{"id":12258,"date":"2018-05-10T10:30:03","date_gmt":"2018-05-10T18:30:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/05\/10\/news-6027\/"},"modified":"2018-05-10T10:30:03","modified_gmt":"2018-05-10T18:30:03","slug":"news-6027","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/05\/10\/news-6027\/","title":{"rendered":"Patch Tuesday problems, fixes \u2014 but no cause for immediate alarm"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security12-100734741-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 10 May 2018 10:51:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Results are starting to roll in about this month\u2019s Patch Tuesday, and it\u2019s quite a mixed bag. For those of you struggling with the new Windows 10 April 2018 Update, version 1803, there\u2019s good news and bad news. The hand wringing about a new VBScript zero-day, thanks to our good old friend baked-in Internet Explorer, looks overblown for now. And if you can\u2019t get RDP working because of \u201cAn authentication error has occurred\u201d messages, you missed the memo.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First, the good news. As I <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3269731\/microsoft-windows\/time-to-turn-off-windows-auto-update-unless-youre-using-win10-version-1803.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">anticipated earlier this week<\/span><\/a><span style=\"font-weight: 400;\">, this month\u2019s cumulative update for 1803 is a must-have, warts and all. The new build 17134.48 replaces the old 17134.1 (which went to those who installed 1803 directly or fell into the <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3269727\/win10-1803-pushy-upgrades-never-give-a-seeker-an-even-break.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">seeker trap<\/span><\/a><span style=\"font-weight: 400;\">) and the old 17134.5 (for those upgrading with the Windows Insider builds). As <\/span><a href=\"https:\/\/www.askwoody.com\/2018\/patch-lady-if-you-do-have-1803\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Susan Bradley explains<\/span><\/a><span style=\"font-weight: 400;\">, 17134.48 claims to fix both the Chrome and Cortana freeze, as well as a major VPN bug.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">My recommendation continues to be that you should roll back to 1709, but if you insist on using 1803 during its unpaid beta-testing phase, get this month\u2019s cumulative update installed as soon as you can. If you can.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/patch-lady-if-you-do-have-1803\/#post-191470\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">anonymous poster on AskWoody<\/span><\/a><span style=\"font-weight: 400;\"> notes:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">1803 was installed without permission on 3 of my computers last week, 5\/1\/2018. Fortunately no problems, working great. Then in the early A.M. on 5\/8\/2108 the \u201cfixed\u201d 1803 was installed, once again without permission on all 3 computers (all running Windows 10 Pro). Bricked them all. I make 3 full backup images of each of my computers every day (2 local using Macrium and EaseUS and 1 cloud using Acronis). Restored all 3 computers, backed up data, and did clean installs which installed the latest fixed 1803. Recovered data and all is back to normal, just took a full day.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Assuming you can even get the installer to work. \u201cMicrosoft Agent\u201d Lonnie_L <\/span><a href=\"https:\/\/answers.microsoft.com\/en-us\/windows\/forum\/windows_10-windows_install\/devices-with-certain-intel-ssds-may-enter-a-uefi\/703ab5d8-d93e-4321-b8cc-c70ce22ce2f1?auth=1\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">on the Microsoft Answers forum<\/span><\/a><span style=\"font-weight: 400;\"> says:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When attempting to upgrade to Window 10 April 2018 Update select devices with certain Intel SSDs may enter a UEFI screen reboot or crash repeatedly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft is currently blocking some Intel SSDs from installing the April 2018 Update due to a known incompatibility that may cause performance and stability issues. There is no workaround for this issue. If you have encountered this issue, you can roll back to Windows 10, version 1709 and wait for the resolution before attempting to install the April 2018 Update again.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft is currently working on a solution that will be provided in a near future Windows Update, after which these devices will be able to install the April 2018 Update<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We have a thread going on that topic <\/span><a href=\"https:\/\/www.askwoody.com\/2018\/microsoft-blocking-the-win10-version-1803-update-on-some-pcs-with-intel-solid-state-drives\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">on AskWoody<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The MS Answers forum has a <\/span><a href=\"https:\/\/answers.microsoft.com\/en-us\/windows\/forum\/windows_10-update\/windows-10-cumulative-update-kb4103721-version\/42d672a5-9988-4327-a5fc-b4cf9a47768a?ranMID=24542&amp;ranEAID=je6NUbpObpQ&amp;ranSiteID=je6NUbpObpQ-azKA5t_kHIomc2kXDAI9gA&amp;tduid=(0fa1631357f65d1c5e13046d2cc7b9de)(256380)(2459594)(je6NUbpObpQ-azKA5t_kHIomc2kXDAI9gA)()\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">monster thread<\/span><\/a><span style=\"font-weight: 400;\">, started by StephenPhillipsZY who says:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This update has some serious issues, specifically. Do NOT install this update after updating to Windows 10 version 1803. It will prevent your computer from booting up. I am stuck on the spinning circle for a long time. I have to use a Windows 10 USB to boot into the Troubleshooting and use Command Prompt to boot into safe mode. Please fix this update!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are still many, many bugs in 1803. For example, <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/patch-lady-if-you-do-have-1803\/#post-191451\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Mr. Natural says<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I have 2 systems that I installed 1803 on and ever since they are unable to communicate with WSUS. Windows Update pointing to Microsoft works, but not WSUS. I had to manually install that even though my WSUS system has the patch ready to go.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Bogdan Popa at Softpedia tells of many people who try to apply this cumulative update and end up with bricked systems. He has <\/span><a href=\"https:\/\/news.softpedia.com\/news\/how-to-fix-windows-10-april-2018-update-bricked-by-cumulative-update-kb4103721-521059.shtml\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">three unbricking methods <\/span><\/a><span style=\"font-weight: 400;\">that may prove handy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are also <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/may-2018-patch-tuesday-has-arrived\/#post-191017\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">extensive reports<\/span><\/a><span style=\"font-weight: 400;\"> of build 17134.48 not being able to see WSUS update servers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Oh, the joys of IE bound at the knees and elbows to Windows. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/CVE-2018-8174\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">released an explanation<\/span><\/a><span style=\"font-weight: 400;\"> for the one \u201ccritical\u201d Windows patch this month that is being actively exploited \u2014 a zero-day. Called CVE-21018-8174, the security hole involves the way Internet Explorer (mis)handles VBScript programs. Per Microsoft:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked &#8220;safe for initialization&#8221; in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft\u2019s expos\u00e9 credits both Qihoo 360 Core Security and Kaspersky with the discovery. And at that point, things get complicated.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kaspersky\u2019s Securelist shows an <\/span><a href=\"https:\/\/securelist.com\/root-cause-analysis-of-cve-2018-8174\/85486\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">in-the-wild exploit<\/span><\/a><span style=\"font-weight: 400;\">, using an infected RTF file that on most machines would be opened by Word. The infected file then does its dirty deed through IE, no matter which browser you\u2019ve chosen as default:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With CVE-2018-8174 being the first public exploit to use a URL moniker to load an IE exploit in Word, we believe that this technique, unless fixed, will be heavily abused by attackers in the future, as It allows you force IE to load ignoring the default browser settings on a victim\u2019s system. We expect this vulnerability to become one of the most exploited in the near future, as it won\u2019t be long until exploit kit authors start abusing it in both drive-by (via browser) and spear-phishing (via document) campaigns. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">As best I can tell, Kaspersky doesn\u2019t talk about a \u201cweb-based attack scenario\u201d where the victim is using Internet Explorer. Instead, it relies on an RTF file \u2014 such fules have been <\/span><a href=\"http:\/\/www.businessinsider.com\/hackers-are-attacking-microsoft-word-2014-3?IR=T\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">carrying malware for years<\/span><\/a><span style=\"font-weight: 400;\">\u00a0\u2014 to bring up Word, and to force Word to use the buggy VBScript engine in IE.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Qihoo 360 <\/span><a href=\"http:\/\/blogs.360.cn\/blog\/cve-2018-8174-en\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">has a different explanation<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We code named the vulnerability as \u201cdouble kill\u201d exploit. This vulnerability affects the latest version of Internet Explorer and applications that use the IE kernel. When users browse the web or open Office documents, they are likely to be potential targets. Eventually the hackers will implant backdoor Trojan to completely control the computer. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Qihoo doesn\u2019t specifically mention RTF-formatted documents, but the one exploit it has discovered is in a document, ostensibly in Yiddish, and \u201cthe attack affected regions in China are mainly distributed in provinces that actively involved in foreign trade activities. Victims include trade agencies and related organizations.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">(I asked Morty Schiller, a noted Hebrew\/Yiddish scholar, about the language used and <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/multiple-reports-that-windows-update-is-overriding-the-metered-connection-setting\/#post-191490\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">he says,<\/span><\/a><span style=\"font-weight: 400;\"> \u201cThe few words that showed in the background of the image were Yiddish, not Hebrew. But some of the &#8216;words&#8217; were Hebrew\/Yiddish letters interlaced with English letters. So they may have been truncated, or just garbage. None of it seems to make any sense.\u201d)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So as things stand, it looks as if you need to watch out for RTF files in Yiddish\/Hebrew sent to Chinese trade agencies, but it\u2019s likely that the technique will become more widespread in the not-too-distant future.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This \u201cDouble Kill\u201d problem affects <\/span><strong><i>every <\/i><\/strong><span style=\"font-weight: 400;\">version of Windows. It isn\u2019t clear if redirecting RTF files to open in something other than Word will fix the document-based infection vector. (You can <\/span><a href=\"https:\/\/answers.microsoft.com\/en-us\/windows\/forum\/windows_vista-files\/open-rtf-files-in-wordpad-instead-of-notepad\/67c76379-2415-4012-bdbb-a3748dec6be5\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">use Windows<\/span><\/a><span style=\"font-weight: 400;\"> to change the default program assigned to the RTF filename extension, and make RTF files open in, say, WordPad \u2014\u00a0<\/span><a href=\"https:\/\/superuser.com\/questions\/1093299\/how-can-i-make-w10-open-rtfs-with-wordpad-xp\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">even in Windows 10<\/span><\/a><span style=\"font-weight: 400;\">.)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Back in the good old days, you could just pick out the patch that fixes the problem, install it, and deal with any bugs in the patch in isolation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nowadays, <\/span><a href=\"https:\/\/www.infoworld.com\/article\/3128983\/microsoft-windows\/how-to-prepare-for-the-windows-781-patchocalypse.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">since the patchocalypse<\/span><\/a><span style=\"font-weight: 400;\">, that isn\u2019t an option. If you want to protect against Double Kill, you have to install the entire month\u2019s patches \u2014 and if you\u2019re using Win10, you have to install both the security and the non-security updates at the same time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019ll be watching to see how quickly the Double Kill technique proliferates. If infected RTF files start appearing, we\u2019ll let you know here in <em>Computerworld<\/em>.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Last week, noted security maven Alex Ionescu revealed <\/span><a href=\"https:\/\/twitter.com\/aionescu\/status\/991675604469669890\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">yet another bug<\/span><\/a><span style=\"font-weight: 400;\"> introduced in all of the Meltdown patches released this year for Win10 version 1709. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It turns out the #Meltdown patches for Windows 10 had a fatal flaw: calling NtCallEnclave returned back to user space with the full kernel page table directory, completely undermining the mitigation. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft quietly built a fix into Win10 version 1803 \u2014 and if you have version 1803, you don\u2019t need to worry about the bug. But we didn\u2019t discover until Patch Tuesday that Win10 version 1709 has the same bug. This month\u2019s version 1709 fix solves it. Says <\/span><a href=\"https:\/\/twitter.com\/aionescu\/status\/994091382724792321\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Ionescu<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Incredible turnaround by @msftsecresponse to fix this issue (which only affected Fall Creators Update due to this API being introduced in 1709) in today\u2019s Patch Tuesday. Customers on 1709 now protected just like on 1803.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Meltdown continues its march into the patching hall of fame.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I\u2019ve seen <\/span><a href=\"https:\/\/www.askwoody.com\/2018\/problems-with-credssp-updates-cve-2018-0886-breaking-rdp-connections\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">many complaints <\/span><\/a><span style=\"font-weight: 400;\">about this month\u2019s Windows patches triggering an error in Remote Desktop connections (see screenshot).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Those errors keep popping up after installing <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4093492\/credssp-updates-for-cve-2018-0886-march-13-2018\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4093492<\/span><\/a><span style=\"font-weight: 400;\">, the update that fixes CVE-2018-0886, a vulnerability in the CredSSP protocol. (If you don\u2019t use Microsoft Remote Desktop with a server, you don\u2019t need to worry about it.)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Long story short, as Susan Bradley says:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The problem is NOT with the KB 4093492 update. Rather the issue is that there\u2019s a mismatch of patching levels. In March Microsoft released an update that began the process of rolling out an update to CredSSP used in Remote Desktop connection. In May the updates mandate that a patched machine can\u2019t remote into an unpatched machine. If you dig into the KB there is a registry workaround to [TEMPORARILY] disable the mandate, but the better and wiser move is to update the server or workstation you are remoting into. Make sure the \u201cthing\u201d you are remoting into has an update. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you see that \u201cauthentication error\u201d message, check with the folks who maintain your server.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Admins rejoice. It looks like the SMB memory leak bug has finally been fixed. (If you aren\u2019t an admin, you can go back to sleep now.)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Way back in January, the <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4056894\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">2018-01 Monthly Rollup<\/span><\/a><span style=\"font-weight: 400;\"> introduced a bug in Win7 and Server 2008 R2 that set up a memory leak.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After installing KB4056897 or any other recent monthly updates, SMB servers may experience a memory leak for some scenarios. This occurs when the requested path traverses a symbolic link, mount point, or directory junction and the registry key is set to 1:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">HKEY_LOCAL_MACHINESYSTEMCurrentControlSetservicesLanManServerParametersEnableEcp<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Most people couldn\u2019t care less, but for a significant subset of Server users, that memory leak was a show-stopper. Maybe that\u2019s why some folks didn\u2019t install the CredSSP fix?<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">The hunt continues for bugs and fixes. Join us on the <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2018\/patch-tuesday-problems-and-fixes-but-theres-no-cause-for-alarm\/\" rel=\"nofollow noopener\" target=\"_blank\"><i><span style=\"font-weight: 400;\">AskWoody Lounge<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3271849\/microsoft-windows\/patch-tuesday-problems-fixes-but-no-cause-for-immediate-alarm.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security12-100734741-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 10 May 2018 10:51:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">Results are starting to roll in about this month\u2019s Patch Tuesday, and it\u2019s quite a mixed bag. For those of you struggling with the new Windows 10 April 2018 Update, version 1803, there\u2019s good news and bad news. The hand wringing about a new VBScript zero-day, thanks to our good old friend baked-in Internet Explorer, looks overblown for now. And if you can\u2019t get RDP working because of \u201cAn authentication error has occurred\u201d messages, you missed the memo.<\/span><\/p>\n<h2><strong>Windows 10 version 1803<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">First, the good news. As I <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3269731\/microsoft-windows\/time-to-turn-off-windows-auto-update-unless-youre-using-win10-version-1803.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">anticipated earlier this week<\/span><\/a><span style=\"font-weight: 400;\">, this month\u2019s cumulative update for 1803 is a must-have, warts and all. The new build 17134.48 replaces the old 17134.1 (which went to those who installed 1803 directly or fell into the <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3269727\/win10-1803-pushy-upgrades-never-give-a-seeker-an-even-break.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">seeker trap<\/span><\/a><span style=\"font-weight: 400;\">) and the old 17134.5 (for those upgrading with the Windows Insider builds). As <\/span><a href=\"https:\/\/www.askwoody.com\/2018\/patch-lady-if-you-do-have-1803\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Susan Bradley explains<\/span><\/a><span style=\"font-weight: 400;\">, 17134.48 claims to fix both the Chrome and Cortana freeze, as well as a major VPN bug.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3271849\/microsoft-windows\/patch-tuesday-problems-fixes-but-no-cause-for-immediate-alarm.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[714,10525],"class_list":["post-12258","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12258"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12258\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12258"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}