• Miscellaneous, minor problems with the Patch Tuesday patches

    Home » Forums » Newsletter and Homepage topics » Miscellaneous, minor problems with the Patch Tuesday patches

    Author
    Topic
    #326375

    So far the patching situation looks pretty good. Mind you, we’re still at MS-DEFCON 2, and unless you’re using Internet Explorer, there’s nothing lurk
    [See the full post at: Miscellaneous, minor problems with the Patch Tuesday patches]

    4 users thanked author for this post.
    Viewing 22 reply threads
    Author
    Replies
    • #326407

      The Win10 1803 cumulative update fixed the problem where Edge was trying to get to local IP addresses – a bug most commonly reported with routers. KB 4487017 now says this cumulative update “Addresses an issue that prevents Microsoft Edge from connecting using an IP address.

      Ditto for 1809: KB4487044 still showed it as a known issue yesterday, but by today that has been shifted to a fixed issue. (Tested by accessing my router from Edge; worked OK.)

      The same fix was also delivered yesterday for 1709 (and 1703 for a few, 1607 for fewer).

      4 users thanked author for this post.
    • #326479
      1 user thanked author for this post.
      • #326525

        Thank you!

        Man, I hate it when that happens….

      • #326540

        Besides affecting Defender is the old security essentials affected with any of the updates?

        EDITED formatting

    • #326496

      I have a lot of folks using IE so I’m pushing that patch keeping in mind we are at Defcon 2. As a matter of fact I have quite a long list of unapproved updates in WSUS so I’m going to get all systems up to date including the February patches. I normally don’t install updates that are out for the current month but going to dive in head first to get things current.

      Hopefully I won’t regret it and if I run into anything I’ll be sure to check in.

      Red Ruffnsore

      2 users thanked author for this post.
      • #326712

        Per Woody:

        So far the patching situation looks pretty good. Mind you, we’re still at MS-DEFCON 2, and unless you’re using Internet Explorer, there’s nothing lurk

        Cant seem to find it, so what is wrong with using Internet Explorer 11?  And what is the recommended action?  Windows 7 and Windows 10?

        Does whatever it is affect Edge also?

        Windows 10 Pro x64 v22H2 and Windows 7 Pro SP1 x64 (RIP)
        • #326757

          I have the same questions.

          Group B, Windows 7 Pro, SP1, x64.

          Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

          MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
          Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
          macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

        • #326822

          Linked from the “always good reading” link of the immediately preceding blog post you would find:

          CVE-2019-0676 | Internet Explorer Information Disclosure Vulnerability

          IE only, not Edge. All platforms. Actively exploited, but only to check file presence.

          1 user thanked author for this post.
        • #326982

          So on Windows 7 and Windows 10 -1803 Group A, are there any separate, manually downloadable IE fix KB’s patches while awaiting the Defcon OK for the Monthly Rollups or must I install the full monthly updates?

          If there is a IE KB patch, as respects Windows 10 – 1803 do I also, but first have to download and install the new Service Stack KB4485449?

          Windows 10 Pro x64 v22H2 and Windows 7 Pro SP1 x64 (RIP)
          • #327016

            You can download the Feb IE11 CU KB4486474 (Group B patches in AKB2000003) for Win7 and install it.

            There is no Group A or Group B for Win10, and no separate IE11 patch. The update for IE11 in Win10 is contained in Feb Cumulative Update. If you install the CU for Win10 through Windows Update, the SSU will install automatically. If you manually install the Win10 CU, you need to manually install the SSU KB4485449 first.

            1 user thanked author for this post.
    • #326558

      in response to the advice for Windows 10 Home “time to block auto updates”…I changed my settings to ‘metered’ and it slowed my computer to sludge….any other suggestions?

      thanks.

      • #326942

        There are many, many ways to block Win10 Home updates, but the only one I recommend is to go to a metered connection.

        It shouldn’t affect day-to-day operation of the machine. Windows Update doesn’t check continuously.

        Not sure what’s slowing you down, but it’s highly unlikely that metered connections make a difference….

    • #326588

      I’ve heard two lines on this IE/OS issue:

      1. IE is “So intertwined” with the OS that you should patch zero-days even if you don’t use IE

      2. #1 is false.

      I have IE on my system, but don’t use it, save in a weird situation when Chrome is acting up.

      What’s the truth? IS there a truth here, or a matter of opinion?

      Thanks!

      Win7 Pro SP1 64-bit, Dell Latitude E6330, Intel CORE i5 "Ivy Bridge", 12GB RAM, Group "0Patch", Multiple Air-Gapped backup drives in different locations. Linux Mint Greenhorn
      --
      "The more kinks you put in the plumbing, the easier it is to stop up the pipes." -Scotty

      1 user thanked author for this post.
      • #326667

        I have IE & Updates “stopped/disabled”. I use Firefox, Pale Moon, Chrome, Vivaldi – all set to ‘block’ ads, delete data on exit, etc… When I sense that web pages are slowing down I clear history. HOWEVER, I still must go to “Control Panel – “Internet Options – then I have to delete cookie, browsing history, etc, data manually, then things are fine again! – even tho this to is set to delete upon exit!  So, it seems that IE is indeed collecting/storing data (for years in the ‘temp folder’ also!!! – had to clean that out to…) even when disabled! I am a very ‘light’ home user. I have followed Woodys advice for more than 3 years. I also have NOT updated anything from MS – not even “critical security” updates since about March 2018.  All is good…  – win7 home premium, 6.1.7601 SP1 build 7601, AMD AthlonII x2 240 – still does everything I need smooth and quick – even Photoshop Elements 4! and my 1080 24″ Acer monitor…

      • #326714

        A lot of applications take subtle dependencies on bits and pieces of Internet Explorer functionality.  Maybe it’s an HTML-based help system, maybe it’s a scripting engine (Jscript9, VBScript), maybe it’s web proxy stuff, maybe it’s the RSS reader library (Msfeeds), maybe it’s the URL Monikers (urlmon), which is a part of the OLE stuff.

        There are tons and -tons- of internal apps at companies that took a presumably safe dependency on one or more of these pieces of IE.  Assuming these companies even have developers who could do the work, they’d have a lot of work ahead of them to migrate away from using those components to some equivalent in Chromium or Edge.

        (And then there’s plenty of cases where a vendor has updated their product to no longer depend on IE, but they’re charging a lot of money for that work…. and companies using the old version of those products can’t justify spending the money.)

      • #326871

        1 is true but Ed Bott says : Kill Internet Explorer (you can’t really kill it, just disable)

        If you’re still using Internet Explorer, it’s time to let go. With the launch of Windows 10, Microsoft officially stopped developing new features for its once-flagship browser and is now delivering only security patches intended for use at large organizations with custom apps that require the old browser for compatibility reasons.

        You’re much better off choosing a modern browser that works with the Web as it exists today. In Windows 10, Microsoft Edge is the default, but you can install a new browser such as Chrome or Firefox and set it as the default. With that task out of the way, you can then disable Internet Explorer for good.

        To locate that switch, type features in the search box and open the Turn Windows Features On Or Off dialog box from the list of search results. Clear the check box to the left of Internet Explorer 11, click OK, and restart.

        From that same dialog box, you can also eliminate other older bits of Windows 10 that exist only for compatibility reasons, including Windows Media Player and the Windows Fax and Scan feature.

    • #326657

      Some addenda; on Krebs at least one user is reporting issues, but no details on his OS, hardware, etc.:

      February 13, 2019 at 9:04 am

      Yesterday’s MS patches caused my machine to refuse to start this morning. After trying to start up in safe mode it went into reversing the updates…

      https://krebsonsecurity.com/2019/02/patch-tuesday-february-2019-edition/#more-46434

      Yow. “Dead Body Wednesday” is good, but “Nervous Breakdown Wednesday” might be as good.

       

      Win7 Pro SP1 64-bit, Dell Latitude E6330, Intel CORE i5 "Ivy Bridge", 12GB RAM, Group "0Patch", Multiple Air-Gapped backup drives in different locations. Linux Mint Greenhorn
      --
      "The more kinks you put in the plumbing, the easier it is to stop up the pipes." -Scotty

      3 users thanked author for this post.
      • #326789

        I wonder if the number of prescriptions for Valium and Xanex have gone up ever since Microsoft created the monthly update fiasco bandwagon. All humor aside, at least this month’s updates could have been a lot worse.

        2 users thanked author for this post.
    • #326799

      So, what is “lurking” if I use IE? Maybe someone could explain that? Because  I have not found it defined reading this thread. This thread is about… “something”, apparently a scary “something.” So, what “something” might this be?

      Group B, Windows 7, SP1, x64.

      Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

      MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
      Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
      macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

    • #326814

      This thread is about… “something”, apparently a scary “something.” So, what “something” might this be?

      Per title of thread, this should be about “Miscellaneous, minor problems with the Patch Tuesday patches”?

      Non-techy Win 10 Pro and Linux Mint experimenter

      • #326819

        Elly,

        IE is mentioned explicitly right at the top of this thread, as having a problem. Not a “miscellaneous problem”, but an “IE problem” that is “lurking”, or so it is said. Except what is the problem and how and where it “lurks” has not been explained anywhere.

        Or maybe this is an existentialist, avant-garde, absurdist thread reflecting on the pointlessness of all human endevour and the intrinsically absurd nature of the human predicament? Now, that would be something interesting.

        OK, Lars220 , below, just explained it all (at last!): this is not about a problem with the February patch of IE 11, the patch is a fix to a problem in IE 11.

        However, while the Krebs’ article (link provided by NTDBD) mentions a 0-day vulnerability in IE 11, it does not say if this is a problem when one is using IE 11 oneself and not when it is used by the OS or some other installed software, which to me looks like a very good question.

        Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

        MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
        Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
        macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

        • #326823

          You would have to visit a malicious website in Internet Explorer; then it could check whether any particular file(s) existed on your local disk(s).

          That’s why Woody said, “unless you’re using Internet Explorer”.

          2 users thanked author for this post.
          • #326839

            Thanks b,  what you wrote sounds quite clear and definitely conclusive to me.

            But “Using” is not conclusive: it could mean “you, Sir, are doing something with IE11”, or “you, Sir, have IE 11 installed and running in your machine” — where something there, I might add, not you, might be doing something with it. I know, it is not the by-the-dictionary ‘using’, but that is how people tend to use certain words, such as ‘using’.

            Anyhow, I have IE 11, but hardly ever use it these days, as I have other browsers — that have their own problems, no doubt. Glad that is over now, so I think am done here. Once more, thanks to you, Lars220 and NTDBD.

            Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

            MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
            Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
            macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

    • #326818

      Here is the link for the Internet Explorer Feb 2019 update information:

      https://support.microsoft.com/en-us/help/4486474/cumulative-security-update-for-internet-explorer-february-12-2019

      Thanks to Nibbled To Death By Ducks link to Brian Krebs article at:

      https://krebsonsecurity.com/2019/02/patch-tuesday-february-2019-edition/

      Quote Brian Krebs: “Microsoft patched a bug in Internet Exploder Explorer (CVE-2019-0676) discovered by Google that attackers already are using to target vulnerable systems. This flaw could allow malware or miscreants to check for the presence of specific files on the target’s hard drive. ”

      So, following the link for the CVE, (need to check box and Accept EULA):

      https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-0676

      CVE-2019-0676 | Internet Explorer Information Disclosure Vulnerability
      Security Vulnerability

      Published: 02/12/2019
      MITRE CVE-2019-0676

      An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.

      An attacker who successfully exploited this vulnerability could test for the presence of files on disk. For an attack to be successful, an attacker must persuade a user to open a malicious website.

      The security update addresses the vulnerability by changing the way Internet Explorer handles objects in memory.

      Recommend waiting for more information and Woody’s blessing to update.

      4 users thanked author for this post.
    • #326835

      An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.

      Aha! Bingo! So it IS only if you use IE (which I do not, unless pressed by some bizzare set of circumstances presses me to it).

      So much for the old MSFT “It’s a part of the operating system, you can’t remove it from the OS without causing disasters of biblical proportions!!” holler so long ago. If memory serves, to me that you CAN remove it, but it’s a real pain to do. At least you could way back when, but with IE 11 I wonder if it’s still true. Another topic, another time.

      Tnx to Lars220 for reading the CVE and sharing, which I did not have time to do on this 15-hour day (everyone’s running around getting sandbags here for the next deluge-pummeling, including yours truly).

      Win7 Pro SP1 64-bit, Dell Latitude E6330, Intel CORE i5 "Ivy Bridge", 12GB RAM, Group "0Patch", Multiple Air-Gapped backup drives in different locations. Linux Mint Greenhorn
      --
      "The more kinks you put in the plumbing, the easier it is to stop up the pipes." -Scotty

      • #326943

        Yes, but read Microsoft’s wording very closely.

        It isn’t clear, at least to me, if the exposure exists through other infection vectors – where Windows is using IE behind your back.

        Still, avoiding IE at this point seems to do the trick.

        3 users thanked author for this post.
        • #327164

          The implication of the wording by any normal interpretation is that you would have to open a malicious website through IE in order to be vulnerable, but of course where the hidden behaviour of IE is concerned even when using a different browser MS does not permit the normal interpretation rules to apply!

          1 user thanked author for this post.
    • #326882

      W7 64 Home Premium, FF 65.0.1.
      Group A. 3-Updates ¦ Installed ¦ Functioning. OK !

      2 users thanked author for this post.
    • #326908

      Office 2010 is broken on XP again, now with KB4462174

    • #326917

      Two questions:

      Win 7 32-bit, group B, hadn’t installed January patches, so installed now 4487071 (.NET), 4480960 (Jan Security only), 4487375 (that fix for the Jan patch, wouldn’t have the issue, don’t have shares, but thought just in case), 4486474 (IE Feb cumulative patch) and 4486564 (Feb Security only). Noticing two things:

      1. 4483187 (that out of band IE Dec IE update) still shows up as available and important. Shouldn’t 4486474 have superseded it, since it’s cumulative?

      2. I now keep having a WmiPrvSE running, as Network service. That definitely wasn’t there before. Occasionally says it uses 1-2% CPU too. What’s that about? Anything to do with an update? Maybe that fix?

      • #326920

        1. 4483187 (that out of band IE Dec IE update) still shows up as available and important. Shouldn’t 4486474 have superseded it, since it’s cumulative?

        This may be the answer to your first question.

        1 user thanked author for this post.
        • #326960

          Ah, ok, so basically safe to hide, right? Thank you.

          — Cavalary

          1 user thanked author for this post.
    • #327039

      @h0x0d managed to get links of refreshed Windows 7 ISO files
      https://twitter.com/h0x0d/status/1096054337237733376

      5 users thanked author for this post.
      • #327501

        I built a VM with the WIn7Pro iso – it’s fully patched through the November 2018 Rollup, with the telemetry usual suspects.

        1 user thanked author for this post.
        • #327505

          kb2952664 embedded, any others?
          Diagtrack is certain to be in there too, wonder if it’s locked and unremovable..

          If debian is good enough for NASA...
          • #327573

            Yes, kb2952664, plus kb3068708, kb3075249, kb3080149. I haven’t looked for the CEIP stuff in general, I’m sure that’s there. Yes diagtrack. It’s an easy track to a fresh group A install.

            1 user thanked author for this post.
      • #1920783

        Just downloaded Ultimate. Many thanks to you and WalkingCat.

    • #327244

      oops… I don’t see any issues with Japanese Era characters on win7sp1x64 @ February 12, 2019—KB4486563 (Monthly Rollup) us-en as OS main language but Japanese as LP & 2nd OS language.

      Also the advised by m$ workaround as editing of the registry key looks odd when this key is literally same as advised:

      HKLM\SYSTEM\CurrentControlSet\Control\Nls\Calendars\Japanese\Eras\

      “1868 01 01″=”明治_明_Meiji_M”

      “1912 07 30″=”大正_大_Taisho_T”

      “1926 12 25″=”昭和_昭_Showa_S”

      “1989 01 08″=”平成_平_Heisei_H”

      rgds,

    • #327307

      JET DATABASE PROBLEM —

      I have a windows 10 pro installed on a second machine (experimental) at home.
      I updated it to February updates last Wednesday, which is supposed to fix the Jet Database problem introduced in January Updates.
      Currently windows is at version 1809 build 17763.316 with no outstanding updates.

      I installed my program which uses   .mdb database. It setup OK and is currently looking at the   .mdb database on a second HDD drive.
      Did not have to use compatibility mode.

      Thought folks here would like to know.

      mbhelwig

      1 user thanked author for this post.
    • #327350

      New Jet engine problem introduced with the patch.

      Trying to get the columns in a wide table using Adox, results in error 3251 (Object or provider is not capable of performing requested operation). Small tables work fine, but tables with more than 120 columns (exact number not sure) will give this error.

      2 users thanked author for this post.
      • #327381

        OUCH!

        Can you isolate it to the Windows update?

      • #329540

        Additional information: it seems to be related to the additional properties which can be used with Access97 databases. A standard table with a large number of fields, without additional properties runs fine. Our table with a large number of fields gives error 3251.

    • #327433

      I have a basic question about the definition of “MS-DEFCON 2”.  Should there be a separate rating for each OS = Win 7, 8.1, 10, Office?  I know that there are problems with the Win 10 patches – depending upon the maintenance version, but for my Win 7 system (without Office), is it safe to install the two February Windows 7 patches?  I did not install the two January patches,  A further note – I do have IE11 installed, but I use it ONLY to test pages that do not seem to work in Firefox, and also to install Flash updates.

    • #327466

      Running Windows 7 Home Premium 32 bit. After the Tuesday rollup, Internet Explorer now pegs the CPU at 100% and makes the browser unusable. dllhost.exe stays pegged.

    • #327752

      A question re windows 7 February 2019 update — KB4486563

      —The kb note — “After you apply this update, the network interface controller may stop working on some client software configurations. This occurs because of an issue related to a missing file, oem.inf. The exact problematic configurations are currently unknown.”

      This note has been there on each monthly update since March 2018 — and is now missing!!!!!!!!!!!.
      Does this mean that this problem has now been fixed or what ????

       

      mbhelwig

    • #329247

      In Monday’s Newsletter, Susan said the following regarding this month’s IE KB fix for Windows 7:

      What to do: Same drill as the other Windows versions: add the Internet Explorer fixes (KB 4486474) to your system, but put the security updates on hold until notified.

      Is this advice the same for those of us in Group A – Rollup updates and using Internet Explorer?  That is, go ahead and install KB4486474, but hold up on the full KB4486563?  Or would that mess up the Rollup update installation when the time comes?

      Windows 10 Pro x64 v22H2 and Windows 7 Pro SP1 x64 (RIP)
      • #329248

        Susan says:
        add the Internet Explorer fixes (KB 4486474) to your system

        That means, install it.

        Susan says:

        put the security updates on hold until notified.

        That means, put security updates (Security Quality Monthly Rollup) on hold, ie, don’t install it.

        Is necessary to repeat the instructions?

      • #329639

        I installed the IE11 fix (KB4486474) yesterday.  As I normally do not use IE11, I have not started IE11 to test anything.  Because IE is tightly integrated into the Windows 7 operating system, the patch installation required a reboot.

        One question I have – I saw this patch number via this forum.  If  the monthly security roll-up patches should not yet be installed, how do I find the patches that I can install?  This IE11 patch was not delivered via Windows Update.

         

        • #329657

          The February patches are still under DEFCON2 which means to hold off installing for now. The Jan patches are good to install including KB4486474.
          See Susan’s Master Patch List (button in top bar) for information on Jan patches.

          • #329898

            Perhaps the point of confusion is that KB 4486474 is a February patch, not a January patch. So, the Defcon system is saying to wait before installing, while Ms Bradley is saying to go ahead and install it.

            Edit: It also appears that there is a new update, KB4491113 to fix a bug that KB4486474 may introduce. I can’t tell if the latter replaces the former (MS says no, but from the size of the patches it seems like perhaps it does)

            • #329978

              Can we get additional confirmation on this new KB for IE 11.

               It also appears that there is a new update, KB4491113 to fix a bug that (IE 11 patch) KB4486474 may introduce. I can’t tell if the latter replaces the former (MS says no, but from the size of the patches it seems like perhaps it does)

              And since the Monthly Security Only KB and the Monthly Rollup KB contained the original IE 11 fix, will they be revised or is KB4491113 truly a patch to all these?

              Update: Per MS this fixes:

              Internet Explorer cannot load images that have a backslash (\) in their relative sources path.

              Windows 10 Pro x64 v22H2 and Windows 7 Pro SP1 x64 (RIP)
      • #329906

        @Tex265 (Sorry, this post didn’t go where I wanted it to go.)

        I’m not sure how much this will help, but if you’re Group A and have installed KB4486563, then you don’t want the IE 11 patch (KB4486474). See this link about a third of the way down the page:

        https://support.microsoft.com/en-us/help/4486474/cumulative-security-update-for-internet-explorer-february-12-2019

        But I don’t know what would happen if you install the IE 11 patch first and then later try to install the KB4486563. I don’t recall this sort of situation ever coming up before.

        If you’re Group B, then you could install the IE 11 patch and later the Security Only patch(KB 4486564). I’ve done this sort of thing many times on several Win 7 computers without any issues.

        1 user thanked author for this post.
        • #329969

          DrBonzo thanks for your reply.

          But I don’t know what would happen if you install the IE 11 patch first and then later try to install the KB4486563. I don’t recall this sort of situation ever coming up before.

          If you’re Group B, then you could install the IE 11 patch and later the Security Only patch(KB 4486564). I’ve done this sort of thing many times on several Win 7 computers without any issues.

          Your comments are exactly what I was asking about being in Group A and everything out there addressing Group B users.  I have not yet installed KB4486563 or the IE 11 patch KB4486474 pending a clarification. And apparently no affirmative answer yet as to if it is OK to install the IE 11 patch only first then the KB4486563 later if in Group A.

          And thanks for the heads up on the IE11 patch for the patch – or replacement patch?

          Windows 10 Pro x64 v22H2 and Windows 7 Pro SP1 x64 (RIP)
          1 user thanked author for this post.
    • #329894

      Group A here. For reasons I won’t go into (embarrassment may be one :)) I took the rare step of running WU on my three Win 7 machines yesterday, while we’re still at MS-Defcon 2.

      No problems on two  of the machines, but on the third Word 2016 was molasses-slow when I tried to save a document.  Then a couple hours later I was trying to save another document, and had to give up and force close.  Explorer seemed unable to refresh.  Then Norton gave me an error message and clicking “fix here” accomplished nothing…then the Norton UI locked up.  There’s more that was messed up…I won’t go into it all, but the kicker was that — for the first time I can recall — I got a notification above the system tray that my copy of Windows was not genuine.

      Rebooted (I had to force-close one program..I forget which), but problems remained.  Rebooted again, this time into recovery mode.  Ran System Restore from there to try to undo the WU.  Fortunately the Restore seems to have been flawless, no remaining issues that I can find.  Will definitely wait for Defcon 3 before trying again…or maybe I’ll just wait until next month.

      BTW, I don’t know for sure whether it was actually necessary to run the the Restore from recovery instead just trying a full reboot first…but it just seemed like a “cleaner” way to proceed.  And I also have to wonder whether this was actually a problem with the updates themselves, or possibly just, e.g., some sort of unlucky application conflict that occurred while I was trying to update that machine.

    • #330170

      I don’t have IE on my system. only use Chrome or Firefox. do i still need to download the KB4486563 update?  thanks!

    Viewing 22 reply threads
    Reply To: Miscellaneous, minor problems with the Patch Tuesday patches

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: