{"id":16873,"date":"2019-11-13T08:30:06","date_gmt":"2019-11-13T16:30:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/11\/13\/news-10611\/"},"modified":"2019-11-13T08:30:06","modified_gmt":"2019-11-13T16:30:06","slug":"news-10611","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/11\/13\/news-10611\/","title":{"rendered":"Patch Tuesday arrives with Access error, 1909 in tow, and a promise of no more &#039;optional&#039; patches this year"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security12-100734741-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 13 Nov 2019 07:59:00 -0800<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">The patches haven\u2019t yet been out for 24 hours and already we\u2019re seeing a lot of activity. Here\u2019s where we stand with the initial wave of problems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Many early patchers found that the MSRT, KB 890830, kept installing itself over and over again. Poster <a href=\"https:\/\/www.askwoody.com\/forums\/topic\/november-2019-patch-tuesday-arrives\/#post-2004327\" rel=\"nofollow noopener\" target=\"_blank\">IndyPilot80 says<\/a>:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It sits at \u201cInstalling: 0%\u201d for a couple minutes then goes away. When I hit \u201cCheck for Updates\u201d it shows up again and does the same thing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are hundreds of reports online of people who found that the MSRT installer threw an 800B0109 and wouldn\u2019t install; or installed but then reinstalled on reboot; showed up multiple times in the Installed Updates list; didn\u2019t show up in the Installed Updates list in spite of running; and several variations on those themes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ends up, it was all Microsoft\u2019s fault. By last night, MSRT was behaving itself.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">G\u00fcnter Born first <\/span><a href=\"https:\/\/borncity.com\/win\/2019\/11\/13\/office-november-2019-updates-are-causing-access-error-3340\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">described this problem<\/span><\/a><span style=\"font-weight: 400;\">, based on reports on German-language sites, including deskmodder.de:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft Office security updates released on Patchday (November 12, 2019) cause Access to fail to access databases. An error 3340 \u2018Query is corrupted\u2019 will be dropped. \u2026<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It appears that a security update for the <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1402\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2019-1402<\/span><\/a><span style=\"font-weight: 400;\"> vulnerability in each version of Microsoft Office causes this error. Here is the list of Office security updates that you can uninstall.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Office 2010: <\/span><a href=\"https:\/\/support.microsoft.com\/help\/4484127\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Description of the security update for Office 2010: November 12, 2019 (KB4484127)<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Office 2013: <\/span><a href=\"https:\/\/support.microsoft.com\/help\/4484119\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Description of the security update for Office 2013: November 12, 2019 (KB4484119)<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Office 2016: <\/span><a href=\"https:\/\/support.microsoft.com\/help\/4484113\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Description of the security update for Office 2016: November 12, 2019 (KB4484113)<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">At least from what I\u2019ve seen so far, uninstalling this security update seems to allow database access again.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Born says that he\u2019s reported the problem to Microsoft, but it doesn\u2019t yet appear on the official <\/span><a href=\"https:\/\/support.office.com\/en-us\/article\/fixes-or-workarounds-for-recent-issues-in-access-54962069-14f4-4474-823a-ff7e5974a570?ui=en-US&amp;rs=en-US&amp;ad=US\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Fixes or workarounds for recent issues in Access<\/span><\/a><span style=\"font-weight: 400;\"> list.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It isn\u2019t clear to me why Microsoft re-released its most stable version of Win10 (at least, I\u2019m still using 1809 on my production machines), but a new one\u2019s out, apparently. At the same time Microsoft announced the re-release of 1809, it also <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4464619\/windows-10-update-history\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">reset the countdown date<\/span><\/a><span style=\"font-weight: 400;\"> for version 1809 support:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">On November 13, 2018, we re-released the Windows 10 October Update (version 1809), Windows Server 2019, and Windows Server, version 1809. We encourage you to wait until the feature update is offered to your device automatically. &#8230;\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Note for Commercial Customers: November 13 marks the revised start of the servicing timeline for the Semi-Annual Channel (\u201cTargeted\u201d) release for Windows 10, version 1809, Windows Server 2019, and Windows Server, version 1809.\u00a0 Beginning with this release, all future feature updates of Windows 10 Enterprise and Education editions that release around September will have a 30-month servicing timeline.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And you thought Microsoft had abandoned the ridiculous \u201cSemi-Annual Channel (\u201cTargeted\u201d)\u201d bafflegab.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft released new updates for the Servicing Stack on all supported versions of Windows. Notably, Win7 and 8.1 also have new SSUs. (You only have to worry about SSUs if you manually download and install updates. If you use Windows Update, they should be installed automatically. Should.) There\u2019s a complete list of the new SSUs in <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV990001\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Security Advisory ADV990001<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tell me if this <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3444177\/microsoft-releases-even-more-patches-for-the-cve-2019-1367-ie-zero-day-and-the-bugs-are-having-a-fi.html\" rel=\"noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">sounds familiar<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Yesterday\u2019s patches includes one for an Internet Explorer security hole, dubbed\u00a0 <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1429\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2019-1429<\/span><\/a><span style=\"font-weight: 400;\">, an \u201cexploited\u201d vulnerability. Just like the August \u201cexploited\u201d IE zero-day Keystone Kops episode, this appears to be a genuine flaw in IE. Just like the August doppelganger, Microsoft isn\u2019t telling us very much.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Dustin Childs says it best in his <\/span><a href=\"https:\/\/www.thezdi.com\/blog\/2019\/11\/12\/the-november-2019-security-update-review\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Zero Day Initiative post<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This patch for IE corrects a vulnerability in the way that the scripting engine handles objects in memory. This vague description for memory corruption means that an attacker can execute their code if an affected browser visits a malicious web page or opens a specially crafted Office document. That second vector means you need this patch even if you don\u2019t use IE. Microsoft gives no information on the nature of the active attacks, but they are likely limited at this time.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">No doubt the Chicken Littles of the Windows reporting industry will bill this as a huge threat to 800 million Windows users\u00a0\u2014 or some such drivel. In fact, it\u2019s likely the discovered exploit appeared in a honed attack directed at a major governmental or industrial target.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Until we hear more about it (we haven\u2019t heard of any attacks based on August\u2019s exploit, have we?), you should be fine.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This should come as good news for Windows patchers of all stripes.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft has officially announced that it\u2019s giving up on its practice of releasing (at least) two cumulative updates per month, through the end of this year. Tucked away in a neglected corner of the<\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/release-information\/windows-message-center#366\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\"> Windows Release Information page <\/span><\/a><span style=\"font-weight: 400;\">lies this little gem:<\/span><\/p>\n<p><strong>Timing of Windows 10 optional update releases (November\/December 2019)<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">There will be no more optional \u201cC\u201d or \u201cD\u201d releases for the balance of this calendar year. <\/span><strong>Note<\/strong><span style=\"font-weight: 400;\"> There will be a December Security Update Tuesday release, as usual.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For those of you who don\u2019t speak the A-B-C-D-E jargon, that means we won\u2019t have second cumulative updates in November or December. The \u201coptional, non-security\u201d patches (which frequently contain fixes for bugs introduced by security updates) are a strange artifact that solidified in early 2017. Prior to that, Microsoft released one cumulative update on the second Tuesday of most months, then patched again at an arbitrary time, should the need arise\u00a0\u2014 primarily to fix bugs introduced by the first patch.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Starting in 2017 or so (it\u2019s difficult to pinpoint a date), somebody decided that it would be good to give Windows patchers a preview of the next month\u2019s non-security patches, generally during the 3rd or 4th week of the month (thus, \u201cC\u201d and \u201cD\u201d week). The approach resembled something of an Insider Preview shot at the next month\u2019s non-security patches. You could get a preview of the next month\u2019s patches, but only if you downloaded and installed them manually, or (horrors!) became a Seeker and clicked \u201cCheck for updates.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It looks like Microsoft is shutting that down, at least for the next two months, and I say good riddance. If there\u2019s to be an Insider Preview ring for each version of Win10, I\u2019m all for it\u00a0\u2014 let people opt in, and give them a reliable way to report bugs. But playing footsie with Seekers just hangs too many innocent bystanders out to dry.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It isn\u2019t clear if we\u2019ll be spared the same indignity with Windows 7 and 8.1 \u201cMonthly Rollup Previews.\u201d Stay tuned.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As widely advertised, this month\u2019s cumulative update for Win10 version 1803 is destined to be its last (unless we have a major security problem and Microsoft changes things). If you\u2019re running Win10 version 1803, there\u2019s no need to panic; in the normal course of events, you wouldn\u2019t get another security patch until next month anyway. I\u2019ll have more about the journey from 1803 in a subsequent column.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Those who have installed the Win10 1903 November cumulative update, KB 4524570, and rebooted, will see an offer on your Windows Update setting page (screenshot).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Right now, there\u2019s no pressing reason to click that \u201cDownload and install now\u201d link. Let\u2019s wait and see what problems arise.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Quite a haul for the first 24 hours, eh?\u00a0<\/span><\/p>\n<p><em><span style=\"font-weight: 400;\">Thx, @abbodi86, @PKCano, @gborn and many more<\/span><\/em><\/p>\n<p><em><span style=\"font-weight: 400;\">Join us for the usual patching follies <\/span><a href=\"https:\/\/www.askwoody.com\/2019\/november-2019-patch-tuesday-foibles\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">on AskWoody.com<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3453322\/patch-tuesday-arrives-with-access-error-1909-in-tow-and-a-promise-of-no-more-optional-patches-this.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security12-100734741-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 13 Nov 2019 07:59:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">The patches haven\u2019t yet been out for 24 hours and already we\u2019re seeing a lot of activity. Here\u2019s where we stand with the initial wave of problems.<\/span><\/p>\n<h2><strong>Malicious Software Removal Tool installation error 800B0109<\/strong><span style=\"font-weight: 400;\">\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Many early patchers found that the MSRT, KB 890830, kept installing itself over and over again. Poster <a href=\"https:\/\/www.askwoody.com\/forums\/topic\/november-2019-patch-tuesday-arrives\/#post-2004327\" rel=\"nofollow noopener\" target=\"_blank\">IndyPilot80 says<\/a>:<\/span><\/p>\n<blockquote>\n<p><span style=\"font-weight: 400;\">It sits at \u201cInstalling: 0%\u201d for a couple minutes then goes away. When I hit \u201cCheck for Updates\u201d it shows up again and does the same thing.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3453322\/patch-tuesday-arrives-with-access-error-1909-in-tow-and-a-promise-of-no-more-optional-patches-this.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[12014,10516,714,10525],"class_list":["post-16873","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-browsers","tag-microsoft","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16873"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16873\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16873"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}