{"id":11993,"date":"2018-04-12T06:30:05","date_gmt":"2018-04-12T14:30:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/04\/12\/news-5762\/"},"modified":"2018-04-12T06:30:05","modified_gmt":"2018-04-12T14:30:05","slug":"news-5762","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/04\/12\/news-5762\/","title":{"rendered":"Patch Tuesday brings some surprises, some early crashes, and a surreal solution"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security12-100734741-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 12 Apr 2018 06:40:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">With all of the problems in the <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-windows-7-takes-the-brunt-of-march-patching-problems.html?page=3\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">January<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-windows-7-takes-the-brunt-of-march-patching-problems.html?page=2\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">February <\/span><\/a><span style=\"font-weight: 400;\">and <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-windows-7-takes-the-brunt-of-march-patching-problems.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">March <\/span><\/a><span style=\"font-weight: 400;\">patches for Windows and Office, you\u2019d think we would catch a break in April. In one sense we did \u2014 some of the worst bugs in the earlier patches now seem to be behind us. But we\u2019re definitely not out of the woods just yet.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tuesday, Microsoft released 177 <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">separate patches<\/span><\/a><span style=\"font-weight: 400;\"> covering 66 security holes (CVEs), 24 of which are rated \u201ccritical.\u201d The <\/span><a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Microsoft+April+2018+Patch+Tuesday\/23539\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">SANS Internet Storm Center says<\/span><\/a><span style=\"font-weight: 400;\"> that only one of the patches, <\/span><a href=\"https:\/\/isc.sans.edu\/vuln.html?cve=2018-1034\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE 2018-1034<\/span><\/a><span style=\"font-weight: 400;\">, covers a security hole that\u2019s been documented, and it isn\u2019t being exploited.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Further details, compliments of <\/span><a href=\"https:\/\/www.ghacks.net\/2018\/04\/10\/microsoft-security-updates-april-2018-release-overview\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Martin Brinkman on ghacks<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As Dustin Childs notes on <\/span><a href=\"https:\/\/www.thezdi.com\/blog\/2018\/4\/10\/the-april-2018-security-update-review\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">the Zero Day Initiative site<\/span><\/a><span style=\"font-weight: 400;\">, five of the critical bugs are variations on an old, tired theme: a \u201cbad\u201d font can take over your machine, if you\u2019re running in admin mode. And it doesn\u2019t matter where the font appears \u2014 on a web page, in a document, in an email. Don\u2019t you just love it when fonts get rendered inside the Windows kernel?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As of early Thursday morning, there are no known exploits for the font phunnies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Top points, from my point of view, anyway:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019ve been following along, you know that Win7\/Server 2008 R2 has left a <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3268133\/microsoft-windows\/get-the-march-patches-for-your-windows-machines-installed-but-watch-out-for-win7.html\"><span style=\"font-weight: 400;\">trail of tears<\/span><\/a><span style=\"font-weight: 400;\">, starting with the January security patches, which introduced the Total Meltdown gaping security hole, followed by an SMB server bug introduced in March that may render it inoperable, and buggy patches that created phantom Network Interface Cards (NICs) and shot down static IP addresses. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This month, it appears as if some of those problems have been solved. In particular, the Win7\/Server 2008R2 Monthly Rollup <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4093118\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4093118<\/span><\/a><span style=\"font-weight: 400;\"> and the manually installed <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4093108\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4093108<\/span><\/a><span style=\"font-weight: 400;\"> Security-only patch supersede the sketchy <\/span><a href=\"https:\/\/www.askwoody.com\/2018\/patch-lady-new-update-for-windows-7-kb-4100480\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4100480<\/span><\/a><span style=\"font-weight: 400;\"> that\u2019s <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3267700\/microsoft-windows\/windows-patches-for-total-meltdown-bluescreens-an-ip-stopper-and-little-documentation.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">supposed to fix the Total Meltdown bugs<\/span><\/a><span style=\"font-weight: 400;\"> in this year\u2019s Win7 patches. KB 4093118 and KB 4093108 also contain the fix in <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3267700\/microsoft-windows\/windows-patches-for-total-meltdown-bluescreens-an-ip-stopper-and-little-documentation.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4099467,\u00a0<\/span><\/a><span style=\"font-weight: 400;\">which eliminates the Stop 0xAB error when you log off. Not so coincidentally, both of those bugs were introduced by security fixes released earlier this year.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/april-2018-patch-tuesday-is-here-and-its-a-biggie\/#post-183508\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">MrBrian<\/span><\/a><span style=\"font-weight: 400;\">, installing this month\u2019s Win7 Monthly Rollup or Security-only patch obliterates those bugs: <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Or at least it\u2019s <\/span><i><span style=\"font-weight: 400;\">supposed <\/span><\/i><span style=\"font-weight: 400;\">to obliterate those bugs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That leaves us with two other significant bugs in the old Win7 patches. Microsoft describes them like this:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As of this moment, it looks as if the manual Win7 Security-only patch KB 4093108 fixes the phantom NIC bug and static IP zapping bug \u2014 but the Monthly Rollup, KB 4093118, does not. That puts us in a surreal situation where Microsoft recommends that those installing the (automatically pushed) Monthly Rollup first install the (manual download) Security-only patch.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I didn\u2019t believe that either until I read the <\/span><a href=\"https:\/\/support.microsoft.com\/en-in\/help\/4093118\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">newly updated KB article<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft is working on a resolution and will provide an update in an upcoming release.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the meantime, please apply<\/span><a href=\"https:\/\/support.microsoft.com\/en-in\/help\/4093108\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">KB4093108<\/span><\/a><span style=\"font-weight: 400;\"> (Security-only update) to stay secure, or use the Catalog release of<\/span><a href=\"https:\/\/support.microsoft.com\/en-in\/help\/4093118\" rel=\"nofollow noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">KB4093118<\/span><\/a><span style=\"font-weight: 400;\"> to stage the update for WU or WSUS. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although the description isn\u2019t crystal clear, it looks to me as if Microsoft is saying that anyone who uses Windows Update to install this month\u2019s Win7 Monthly Rollup is required to dive into the Windows Catalog, download and install the Security-only patch, prior to letting Windows Update do the dirty deed. If you don\u2019t do that, your <\/span><a href=\"https:\/\/www.reddit.com\/r\/sysadmin\/comments\/8bfha6\/kb4093118_breaking_ipconfigs_on_vmxnet3_vms\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">NIC may fall over and play dead <\/span><\/a><span style=\"font-weight: 400;\">and\/or any static IP addresses you\u2019ve assigned will be wiped out.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bizarre.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Those of you who control Update Servers have yet another cute twist. Two of them. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Reading between the lines again, it appears as if WSUS and SCCM won\u2019t queue up the Security-only patch prior to installing the Monthly Rollup. You have to do that manually. There was a notice <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/patch-lady-b-patchers-need-a-pre-patch\/#post-183647\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">sent out on Wednesday<\/span><\/a><span style=\"font-weight: 400;\"> that urged admins to download a separate patch, KB 4099950, and install it prior to installing this month\u2019s Win7 Monthly Rollup. Now, it seems, installing the Security-only patch first is the recommended course of action.<\/span><\/p>\n<p><a href=\"https:\/\/www.askwoody.com\/2018\/patch-lady-b-patchers-need-a-pre-patch\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Susan Bradley says<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For standalone computers that use the B patching process of applying security only updates &#8211; again you should be in wait and see mode right now. If you have a spare computer and want to live on the edge, install now. Otherwise get the popcorn out and wait to see what happens.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Again reading between the lines, it appears as if KB 4099950 prevents the phantom NIC and static IP zapping bugs. If you\u2019ve already installed it, there\u2019s no need to uninstall it, you\u2019re good to go \u2014 and you don\u2019t need to manually install this month\u2019s Security-only patch. If you haven\u2019t installed KB 4099950, Microsoft now says that the preferred method for fending off the IP problems is to install this month\u2019s Security-only patch. Which means those of you at the helm of WSUS and SCCM servers need to make sure your users get the Security-only patch prior to receiving the Monthly Rollup. Clear as mud, right?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">More than that, I\u2019m getting reports that the Win10 1607 April cumulative update, KB 4093119, is dishing out a retrograde version of Credssp.dll. The March cumulative update installed version 10.0.14393.2125, whereas the April version installs version 10.0.14393.0. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">For details, I strongly urge you overworked and underappreciated admins to subscribe to Shavlik\u2019s <\/span><a href=\"http:\/\/patchmanagement.org\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Patchmanagement newsletter<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft released a handful of patches for Word 2007, 2010, 2013, 2016 and Office 2010 under the heading <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0950\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2018-0950<\/span><\/a><span style=\"font-weight: 400;\">, where:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An information disclosure vulnerability exists when Office renders Rich Text Format (RTF) email messages containing OLE objects when a message is opened or previewed. This vulnerability could potentially result in the disclosure of sensitive information to a malicious site.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To exploit the vulnerability, an attacker would have to send an RTF-formatted email to a user and convince the user to open or preview the email. A connection to a remote SMB server could then be automatically initiated, enabling the attacker to brute-force attack the corresponding NTLM challenge and response in order to disclose the corresponding hash password.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But according to Will Dorman at CERT\/CC, who originally reported the vulnerability to Microsoft 18 months ago, Microsoft\u2019s fix doesn\u2019t fix the whole problem. <\/span><a href=\"https:\/\/insights.sei.cmu.edu\/cert\/2018\/04\/automatically-stealing-password-hashes-with-microsoft-outlook-and-ole.html\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">He says<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft released a fix for the issue of Outlook automatically loading remote OLE content (CVE-2018-0950). Once this fix is installed, previewed email messages will no longer automatically connect to remote SMB servers. &#8230; It is important to realize that even with this patch, a user is still a single click away from falling victim to the types of attacks described above<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dorman\u2019s advice? Use complex passwords and a password manager, and those of you managing servers need to jump through even more hoops.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Brad Sams <\/span><a href=\"https:\/\/twitter.com\/bdsams\/status\/984383122631548930\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">reports<\/span><\/a><span style=\"font-weight: 400;\"> that <\/span><a href=\"https:\/\/support.microsoft.com\/en-in\/help\/4093112\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4093112<\/span><\/a><span style=\"font-weight: 400;\">, the cumulative update to 1709, has messed up File Explorer \u2014 he can\u2019t open File Explorer at all, even after two restarts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/april-2018-patch-tuesday-is-here-and-its-a-biggie\/#post-183556\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">have reports<\/span><\/a><span style=\"font-weight: 400;\"> that the same update is causing Windows to complain that it hasn\u2019t been activated. Multiple reboots solved the problem.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And we have <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/april-2018-patch-tuesday-is-here-and-its-a-biggie\/#post-183691\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">another report <\/span><\/a><span style=\"font-weight: 400;\">of a blue screen PAGE_FAULT_IN_NONPAGED_AREA error 0x800f0845 with the same patch.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Commenters on<\/span><a href=\"https:\/\/krebsonsecurity.com\/2018\/04\/adobe-microsoft-push-critical-security-fixes-12\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\"> Brian Krebs\u2019 site<\/span><\/a><span style=\"font-weight: 400;\"> have reported problems with installing KB 4093118, the Win7 Monthly Rollup. <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/april-2018-patch-tuesday-is-here-and-its-a-biggie\/#post-183583\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Peacelady explains<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Two people who installed it on Windows 7 Professional computers now can\u2019t access the computer getting message on Startup \u201cuser profile not found.\u201d \u00a0Then underneath it says okay \u2014 they click okay and it logs off. Then it comes back and the same thing happens.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">AskWoody poster Bill C has <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/april-2018-patch-tuesday-is-here-and-its-a-biggie\/#post-183662\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">further details<\/span><\/a><span style=\"font-weight: 400;\">. Samak proposes a <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/april-2018-patch-tuesday-is-here-and-its-a-biggie\/#post-183654\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">suggested fix<\/span><\/a><span style=\"font-weight: 400;\"> for the \u201cuser profile not found\u201d problem, detailed in KB 947215.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Wait. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019re <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/april-2018-patch-tuesday-is-here-and-its-a-biggie\/#post-183719\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">seeing reports<\/span><\/a><span style=\"font-weight: 400;\"> of Win7 patches that are checked, unchecked, sometimes disappearing, occasionally reappearing, and vanishing into thin air. Don\u2019t be concerned. Microsoft doesn\u2019t know why, either.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For the non-Win7 patches, there\u2019s no immediate need to install anything. If the font phunnies heat up, we\u2019ll keep you posted, but for now the situation\u2019s unbelievably complex and devolving rapidly.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Thanks, as always, to MrBrian, abbodi86, PKCano, and all of the people at AskWoody who hold Microsoft\u2019s patching feet to the fire.<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">Join us for the latest commiseration on the <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2018\/heres-what-you-need-to-know-about-this-months-patches\/\" rel=\"nofollow noopener\" target=\"_blank\"><i><span style=\"font-weight: 400;\">AskWoody Lounge<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3268607\/microsoft-windows\/patch-tuesday-brings-some-surprises-some-early-crashes-and-a-surreal-solution.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security12-100734741-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 12 Apr 2018 06:40:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">With all of the problems in the <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-windows-7-takes-the-brunt-of-march-patching-problems.html?page=3\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">January<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-windows-7-takes-the-brunt-of-march-patching-problems.html?page=2\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">February <\/span><\/a><span style=\"font-weight: 400;\">and <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-windows-7-takes-the-brunt-of-march-patching-problems.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">March <\/span><\/a><span style=\"font-weight: 400;\">patches for Windows and Office, you\u2019d think we would catch a break in April. In one sense we did \u2014 some of the worst bugs in the earlier patches now seem to be behind us. But we\u2019re definitely not out of the woods just yet.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3268607\/microsoft-windows\/patch-tuesday-brings-some-surprises-some-early-crashes-and-a-surreal-solution.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10525],"class_list":["post-11993","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=11993"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/11993\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=11993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=11993"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=11993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}