News, tips, advice, support for Windows, Office, PCs & more. Tech help. No bull. We're community supported by donations from our Plus Members, and proud of it
Home icon Home icon Home icon Email icon RSS icon

Daily Archives: May 12, 2020

  • Many reports of errors when trying to install the latest .NET patch on Win7 systems with Extended Security Updates enabled

    Posted on May 12th, 2020 at 14:48 woody Comment on the AskWoody Lounge

    Looks like a clunker.

    @BobT reports:

    KB4556399 (Security and Quality Rollup for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows 7 SP1 and Windows Server 2008 R2 SP1) is failing with error 643 for me and many others on the MyDigitalLife forum.

    W7 Ultimate x64.

    And sure enough, MDL is lit up. See the lengthy list of problems starting here.

    Bottom line: Even if you’ve paid for Win7 Extended Security Updates, wait for MS to re-issue KB4556399.

    Susan edit:  This appears to only fail if you have used the bypass script.  On a Windows 7 with an ESU key it installs just fine.

  • May 2020 Patch Tuesday rolls out

    Posted on May 12th, 2020 at 12:11 woody Comment on the AskWoody Lounge

    The KB articles are out

    Microsoft Update Catalog has 241 new entries. (Five others date from earlier this month.)

    According to the KB article, Win10 1909 is getting the same fixes as Win10 1903. That’s good news, especially for those of us who have moved to 1909.

    Dustin Childs at Google’s ZDI reports:

    111 CVEs, 16 are rated Critical and 95 are rated Important in severity. Eleven of these CVEs were reported through the ZDI program. None of the bugs being patched are listed as being publicly known or under active attack at the time of release.

    Childs gives special recognition to CVE-2020-1071, which requires physical access to a computer (say, a computer in a publicly accessible location); CVE-2020-1067, an attack that requires access to a domain user account; and CVE-2020-1118, an exploit that’ll remotely shut down a computer.

    Lawrence Abrams has a comprehensive, easily accessible list on BleepingComputer.

    Let’s see if we get any new bugs this month.

    For those of you running the beta version of Win10 2004, there’s a patch waiting just for you — KB 4556803, which brings your build number up to 19041.264. Noteworthy improvements include “updated the 2020 start date for daylight saving time (DST) in the Kingdom of Morocco.”

    Bottom line: No need to install the May updates yet. (You got the April updates installed, right?)

  • How long has it been since we had a patched 0day that jumped up and bit us?

    Posted on May 12th, 2020 at 11:33 woody Comment on the AskWoody Lounge

    I’m in the middle of a Tweetstorm – par for the course – but had an interesting response to one of my standard questions. The question goes like this:

    Can you tell me one, single, zero day patch that resulted in mainstream malware within, let’s say, a few weeks of release? Just one.

    I got a well-researched response. (Most of them are long on accusations and short on research – and make for amusing reading.) Here’s the list:

    • WannaCry
    • Blaster
    • Sasser

    To my mind, the best feedback I get is from people who take the time to think through their positions and come up with cogent arguments. That list prompted me to go back and check what really happened. Here’s what I found:

    • WannaCry/EternalBlue – patched April 11, 2017. Exploited May 12, 2017. More than a  month from patch to exploit – and it was a bad exploit! UPDATE: Andy Greenberg at Wired just published an excellent story about Marcus Hutchins, the guy who corralled WannaCry.
    • Blaster – patched May 28, 2003. Exploited August 11, 2003. Almost three months.
    • Sasser – patched April 13, 2004. Exploited April 30, 2004. Two weeks to exploit, and that’s scary. But it was 16 years ago.

    Have I missed something? Can you find a zero-day exploit that was patched, and then widely exploited within a few weeks of the patch?

  • Incorrect link in the FREE Newsletter

    Posted on May 12th, 2020 at 08:20 woody Comment on the AskWoody Lounge

    For those of you looking for Duplicate Photo Cleaner, which appeared in yesterday’s FREE Newsletter, there’s a bad link.

    You can take advantage of the AskWoody special offer by clicking on this link.