Lucene search

K
mskbMicrosoftKB4489878
HistoryMar 12, 2019 - 7:00 a.m.

March 12, 2019—KB4489878 (Monthly Rollup)

2019-03-1207:00:00
Microsoft
support.microsoft.com
151

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.275 Low

EPSS

Percentile

96.7%

March 12, 2019—KB4489878 (Monthly Rollup)

Improvements and fixes

This security update includes improvements and fixes that were a part of update KB4486565 (released February 19, 2019) and addresses the following issues:

  • Addresses an issue that may prevent the Event Viewer from showing some event descriptions for network interface cards (NIC).
  • Security updates to Internet Explorer, Windows App Platform and Frameworks, Windows Cryptography, Windows Hyper-V, Windows Storage and Filesystems, Windows Fundamentals, Windows Server, Windows Kernel, Windows MSXML, and the Microsoft JET Database Engine .
    For more information about the resolved security vulnerabilities, see the Security Update Guide.

Known issues in this update

Symptom Workaround
After installing this update, Internet Explorer 11 and other applications that use WININET.DLLmay have authentication issues. This occurs when two or more people use the same user account for multiple, concurrent login sessions on the same Windows Server-based computer, including Remote Desktop Protocol (RDP) and Terminal Server logons. Symptoms reported by customers include but may not be limited to:
  • Cache size and location show zero or empty.
  • Keyboard shortcuts do not work correctly.
  • Webpages intermittently do not load or render correctly.
  • Issues affect credential notifications.
  • Issues occur when downloading files.
    | This issue is resolved in KB4493472.
    After installing this security update, Custom URI Schemes for Application Protocol handlers may not start the corresponding application for local intranet and trusted sites on Internet Explorer.| This issue is resolved in KB4493472.
    After installing this update, NETDOM.EXE fails to run, and the on-screen error, “The command failed to complete successfully.” appears.| This issue is resolved in KB4493472.
    After installing this update, some customers report that authentication fails for services that require unconstrained delegation after the Kerberos ticket expires (the default is 10 hours). For example, the SQL server service fails.| This issue is resolved in KB4499164.
    Any compound document (OLE) server application that places embedded objects into the Windows Metafile (WMF) using the PatBltAPI may display embedded objects incorrectly.For example, if you paste a Microsoft Excel worksheet object into a Microsoft Word document, the cells may render with a different background color.| This issue is resolved in KB4493472.

How to get this update

Before installing this updateMicrosoft strongly recommends you install the latest servicing stack update (SSU) for your operating system before installing the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. If you are using Windows Update, the latest SSU (KB4490628) will be offered to you automatically. To get the standalone package for the latest SSU, go to the Microsoft Update Catalog.Install this updateThis update will be downloaded and installed automatically from Windows Update. To get the standalone package for this update, go to the Microsoft Update Catalog website.File informationFor a list of the files that are provided in this update, download the file information for update 4489878.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.275 Low

EPSS

Percentile

96.7%