{"id":16409,"date":"2019-09-24T12:30:09","date_gmt":"2019-09-24T20:30:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/09\/24\/news-10150\/"},"modified":"2019-09-24T12:30:09","modified_gmt":"2019-09-24T20:30:09","slug":"news-10150","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/09\/24\/news-10150\/","title":{"rendered":"Microsoft releases emergency IE patches inside &#039;optional, non-security&#039; cumulative updates"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/06\/patch_and_update_options_pixelized_tools_and_refresh_symbol_with_branching_paths_by_pashaignatov_gettyimages-1152709304-100800559-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Tue, 24 Sep 2019 12:13:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">I\u2019ve seen a lot of confusion about the security hole known as CVE-2019-1367 and what normal Windows customers should do about it. Part of the reason for the confusion is the way the fix was distributed \u2013 the patching files were released on Monday, Sept. 23, but only via manual download from the Microsoft Update Catalog.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> On a Monday.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the past few hours, Microsoft released a hodge-podge of patches that seem to tackle the problem. They\u2019re \u201coptional non-security\u201d and \u201cMonthly Rollup preview\u201d patches, so you won\u2019t get them unless you specifically go looking for them. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a bit o&#8217; lagniappe, if you use Windows Update to install the sky-is-falling IE patch, you\u2019ll get a bunch of additional marginally-tested patches along for the ride.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are the most important Win10 patches that appear to contain the IE\/CVE-2019-1367 fix:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I say \u201cappear to contain\u201d the fix because, as best I can tell, none of the documentation mentions CVE-2019-1367, the security hole that was fixed yesterday in an odd single-purpose cumulative update. These, too, are cumulative updates, but they&#8217;re specifically identified as &#8220;<\/span><span style=\"font-weight: 400;\">non-security updates.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Which is disingenuous, at best.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Those patches are only available if you click \u201cCheck for updates.\u201d Microsoft would traditionally call them \u201coptional, non-security\u201d patches, but with the likely (if undocumented) presence of a separately identified out-of-band security patch, it\u2019s hard to say what to call them.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We don\u2019t have a cumulative update for <\/span><strong>Win10 1903<\/strong><span style=\"font-weight: 400;\"> just yet. We do, however, have a manually downloadable out-of-band patch for the IE problem in 1903, <\/span><a href=\"https:\/\/www.askwoody.com\/2019\/more-on-the-unexpected-manual-install-only-win10-cumulative-updates-and-ie-patch\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4522016<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Over on the Windows 7\/8.1 side of the fence, it appears as if the CVE-2019-1367 fix is part and parcel of the two Monthly Rollup Previews just released:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There\u2019s no indication in the KB articles that either of these Previews fix the IE hole, but an independent check <a href=\"https:\/\/www.askwoody.com\/forums\/topic\/heads-up-many-optional-non-security-updates-are-on-the-way\/#post-1963403\" rel=\"nofollow noopener\" target=\"_blank\">by AskWoody\u2019s @EP<\/a> shows that the Previews contain the latest IE file. That likely means the security hole has been plugged in the Previews.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At this point, I don\u2019t see why the Windows blogosphere has tied itself in knots warning about the IE\/CVE-2019-1367 security hole. Yes, Microsoft has said that it\u2019s been exploited in the wild. No, we don\u2019t have any more information. The folks who know aren\u2019t talking. The most credible story I\u2019ve seen involves a very targeted attack from the (reputedly) Korean group known as DarkHotel.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At any rate, for almost everybody, this appears to be yet another tempest in a teapot. My advice is to sit tight, don\u2019t update anything, and stop using Internet Explorer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unless you\u2019ve done something to make DarkHotel angry, of course.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Keep up with the latest on <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2019\/heads-up-many-optional-non-security-updates-are-on-the-way\/\" rel=\"nofollow noopener\" target=\"_blank\"><i><span style=\"font-weight: 400;\">AskWoody<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3440741\/microsoft-releases-emergency-ie-patches-inside-optional-non-security-cumulative-updates.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/06\/patch_and_update_options_pixelized_tools_and_refresh_symbol_with_branching_paths_by_pashaignatov_gettyimages-1152709304-100800559-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Tue, 24 Sep 2019 12:13:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">I\u2019ve seen a lot of confusion about the security hole known as CVE-2019-1367 and what normal Windows customers should do about it. Part of the reason for the confusion is the way the fix was distributed \u2013 the patching files were released on Monday, Sept. 23, but only via manual download from the Microsoft Update Catalog.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> On a Monday.<\/span><\/p>\n<aside class=\"fakesidebar\"><strong>[ Related: <a href=\"https:\/\/www.computerworld.com\/article\/3335756\/microsoft-windows\/how-to-clean-up-your-windows-10-act.html\">How to clean up your Windows 10 act<\/a> ]<\/strong><\/aside>\n<p><span style=\"font-weight: 400;\">In the past few hours, Microsoft released a hodge-podge of patches that seem to tackle the problem. They\u2019re \u201coptional non-security\u201d and \u201cMonthly Rollup preview\u201d patches, so you won\u2019t get them unless you specifically go looking for them. <\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3440741\/microsoft-releases-emergency-ie-patches-inside-optional-non-security-cumulative-updates.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,13764,714,10525],"class_list":["post-16409","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-pcs","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16409"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16409\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16409"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}