
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN391
_____________________________________________________________________

DATE                : 15/07/2020

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Internet Explorer,
                     Microsoft Windows,
                     Microsoft Edge,
                     Windows Server,
                     Windows Defender,
                     Microsoft System Center Endpoint Protection,
                     Microsoft Forefront Endpoint Protection,
                     Microsoft Security Essentials,
                     Microsoft Word,
                     Microsoft Office,
                     Microsoft Project,
                     Microsoft Office Web Apps
                     Microsoft Outlook,
                     Microsoft 365 Apps for Enterprise,
                     Microsoft Business Productivity Servers,
                     Microsoft Visual Studio Code,
                     Microsoft SharePoint Server,
                     Microsoft SharePoint Enterprise Server,
                     Microsoft SharePoint Foundation,
                     Azure DevOps Server,
                     Microsoft Bond,
                     OneDrive for Windows,
                     .NET Core, .NET Framework,
                     Skype for Business Server,
                     Microsoft Lync Server.

=====================================================================
https://portal.msrc.microsoft.com/en-us/security-guidance
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0762
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1469
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV200008
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001
_____________________________________________________________________


********************************************************************
Microsoft Security Update Summary for July 14, 2020
Issued: July 14, 2020
********************************************************************

This summary lists security updates released for July 14, 2020.

Complete information for the July 2020 security update release
Can be found at
<https://portal.msrc.microsoft.com/en-us/security-guidance>.

Please note the following information regarding the security updates:

* For information regarding enabling Windows 10, version 1909 features,
please see Windows 10, version 1909 delivery options:
https://techcommunity.microsoft.com/t5/Windows-IT-Pro-Blog/Windows-10-
version-1909-delivery-options/ba-p/1002660. Note that Windows 10, versions
1903 and 1909 share a common core operating system with an identical set of
system files. They will also share the same security update KBs.
* Windows 10 updates are cumulative. The monthly security release
includes all security fixes for vulnerabilities that affect Windows
10, in addition to non-security updates. The updates are available
via the Microsoft Update Catalog:
https://catalog.update.microsoft.com/v7/site/Home.aspx.
* For information on lifecycle and support dates for Windows 10
operating systems, please see the Windows Lifecycle Facts Sheet:
https://support.microsoft.com/en-us/help/13853/windows-
lifecycle-fact-sheet).
* A list of the latest servicing stack updates for each operating
system can be found in ADV990001: https://portal.msrc.microsoft.com
/en-us/security-guidance/advisory/ADV990001. This list will be
updated whenever a new servicing stack update is released. It is
important to install the latest servicing stack update.
* Updates for Windows RT 8.1 and Microsoft Office RT software are
only available via Windows Update:
https://go.microsoft.com/fwlink/?LinkId=21130.
* In addition to security changes for the vulnerabilities, updates
include defense-in-depth updates to help improve security-related
features.
* Customers running Windows 7, Windows Server 2008 R2, or Windows Server
2008
need to purchase the Extended Security Update to continue receiving
security
updates. See https://support.microsoft.com/en-us/help/4522133/procedure-to-
continue-receiving-security-updates for more information.


Critical Security Updates
============================

Internet Explorer 11
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1709 for x64-based Systems
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for ARM64-based Systems
Windows 10 Version 1903 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for x64-based Systems
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows RT 8.1
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core
installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core
installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core
installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 1903 (Server Core installation)
Windows Server, version 1909 (Server Core installation)
Windows Server, version 2004 (Server Core installation)
Microsoft 365 Apps for Enterprise for 32-bit Systems
Microsoft 365 Apps for Enterprise for 64-bit Systems
Microsoft Business Productivity Servers 2010 Service Pack 2
Microsoft Office 2019 for 32-bit editions
Microsoft Office 2019 for 64-bit editions
Microsoft Outlook 2010 Service Pack 2 (32-bit editions)
Microsoft Outlook 2010 Service Pack 2 (64-bit editions)
Microsoft Outlook 2013 RT Service Pack 1
Microsoft Outlook 2013 Service Pack 1 (32-bit editions)
Microsoft Outlook 2013 Service Pack 1 (64-bit editions)
Microsoft Outlook 2016 (32-bit edition)
Microsoft Outlook 2016 (64-bit edition)
Microsoft SharePoint Enterprise Server 2013 Service Pack 1
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft SharePoint Server 2010 Service Pack 2
Microsoft SharePoint Server 2019
Microsoft .NET Framework 2.0 Service Pack 2
Microsoft .NET Framework 3.0 Service Pack 2
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2
Microsoft .NET Framework 3.5 AND 4.6/4.6.1/4.6.2
Microsoft .NET Framework 3.5 AND 4.7.1/4.7.2
Microsoft .NET Framework 3.5 AND 4.7.2
Microsoft .NET Framework 3.5 AND 4.8
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.5.2
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2
Microsoft .NET Framework 4.8
.NET Core 2.1
.NET Core 3.1
Skype for Business Server 2015 CU 8
Skype for Business Server 2019  CU2
Microsoft Lync Server 2013


Important Security Updates
============================

Microsoft Edge (EdgeHTML-based)
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft Office 2016 for Mac
Microsoft Office 2019 for 32-bit editions
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2019 for Mac
Microsoft Office Online Server
Microsoft Office Web Apps 2010 Service Pack 2
Microsoft Office Web Apps 2013 Service Pack 1
Microsoft Project 2010 Service Pack 2 (32-bit editions)
Microsoft Project 2010 Service Pack 2 (64-bit editions)
Microsoft Project 2013 Service Pack 1 (32-bit editions)
Microsoft Project 2013 Service Pack 1 (64-bit editions)
Microsoft Project 2016 (32-bit edition)
Microsoft Project 2016 (64-bit edition)
Microsoft Word 2010 Service Pack 2 (32-bit editions)
Microsoft Word 2010 Service Pack 2 (64-bit editions)
Microsoft Word 2013 RT Service Pack 1
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft Word 2016 (32-bit edition)
Microsoft Word 2016 (64-bit edition)
Microsoft Forefront Endpoint Protection 2010
Microsoft Security Essentials
Microsoft System Center 2012 Endpoint Protection
Microsoft System Center 2012 R2 Endpoint Protection
Microsoft System Center Endpoint Protection
OneDrive for Windows
Visual Studio Code
Azure DevOps Server 2019 Update 1
Azure DevOps Server 2019 Update 1.1
Azure DevOps Server 2019.0.1
Bond 9.0.1

Moderate Security Updates
=========================

Internet Explorer 9


Other Information
=================

Recognize and avoid fraudulent email to Microsoft customers:
=============================================================
If you receive an email message that claims to be distributing
a Microsoft security update, it is a hoax that may contain
malware or pointers to malicious websites. Microsoft does
not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally
sign all security notifications. However, PGP is not required for
reading security notifications, reading security information, or
installing security updates. You can obtain the MSRC public PGP key
at
<https://technet.microsoft.com/security/dn753714>.

********************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT
DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING
THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE
LIABLE FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT,
INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL
DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY
FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO THE FOREGOING
LIMITATION MAY NOT APPLY.
********************************************************************

Microsoft respects your privacy. Please read our online Privacy
Statement at
<http://go.microsoft.com/fwlink/?LinkId=81184>.

If you would prefer not to receive future technical security
notification alerts by email from Microsoft and its family of
companies please visit the following website to unsubscribe:
<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwi
zard.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.

These settings will not affect any newsletters you've requested or
any mandatory service communications that are considered part of
certain Microsoft services.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052

_____________________________________________________________________


**************************************************************************************
Title: Microsoft Security Advisory Notification
Issued: July 14, 2020
**************************************************************************************

Security Advisories Released or Updated on July 14, 2020
======================================================================================

* ADV200008

 - ADV200008 | Microsoft Guidance for Enabling Request Smuggling Filter
on IIS Servers
 -
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV200008
 - Reason for Revision: Information published.
 - Originally posted: July 14, 2020
 - Updated: N/A
 - Version: 1.0

* ADV990001

 - ADV990001 | Latest Servicing Stack Updates
 -
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001
 - Reason for Revision: Advisory updated to announce new versions of
Servicing Stack
   Updates are available. Please see the FAQ for details.
 - Originally posted: November 13, 2019
 - Updated: July 14, 2020
 - Version: 24.0


======================================================================================

Other Information
=================

Recognize and avoid fraudulent email to Microsoft customers:
======================================================================================
If you receive an email message that claims to be distributing a
Microsoft security
update, it is a hoax that may contain malware or pointers to malicious
websites.
Microsoft does not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally sign
all security
notifications. However, PGP is not required for reading security
notifications,
reading security bulletins, or installing security updates. You can
obtain the MSRC
public PGP key at <https://technet.microsoft.com/security/dn753714>.

**************************************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS
IS" WITHOUT
WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS
OR IMPLIED,
INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR
ANY DAMAGES
WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS
OF BUSINESS
PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS
SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL
OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
**************************************************************************************

Microsoft respects your privacy. Please read our online Privacy
Statement at
<http://go.microsoft.com/fwlink/?LinkId=81184>.

If you would prefer not to receive future technical security
notification alerts by
email from Microsoft and its family of companies please visit the
following website to
unsubscribe:
<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar
d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.

These settings will not affect any newsletters you've requested or any
mandatory
service communications that are considered part of certain Microsoft
services.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052


_____________________________________________________________________

**************************************************************************************
Title: Microsoft Security Update Releases
Issued: July 14, 2020
**************************************************************************************

Summary
=======

The following CVEs have undergone a major revision increment:

* CVE-2020-0762
* CVE-2020-0763
* CVE-2020-1469


Revision Information:
=====================

* CVE-2020-0762

 - CVE-2020-0762 | Windows Defender Security Center Elevation of Privilege
   Vulnerability
 -
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0762
 - Version: 3.0
 - Reason for Revision: In the Security Updates table the following
revisions were
   made: 1. Added Windows Server 2019 and Windows Server 2019 (Server Core
   installation) because they are affected by this vulnerability. 2.
Removed all
   supported versions of Window 10 Version 1709 because they are not
affected by
   this vulnerability. 3. Corrected the Article and Download links.
 - Originally posted: March 10, 2020
 - Updated: July 14, 2020
 - Aggregate CVE Severity Rating: Important

* CVE-2020-0763

 - CVE-2020-0763 | Windows Defender Security Center Elevation of Privilege
   Vulnerability
 -
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2020-0762
 - Version: 3.0
 - Reason for Revision: In the Security Updates table the following
revisions were
   made: 1. Added all supported versions of Window 10 Version 1709
because they are
   affected by this vulnerability. 2. Corrected the Article and Download
links.
 - Originally posted: March 10, 2020
 - Updated: July 14, 2020
 - Aggregate CVE Severity Rating: Important

* CVE-2019-1469

 - CVE-2019-1469 | Win32k Information Disclosure Vulnerability
 -
https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1469
 - Version: 3.0
 - Reason for Revision: Added all versions of Windows 10 Version 2004 to
the Security
   Updates table because it is affected by this vulnerability. Microsoft
recommends
   that customers running Windows 10 Version 2004 install the latest
security updates
   to be fully protected from this vulnerability.
 - Originally posted: December 10, 2020
 - Updated: July 14, 2020
 - Aggregate CVE Severity Rating: Important


**************************************************************************************

Other Information
=================

Recognize and avoid fraudulent email to Microsoft customers:
======================================================================================

If you receive an email message that claims to be distributing a
Microsoft security
update, it is a hoax that may contain malware or pointers to malicious
websites.
Microsoft does not distribute security updates via email.

The Microsoft Security Response Center (MSRC) uses PGP to digitally sign
all security
notifications. However, PGP is not required for reading security
notifications,
reading security bulletins, or installing security updates. You can
obtain the MSRC
public PGP key at <https://technet.microsoft.com/security/dn753714>.

**************************************************************************************
THE INFORMATION PROVIDED IN THIS MICROSOFT COMMUNICATION IS PROVIDED "AS
IS" WITHOUT
WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS ALL WARRANTIES, EITHER EXPRESS
OR IMPLIED,
INCLUDING THE WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE FOR
ANY DAMAGES
WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS
OF BUSINESS
PROFITS OR SPECIAL DAMAGES, EVEN IF MICROSOFT CORPORATION OR ITS
SUPPLIERS HAVE BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR
CONSEQUENTIAL
OR INCIDENTAL DAMAGES SO THE FOREGOING LIMITATION MAY NOT APPLY.
**************************************************************************************
Microsoft respects your privacy. Please read our online Privacy
Statement at
<http://go.microsoft.com/fwlink/?LinkId=81184>.

If you would prefer not to receive future technical security
notification alerts by
email from Microsoft and its family of companies please visit the
following website
to unsubscribe:
<https://profile.microsoft.com/RegSysProfileCenter/subscriptionwizar
d.aspx?wizid=5a2a311b-5189-4c9b-9f1a-d5e913a26c2e&%3blcid=1033>.

These settings will not affect any newsletters you've requested or any
mandatory
service communications that are considered part of certain Microsoft
services.

For legal Information, see:
<http://www.microsoft.com/info/legalinfo/default.mspx>.

This newsletter was sent by:
Microsoft Corporation
1 Microsoft Way
Redmond, Washington, USA
98052

=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================







