{"id":17715,"date":"2020-02-12T10:30:13","date_gmt":"2020-02-12T18:30:13","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/12\/news-11450\/"},"modified":"2020-02-12T10:30:13","modified_gmt":"2020-02-12T18:30:13","slug":"news-11450","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/12\/news-11450\/","title":{"rendered":"Patch Tuesday: 99 holes, &#039;exploited&#039; IE fix, Win7 mayhem and UEFI ghost"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security5-100734739-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 12 Feb 2020 09:40:00 -0800<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">What a month it\u2019s been \u2013 and the Patch Tuesday patches have only been out for 24 hours. There are many February patching foibles to report.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Every version of Windows 10, stretching back to the beginning of time (except for the long-neglected version 1511) got patches this month.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There was no free Windows 7 update this month, even though Microsoft released a Monthly Rollup Preview in January. Anyone concerned about the well-documented <\/span><a href=\"https:\/\/www.askwoody.com\/2020\/microsoft-posts-a-manually-downloadable-fix-for-their-win7-stretch-black-wallpaper-bug\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">\u201cStretch\u201d black wallpaper bug <\/span><\/a><span style=\"font-weight: 400;\">caused by last month\u2019s Win7 Monthly Rollup apparently can pound sand \u2013 or manually download and <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4539602\/wallpaper-set-to-stretch-is-displayed-as-black\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">install the fix<\/span><\/a><span style=\"font-weight: 400;\">. Your choice.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It looks as if Microsoft has repaired the part of the KB 4539602 manual patch that was deleting boot files, although the <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3526473\/reports-say-the-manual-install-only-stretch-bug-fix-for-win7-and-2008r2-deletes-boot-file.html\"><span style=\"font-weight: 400;\">official explanation <\/span><\/a>\u00a0<span style=\"font-weight: 400;\">(SHA-2 enablement) still doesn\u2019t make sense to me.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Those of you who paid for Win7 Extended Security Updates have these patches on offer (Thx, <a href=\"https:\/\/www.askwoody.com\/forums\/topic\/february-2020-patch-tuesday-foibles\/#post-2138870\" rel=\"nofollow noopener\" target=\"_blank\">RDRguy<\/a>.)\u00a0:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Two problems. First, you\u2019ll only see those updates if you first install the patch <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3526600\/thought-you-already-paid-for-win7-extended-security-updates-think-again.html\"><span style=\"font-weight: 400;\">Microsoft released yesterday<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Second, you won\u2019t be able to see them until you get January Servicing Stack Update installed, <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4536952\/servicing-stack-update-for-windows-7-sp1-and-server-2008-r2-sp1\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4536952<\/span><\/a><span style=\"font-weight: 400;\">. Many folks report that they were never offered the January SSU \u2013 remember you have to completely clear out the patch backlog before Windows Update will even show you an SSU. Alternatively, you can download and install it manually. Sound familiar?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once you have the January Servicing Stack Update installed and the next for-pay patches appear, you should also get<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, we haven\u2019t had enough time to test any of the patches, so it\u2019s best to wait. Who knows? Maybe Microsoft will have another surprise pre-patch patch waiting.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By the way\u2026, it looks as if Microsoft has backtracked on another part of its Windows 7 end-of-life saber rattling: I\u2019m seeing <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/february-2020-patch-tuesday-foibles\/?view=all#post-2138983\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">many reports<\/span><\/a><span style=\"font-weight: 400;\"> that Win7 machines are getting the latest Malicious Software Removal Tool, even though MSRT updates were supposed to expire last month.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s hear it for the \u201cyou better patch now or else, bucko\u201d contingent. This month, the patching blogosphere is alight with dire warnings about the security hole <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0674\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">CVE-2020-0674<\/span><\/a><span style=\"font-weight: 400;\">, yet another IE\/JScript \u201cScripting Engine Memory Corruption Vulnerability.\u201d\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This time, we\u2019re all supposed to get the January patches installed <em>RIGHT NOW<\/em> because this horrible hole has already been exploited. Yeah, sure.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019ve heard that tune before, most recently last month when the Chicken Littles (and the U.S. National Security Agency) said the <\/span><a href=\"https:\/\/www.computerworld.com\/article\/3514599\/worried-about-an-nsa-chainoffools-curveball-attack-there-are-lots-of-moving-parts-test-your-system.html\"><span style=\"font-weight: 400;\">sky was falling <\/span><\/a><span style=\"font-weight: 400;\">because of the horrendous Crypt32.dll security hole, known as<\/span><a href=\"https:\/\/www.computerworld.com\/article\/3514599\/worried-about-an-nsa-chainoffools-curveball-attack-there-are-lots-of-moving-parts-test-your-system.html\"> <span style=\"font-weight: 400;\">\u201cChain Of Fools\u201d or \u201cCurveBall.\u201d <\/span><\/a><span style=\"font-weight: 400;\">That one fizzled out, too, in spite of the government-funded hype. I don\u2019t know of any widespread CurveBall attacks \u2013 not yet, anyway.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Think you need to fix CVE-2020-0674 right away? Consider. The new, new IE\/JScript \u201cexploited\u201d security hole is so threatening and ominous that Microsoft itself held back on releasing the fix. Microsoft first warned us of the security hole on Jan. 17 in <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/advisory\/ADV200001\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Security Advisory ADV200001<\/span><\/a><span style=\"font-weight: 400;\">, which included a manual workaround (disabling JScript). It didn\u2019t release a fix until yesterday. If Microsoft could wait a few weeks to release the patch, my guess is that you can handily wait a few weeks to install the patch.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Oh. If you followed the ADV200001 advice and manually disabled JScript, you have to <\/span><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-0674\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">manually re-enable it<\/span><\/a><span style=\"font-weight: 400;\"> before installing this month\u2019s patch. Joke\u2019s on you.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Many of us are hoping that the micro-patching company 0patch will be able to plug the security holes in Win7, without paying for (or hassling with) Microsoft\u2019s Extended Support Updates. As of this writing, 0patch has issued a fix for the \u201cexploited\u201d Internet Explorer JScript bug, but I haven\u2019t yet heard of a fix for all of the other ESU-related patches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There\u2019s a problem in paradise, though. In some cases, Firefox can crash on start if you have 0patch installed \u2013 there\u2019s a conflict between Firefox 73 and the 0patch agent. Mitja Kolsek has a <\/span><a href=\"https:\/\/0patch.zendesk.com\/hc\/en-us\/articles\/360011227079-Mozilla-Firefox-73-can-crash-upon-launching-when-0patch-Agent-is-installed\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">workaround posted <\/span><\/a><span style=\"font-weight: 400;\">on the 0patch blog.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft seems to have a specific UEFI manufacturer in its sites.<\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4524244\/security-update-for-windows-10-february-11-2020\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\"> KB 4524244<\/span><\/a><span style=\"font-weight: 400;\">, the \u201cSecurity update for Windows 10, version 1607, 1703, 1709, 1803, 1809, and 1903: February 11, 2020\u201d is being offered, independently of the usual Cumulative Updates, on all versions of Windows 10.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By the way, if you think Win10 version 1909 was immune from the KB 4524244 malaise, think again. Microsoft forgot to include 1909 on its <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4524244\/security-update-for-windows-10-february-11-2020\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">master list<\/span><\/a><span style=\"font-weight: 400;\">, but KB 4524244 is included in the <\/span><a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4524244\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">1909 MS Update Catalog listing<\/span><\/a><span style=\"font-weight: 400;\"> and in <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/894199\/software-update-services-and-windows-server-update-services-2020\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">the WSUS listing<\/span><\/a><span style=\"font-weight: 400;\">. (Thx, PKCano.) The KB article \u2013 even its title \u2013 is clearly wrong.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s what\u2019s odd about that patch, aside from the fact that it isn\u2019t bundled with the cumulative updates. Microsoft is targeting one specific UEFI supplier:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Addresses an issue in which a third-party Unified Extensible Firmware Interface (UEFI) boot manager might expose UEFI-enabled computers to a security vulnerability.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I don\u2019t know which UEFI boot manager has been singled out for this extraordinary treatment, but if you know, I\u2019d sure appreciate a hint on AskWoody.com<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The patch isn\u2019t without its hazard. From LordDeath86, <\/span><a href=\"https:\/\/www.reddit.com\/r\/Windows10\/comments\/f2caz6\/cumulative_updates_february_11th_2020\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">on Reddit<\/span><\/a><span style=\"font-weight: 400;\">: \u201cAfter installing the update for 1909 I got a new pending security update KB 4524244 and it always fails with error 0x800f0922. And again Google and Bing are failing me here because that error code can mean anything from bad VPN software (don&#8217;t have any) to a too small system partition (also not the case here) to a bad star constellation that sends cosmic rays into my PC and let the update fail.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019re only starting to collect and collate the problems with this month\u2019s patches. If you have a tale to tell \u2013 or a question \u2013 hit us <\/span><a href=\"https:\/\/www.askwoody.com\/2020\/ongoing-list-of-problems-with-the-february-2020-patch-tuesday-patches\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">on AskWoody.com<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3526558\/patch-tuesday-99-holes-exploited-ie-fix-win7-mayhem-and-uefi-ghost.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security5-100734739-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 12 Feb 2020 09:40:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">What a month it\u2019s been \u2013 and the Patch Tuesday patches have only been out for 24 hours. There are many February patching foibles to report.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Every version of Windows 10, stretching back to the beginning of time (except for the long-neglected version 1511) got patches this month.<\/span><\/p>\n<h2><strong>Welcome to the new, improved, paid-for Win7 patches<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">There was no free Windows 7 update this month, even though Microsoft released a Monthly Rollup Preview in January. Anyone concerned about the well-documented <\/span><a href=\"https:\/\/www.askwoody.com\/2020\/microsoft-posts-a-manually-downloadable-fix-for-their-win7-stretch-black-wallpaper-bug\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">\u201cStretch\u201d black wallpaper bug <\/span><\/a><span style=\"font-weight: 400;\">caused by last month\u2019s Win7 Monthly Rollup apparently can pound sand \u2013 or manually download and <\/span><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4539602\/wallpaper-set-to-stretch-is-displayed-as-black\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">install the fix<\/span><\/a><span style=\"font-weight: 400;\">. Your choice.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3526558\/patch-tuesday-99-holes-exploited-ie-fix-win7-mayhem-and-uefi-ghost.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[13764,714,10525],"class_list":["post-17715","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-pcs","tag-security","tag-windows"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17715","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17715"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17715\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17715"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17715"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17715"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}