{"id":13182,"date":"2018-08-23T14:30:05","date_gmt":"2018-08-23T22:30:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/08\/23\/news-6949\/"},"modified":"2018-08-23T14:30:05","modified_gmt":"2018-08-23T22:30:05","slug":"news-6949","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/23\/news-6949\/","title":{"rendered":"Microsoft Patch Alert: Mainstream August patches look remarkably good, but watch out for the bad boys"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security3-100734732-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 23 Aug 2018 14:01:00 -0700<\/strong><\/p>\n<p>So far this month we\u2019ve only seen one cumulative update for each version of Windows 10, and one set of updates (Security only, Monthly Rollup) for Win7 and 8.1. With a few notable exceptions, those patches are going in rather nicely. What a difference a month makes.<\/p>\n<p>We\u2019ve also seen a massive influx of microcode updates for the latest versions of Windows 10, running on Intel processors. Those patches, released on Aug. 20 and 21, have tied many admins up in knots, with conflicting descriptions and iffy rollout sequences.<\/p>\n<p>At this point, I\u2019m seeing complaints about a handful of patches:<\/p>\n<p>The rest of the slate looks remarkably clean. Haven\u2019t seen that in a long while.<\/p>\n<p>If August follows the precedent set this year, we\u2019ll probably see another set of Win10 cumulative updates next Tuesday, \u201cdee\u201d Tuesday, Aug. 28. At the same time we\u2019ll likely see sets of Monthly Rollup Previews for Win7 and 8.1. Of course, you should ignore them.<\/p>\n<p>In the past couple of months, Microsoft has released massive firmware\/driver updates for almost all of the latest Surface devices.<\/p>\n<p>At this point, I\u2019m still seeing problems with the July 26 set of fixes for the Surface Pro 4, which have been <a href=\"https:\/\/www.computerworld.com\/article\/3299560\/microsoft-windows\/surface-pro-4-firmware-update-blamed-for-touchscreen-and-pen-malfunctions.html\" rel=\"noopener\" target=\"_blank\">blamed for<\/a> touchscreens that don\u2019t touch, pens that don\u2019t pen, batteries that go out to lunch, and all sorts of boorish behavior.<\/p>\n<p>Of course, there have been no solutions.<\/p>\n<p>Microsoft released oodles and gobs (that\u2019s a technical term) of microcode fixes for Win10 1803 and 1709, passing along Intel\u2019s fixes for the Meltdown and Spectre V1, 2, 3, and 4 security holes. People have been pulling their hair out by the roots. Helen Bradley has a great <a href=\"https:\/\/www.askwoody.com\/2018\/patch-lady-microcode-confusion\/\" rel=\"noopener nofollow\" target=\"_blank\">birds-eye view<\/a>:<\/p>\n<p>Unless you are a nation state, have a key asset in a cloud server, or are running for a government office, I think we are spending way way more time worrying about this than we should.\u00a0 I still think that attackers will nail me with malware, attack me with phishing, ransomware, etc etc, way more than someone will use these side channel attacks to gain information from me.\u00a0 Remember that the attacker has to get on your system first and I still think they will use the umpteen other ways to attack me easier than this attack.\u00a0 Also keep in mind that we won\u2019t really have a full fix for this issue for several years.\u00a0 Intel and AMD will need to redesign the chips to ultimately get fixed.<\/p>\n<p>If you\u2019re concerned about such things, do yourself a favor and go to Intel (probably via your PC\u2019s manufacturer) and install the specific patches that you need. And remember that they won\u2019t completely solve the problem.<\/p>\n<p>If you insist on using the Microsoft approach to microcode, abandon all hope, and follow Bradley\u2019s advice <a href=\"https:\/\/www.askwoody.com\/2018\/patch-lady-microcode-confusion\/\" rel=\"noopener nofollow\" target=\"_blank\">here<\/a>. No matter which approach you take, make sure that you don\u2019t publish any before-and-after performance data, which Intel has unilaterally declared <em>verboten<\/em>. See Bruce Perens\u2019s article <a href=\"https:\/\/perens.com\/2018\/08\/22\/new-intel-microcode-license-restriction-is-not-acceptable\/\" rel=\"noopener nofollow\" target=\"_blank\">Intel Publishes Microcode Security Patches, No Benchmarking Or Comparison Allowed!<\/a><\/p>\n<p>After all the problems last month, it\u2019s a relief to have only a handful of glaring problems this month. I suggest you wait another day or two before installing the August patches.<\/p>\n<p>The only significant breach of a recently patched security hole <a href=\"https:\/\/securityaffairs.co\/wordpress\/75459\/hacking\/cve-2018-8373-dark-hotel.html\" rel=\"noopener nofollow\" target=\"_blank\">that I\u2019ve found<\/a> involves North Korea, Internet Explorer 11, VBScript, and China. That\u2019s probably not a combination that\u2019ll keep you up at night \u2014 and there\u2019s little reason to rush into installing the August patches unless you\u2019re in a Chinese organization that\u2019s run afoul of the North Korean government.<\/p>\n<p>I continue to recommend that you keep 1803 off your Win10 machines. No reason to go there until you\u2019re forced. <a href=\"https:\/\/www.askwoody.com\/patch-list-master\/\" rel=\"noopener nofollow\" target=\"_blank\">Susan Bradley\u2019s Master PatchList<\/a> has details for individual patches.<\/p>\n<p><em>Thx to @sb, @abbodi86 and @PKCano<\/em><\/p>\n<p><em>Patching problems? Join us on the <a href=\"https:\/\/www.askwoody.com\/2018\/microsoft-patch-alert-august-is-much-much-better-than-july\/\" rel=\"noopener nofollow\" target=\"_blank\">AskWoody Lounge<\/a>.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-mainstream-august-patches-look-remarkably-good.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security3-100734732-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Thu, 23 Aug 2018 14:01:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>So far this month we\u2019ve only seen one cumulative update for each version of Windows 10, and one set of updates (Security only, Monthly Rollup) for Win7 and 8.1. With a few notable exceptions, those patches are going in rather nicely. What a difference a month makes.<\/p>\n<p>We\u2019ve also seen a massive influx of microcode updates for the latest versions of Windows 10, running on Intel processors. Those patches, released on Aug. 20 and 21, have tied many admins up in knots, with conflicting descriptions and iffy rollout sequences.<\/p>\n<h2>Big problems for small niches<\/h2>\n<p>At this point, I\u2019m seeing complaints about a handful of patches:<\/p>\n<ul>\n<li>The original <strong>SQL Server 2016 SP2<\/strong> patch, KB 4293807, was so bad Microsoft <a href=\"https:\/\/www.askwoody.com\/2018\/microsoft-yanks-buggy-cumulative-update-for-sql-server-2016-sp2-kb-4293807\/\" rel=\"noopener nofollow\" target=\"_blank\">yanked it<\/a> \u2014 although the yanking took almost a week. It\u2019s since been <a href=\"https:\/\/www.askwoody.com\/2018\/microsoft-fixes-the-bad-cumulative-update-for-sql-server-2016-sp2\/\" rel=\"noopener nofollow\" target=\"_blank\">replaced by KB 4458621<\/a>, which appears to solve the problem.<\/li>\n<li>The <strong>Visual Studio 2015 Update 3<\/strong> patch, <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4456688\/security-update-for-vulnerabilities-in-visual-studio-2015\" rel=\"noopener nofollow\" target=\"_blank\">KB 4456688<\/a>, has gone through two versions \u2014 released Aug. 14, pulled, then re-released Aug. 18 \u2014 and the re-released version <a href=\"https:\/\/www.askwoody.com\/2018\/problem-with-visual-studio-2015-update-kb-4456688\/\" rel=\"noopener nofollow\" target=\"_blank\">still has problems<\/a>. There\u2019s a hotfix available from the KB article, but you\u2019d be well advised to avoid it.<\/li>\n<li>Outlook guru Diane Poremsky <a href=\"https:\/\/www.slipstick.com\/outlook\/one-version-outlook-run-time\/\" rel=\"noopener nofollow\" target=\"_blank\">notes on Slipstick<\/a> that the version of Outlook in the <strong>July Office 365 Click-to-Run<\/strong> won\u2019t allow you to start Outlook if it\u2019s already running. \u201cOnly one version of Outlook can run at a time\u201d \u2014 even if the \u201cother version\u201d is, in fact, the same version.<\/li>\n<li>The bug in the Win10 1803 upgrade that resets <strong>TLS 1.2 settings<\/strong> persists, but there\u2019s an <a href=\"https:\/\/www.askwoody.com\/2018\/microsoft-releases-weird-critical-update-that-apparently-fixes-the-tls-1-2-problem-in-win10-version-1803\/\" rel=\"noopener nofollow\" target=\"_blank\">out-of-the-blue patch KB 4458116<\/a> that fixes the problem for Intuit QuickBooks Desktop.<\/li>\n<li>The<strong> Win10 1803<\/strong> cumulative update has an <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343909\" rel=\"noopener nofollow\" target=\"_blank\">acknowledged bug<\/a> in the way the Edge browser interacts with Application Guard. Since about two of you folks use that combination, I don\u2019t consider it a big deal. The solution, should you encounter the bug, is to uninstall the August cumulative update, manually install the July cumulative update, and then re-install the August cumulative update \u2014 thus adding a new dimension to the term \u201ccumulative.\u201d<\/li>\n<li>The Win7 Monthly Rollup has an <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4343900\" rel=\"noopener nofollow\" target=\"_blank\">old acknowledged bug<\/a> about \u201cmissing file (oem&lt;number&gt;.inf).\u201d Although Microsoft hasn\u2019t bothered to give us any details, it looks like that\u2019s mostly a problem with VMware.<\/li>\n<\/ul>\n<p>The rest of the slate looks remarkably clean. Haven\u2019t seen that in a long while.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3216425\/microsoft-windows\/microsoft-patch-alert-mainstream-august-patches-look-remarkably-good.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,10909,13764,714,10525],"class_list":["post-13182","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-microsoft-office","tag-pcs","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13182"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13182\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13182"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}