{"id":66282,"date":"2019-01-09T11:30:52","date_gmt":"2019-01-09T02:30:52","guid":{"rendered":"https:\/\/www.softantenna.com\/wp\/?p=66282"},"modified":"2019-01-09T11:30:52","modified_gmt":"2019-01-09T02:30:52","slug":"windows-7-monthly-rollup-kb4480970","status":"publish","type":"post","link":"https:\/\/softantenna.com\/blog\/windows-7-monthly-rollup-kb4480970\/","title":{"rendered":"Windows 7\/8.1\u7528\u306e\u6708\u4f8b\u54c1\u8cea\u30ed\u30fc\u30eb\u30a2\u30c3\u30d7KB4480970\u3068KB4480964 \u304c\u516c\u958b"},"content":{"rendered":"<p><img decoding=\"async\" style=\"display:block; margin-left:auto; margin-right:auto;\" src=\"https:\/\/softantenna.com\/blog\/wp-content\/uploads\/2018\/02\/Is_20180214_105550.jpg\" alt=\"S 20180214 105550\" title=\"s_20180214_105550.jpg\" border=\"0\" width=\"1062\" height=\"733\" \/><\/p>\n<p>Microsoft\u306f\u672c\u65e5\u3001\u6708\u4f8b\u66f4\u65b0\u306e\u4e00\u8cab\u3068\u3057\u3066Windows 7 SP1\/Widnows 2008 R2 SP1\u7528\u306e\u6708\u4f8b\u54c1\u8cea\u30ed\u30fc\u30eb\u30a2\u30c3\u30d7<a href=\"https:\/\/support.microsoft.com\/en-in\/help\/4480970\">KB4480970<\/a>\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30aa\u30f3\u30ea\u30fc\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8<a href=\"https:\/\/support.microsoft.com\/en-in\/help\/4480960\">KB4480960<\/a>\u3092\u516c\u958b\u3057\u307e\u3057\u305f(<a href=\"https:\/\/www.neowin.net\/news\/patch-tuesday-heres-whats-new-for-windows-7-and-windows-81-2\/\">Neowin<\/a>)\u3002<\/p>\n<p>\u540c\u6642\u306bWindows 8.1\/Windows Server 2012 R2\u7528\u306e\u6708\u4f8b\u54c1\u8cea\u30ed\u30fc\u30eb\u30a2\u30c3\u30d7<a href=\"https:\/\/support.microsoft.com\/en-in\/help\/4480963\">KB4480963<\/a>\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30aa\u30f3\u30ea\u30fc\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8<a href=\"https:\/\/support.microsoft.com\/en-in\/help\/4480964\">KB4480964<\/a>\u3001Windows Server 2012\u7528\u306e\u6708\u4f8b\u54c1\u8cea\u30ed\u30fc\u30eb\u30a2\u30c3\u30d7<a href=\"https:\/\/support.microsoft.com\/en-in\/help\/4480975\">KB4480975<\/a>\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30aa\u30f3\u30ea\u30fc\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8<a href=\"https:\/\/support.microsoft.com\/en-in\/help\/4480972\">KB4480972<\/a>\u3082\u516c\u958b\u3055\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u66f4\u65b0\u30d7\u30ed\u30b0\u30e9\u30e0\u306f\u3001Windows Update\u307e\u305f\u306f\u3001Microsoft Update\u30ab\u30bf\u30ed\u30b0\u3092\u5229\u7528\u3057\u3066\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3059\u308b\u3053\u3068\u304c\u53ef\u80fd\u3067\u3001\u305d\u308c\u305e\u308c\u306e\u5909\u66f4\u70b9\u306f\u4ee5\u4e0b\u306e\u901a\u308a\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\n<h2>KB4480970 (Monthly Rollup)<\/h2>\n<p>Windows 7 SP1\/Widnows 2008 R2 SP1\u7528\u306e\u6708\u4f8b\u54c1\u8cea\u30ed\u30fc\u30eb\u30a2\u30c3\u30d7<a href=\"https:\/\/support.microsoft.com\/en-in\/help\/4480970\">KB4480970<\/a>\u3067\u306f\u3001AMD\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30fc\u7528\u306e\u6295\u6a5f\u7684\u30b9\u30c8\u30a2\u30d0\u30a4\u30d1\u30b9\u3068\u547c\u3070\u308c\u308b\u6295\u6a5f\u7684\u5b9f\u884c\u306e\u30b5\u30a4\u30c9\u30c1\u30e3\u30cd\u30eb\u8106\u5f31\u6027\u306b\u5bfe\u3059\u308b\u4fdd\u8b77\u306e\u63d0\u4f9b\u3084\u3001PowerShell\u30ea\u30e2\u30fc\u30c8\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306b\u5f71\u97ff\u3092\u53ca\u307c\u3059\u30bb\u30c3\u30b7\u30e7\u30f3\u5206\u96e2\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e0a\u306e\u8106\u5f31\u6027\u306e\u4fee\u6b63\u3001Windows\u306e\u5404\u7a2e\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u304c\u884c\u308f\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<blockquote>\n<ul>\n<li>\n<p>Provides protections against an additional subclass of speculative execution side-channel vulnerability known as <a href=\"https:\/\/blogs.technet.microsoft.com\/srd\/2018\/05\/21\/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639\/\" managed-link=\"\" target=\"_blank\" tabindex=\"0\" class=\"managed-link content-anchor-link\" data-bi-name=\"content-anchor-link\" aria-live=\"assertive\">Speculative Store Bypass<\/a> (CVE-2018-3639) for AMD-based computers. These protections aren't enabled by default. For Windows client (IT pro) guidance, follow the instructions in <a data-content-id=\"4073119\" data-content-type=\"article\" href=\"\/en-in\/help\/4073119\" managed-link=\"\" target=\"\" tabindex=\"0\" class=\"managed-link content-anchor-link\" data-bi-name=\"content-anchor-link\" aria-live=\"assertive\">KB4073119<\/a>. For Windows Server guidance,<strong> <\/strong>follow the instructions in <a data-content-id=\"4072698\" data-content-type=\"article\" href=\"\/en-in\/help\/4072698\" managed-link=\"\" target=\"\" tabindex=\"0\" class=\"managed-link content-anchor-link\" data-bi-name=\"content-anchor-link\" aria-live=\"assertive\">KB4072698<\/a>. Use these guidance documents to enable mitigations for Speculative Store Bypass (CVE-2018-3639). Additionally, use the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).<\/p>\n<\/li>\n<li>\n<p class=\"\">Addresses a security vulnerability in session isolation that affects PowerShell remote endpoints. By default, PowerShell remoting only works with administrator accounts, but can be configured to work with non-administrator accounts. Starting with this release, you cannot configure PowerShell remote endpoints to work with non-administrator accounts. When attempting to use a non-administrator account, the following error will appear:<\/p>\n<p>\u201cNew-PSSession: [computerName] Connecting to remote server localhost failed with the following error message: The WSMan service could not launch a host process to process the given request. Make sure the WSMan provider host server and proxy are properly registered. For more information, see the about_Remote_Troubleshooting Help topic.\u201d<\/p>\n<\/li>\n<li>Security updates to Windows App Platform and Frameworks, Windows MSXML, Windows Kernel, Windows Storage and Filesystems, Windows Wireless Networking, and the Microsoft JET Database Engine.<\/li>\n<\/ul>\n<\/blockquote>\n<p>\u3053\u306e\u66f4\u65b0\u30d7\u30ed\u30b0\u30e9\u30e0\u306b\u306f\u3001\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u304c\u30db\u30c3\u30c8\u30b9\u30dd\u30c3\u30c8\u3092\u8a8d\u8a3c\u3059\u308b\u306e\u304c\u56f0\u96e3\u306a\u5834\u5408\u304c\u3042\u308b\u3068\u3044\u3046\u65e2\u77e5\u306e\u4e0d\u5177\u5408\u304c\u5b58\u5728\u3057\u307e\u3059\u3002<\/p>\n<p>\u30d5\u30a1\u30a4\u30eb\u306f<a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4480970\">Microsoft Update Catalog<\/a>\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3059\u308b\u3053\u3068\u3082\u3067\u304d\u307e\u3059\u3002<\/p>\n<h2>KB4480963 (Monthly Rollup)<\/h2>\n<p>Windows 8.1\/Windows Server 2012 R2\u7528\u306e\u6708\u4f8b\u54c1\u8cea\u30ed\u30fc\u30eb\u30a2\u30c3\u30d7<a href=\"https:\/\/support.microsoft.com\/en-in\/help\/4480963\">KB4480963<\/a>\u3067\u306f\u3001AMD\u30b3\u30f3\u30d4\u30e5\u30fc\u30bf\u30fc\u7528\u306e\u6295\u6a5f\u7684\u30b9\u30c8\u30a2\u30d0\u30a4\u30d1\u30b9\u3068\u547c\u3070\u308c\u308b\u6295\u6a5f\u7684\u5b9f\u884c\u306e\u30b5\u30a4\u30c9\u30c1\u30e3\u30cd\u30eb\u8106\u5f31\u6027\u306b\u5bfe\u3059\u308b\u4fdd\u8b77\u306e\u63d0\u4f9b\u3084\u3001PowerShell\u30ea\u30e2\u30fc\u30c8\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u306b\u5f71\u97ff\u3092\u53ca\u307c\u3059\u30bb\u30c3\u30b7\u30e7\u30f3\u5206\u96e2\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e0a\u306e\u8106\u5f31\u6027\u306e\u4fee\u6b63\u3001Windows\u306e\u5404\u7a2e\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8\u304c\u884c\u308f\u308c\u3066\u3044\u307e\u3059\u3002<\/p>\n<blockquote>\n<ul>\n<li>\n<p>Provides protections against an additional subclass of speculative execution side-channel vulnerability known as <a href=\"https:\/\/blogs.technet.microsoft.com\/srd\/2018\/05\/21\/analysis-and-mitigation-of-speculative-store-bypass-cve-2018-3639\/\" managed-link=\"\" target=\"_blank\" tabindex=\"0\" class=\"managed-link content-anchor-link\" data-bi-name=\"content-anchor-link\" aria-live=\"assertive\">Speculative Store Bypass<\/a> (CVE-2018-3639) for AMD-based computers. These protections aren't enabled by default. For Windows client (IT pro) guidance, follow the instructions in <a data-content-id=\"4073119\" data-content-type=\"article\" href=\"\/en-in\/help\/4073119\" managed-link=\"\" target=\"\" tabindex=\"0\" class=\"managed-link content-anchor-link\" data-bi-name=\"content-anchor-link\" aria-live=\"assertive\">KB4073119<\/a>. For Windows Server guidance,<strong> <\/strong>follow the instructions in <a data-content-id=\"4072698\" data-content-type=\"article\" href=\"\/en-in\/help\/4072698\" managed-link=\"\" target=\"\" tabindex=\"0\" class=\"managed-link content-anchor-link\" data-bi-name=\"content-anchor-link\" aria-live=\"assertive\">KB4072698<\/a>. Use these guidance documents to enable mitigations for Speculative Store Bypass (CVE-2018-3639). Additionally, use the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).<\/p>\n<\/li>\n<li>\n<p>Addresses a security vulnerability in session isolation that affects PowerShell remote endpoints. By default, PowerShell remoting only works with administrator accounts, but can be configured to work with non-administrator accounts. Starting with this release, you cannot configure PowerShell remote endpoints to work with non-administrator accounts. When attempting to use a non-administrator account, the following error will appear:<\/p>\n<p>\u201cNew-PSSession: [computerName] Connecting to remote server localhost failed with the following error message: The WSMan service could not launch a host process to process the given request. Make sure the WSMan provider host server and proxy are properly registered. For more information, see the about_Remote_Troubleshooting Help topic.\u201d<\/p>\n<\/li>\n<li>Security updates to Windows App Platform and Frameworks, Windows MSXML, Windows Kernel, Windows Storage and Filesystems, Windows Wireless Networking, and the Microsoft JET Database Engine.<\/li>\n<\/ul>\n<\/blockquote>\n<p>\u66f4\u65b0\u30d7\u30ed\u30b0\u30e9\u30e0\u306b\u306f\u3001\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u304c\u30db\u30c3\u30c8\u30b9\u30dd\u30c3\u30c8\u3092\u8a8d\u8a3c\u3059\u308b\u306e\u304c\u56f0\u96e3\u306a\u5834\u5408\u304c\u3042\u308b\u3068\u3044\u3046\u65e2\u77e5\u306e\u4e0d\u5177\u5408\u304c\u5b58\u5728\u3057\u307e\u3059\u3002<\/p>\n<p>\u30d5\u30a1\u30a4\u30eb\u306f<a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4480963\">Microsoft Update Catalog<\/a>\u304b\u3089\u30c0\u30a6\u30f3\u30ed\u30fc\u30c9\u3059\u308b\u3053\u3068\u3082\u3067\u304d\u307e\u3059\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft\u306f\u672c\u65e5\u3001\u6708\u4f8b\u66f4\u65b0\u306e\u4e00\u8cab\u3068\u3057\u3066Windows 7 SP1\/Widnows 2008 R2 SP1\u7528\u306e\u6708\u4f8b\u54c1\u8cea\u30ed\u30fc\u30eb\u30a2\u30c3\u30d7KB4480970\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30aa\u30f3\u30ea\u30fc\u30a2\u30c3\u30d7\u30c7\u30fc\u30c8KB4480960\u3092\u516c\u958b\u3057\u307e\u3057\u305f [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":66283,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"swell_btn_cv_data":"","footnotes":""},"categories":[3],"tags":[3298,2596,2588],"class_list":["post-66282","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-windows","tag-windows","tag-windows7","tag-windows81"],"_links":{"self":[{"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/posts\/66282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/comments?post=66282"}],"version-history":[{"count":0,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/posts\/66282\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/media\/66283"}],"wp:attachment":[{"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/media?parent=66282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/categories?post=66282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/softantenna.com\/blog\/wp-json\/wp\/v2\/tags?post=66282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}