1347 | Windows Storage Services Elevation of Privilege Vulnerability

 - https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-1347

 - Version: 2.0

 - Reason for Revision: In the Security Updates table, added all supported versions

   of Windows 10 for 32-bit Systems, Windows 10 for x64-based Systems, Windows 10

   Version 1607, and Windows Server 2016 because these versions of Windows 10 and

   Windows Server are also affected by this vulnerability. Microsoft strongly

   recommends that customers running any of these versions of Windows 10 or Windows

   Server install the updates to be fully protected from the vulnerability.

   Customers whose systems are configured to receive automatic updates do not need

   to take any further action.

 - Originally posted: July 14, 2020

 - Updated: August 11, 2020

 - Aggregate CVE Severity Rating: Important

 

 

 

**************************************************************************************

 

Other Information

=================

 

Recognize and avoid fraudulent email to Microsoft customers:

======================================================================================

 

If you receive an email message that claims to be distributing a Microsoft security update, it is a hoax that may contain malware or pointers to malicious websites.

Microsoft does not distribute security updates via email.

 

2 replies

Jasper_The_Rasper
Moderator
Forum|alt.badge.img+54

Thank you again Daniel.


Ssherjj
Moderator
Forum|alt.badge.img+62
  • Moderator
  • August 11, 2020

Thank you Daniel!