June 11, 2019—KB4503273 (Monthly Rollup)

2019-08-19T19:05:04
ID KB4503273
Type mskb
Reporter Microsoft
Modified 2019-08-19T19:05:56

Description

<html><body><p>Learn more about update KB4503273, including improvements and fixes, any known issues, and how to get the update.</p><h2></h2><div class="alert-band"><div class="alert alert-info" role="alert"><div class="row"><div class="col-xs-24"><p><span><span><span><span>Customers who have applied KB4489887 or later Monthly Rollup Packages </span></span><span>to Microsoft Server 2008 SP2 may notice a change to the operating system version string. The “build number” component of the version string increases by 1, and the revision number decreases by approximately 4000 numbers. To find out more about this change please refer to the following <a data-content-id="4495374" data-content-type="article" href="" managed-link="">article</a>.</span></span></span></p></div></div></div></div><h2>Improvements and fixes</h2><div><p>This security update includes improvements and fixes that were a part of update <a data-content-id="4499184" data-content-type="article" href="" managed-link="">KB4499184</a> (released May 23, 2019) and addresses the following issues:</p><ul><li>Provides protections against a new subclass of speculative execution side-channel vulnerabilities, known as <em>Microarchitectural Data Sampling</em>, for 64-Bit (x64) versions of Windows (<a data-content-id="" data-content-type="" href="https://portal.msrc.microsoft.com/{lang-locale}/security-guidance/advisory/adv190013" managed-link="" originalsrc="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv190013" shash="YAe7iTID7gTAlEI+1QT/6qfMZcY7LB8fxMjCpx/tjHfdrwOsTscfgbdd4vYMm9PR+uhB6N22KdlFpmkhY0MzoeeYx4NDcvIfRhTSm0Xg5Ar15yMNpRLiyq9ER21bIsups77tJIXh169s5/iEFu3K7zLLOiPi8/VfQeyP2qcg3As=" target="_blank">CVE-2019-11091</a>,<a data-content-id="" data-content-type="" href="https://portal.msrc.microsoft.com/{lang-locale}/security-guidance/advisory/adv190013" managed-link="" originalsrc="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv190013" shash="YAe7iTID7gTAlEI+1QT/6qfMZcY7LB8fxMjCpx/tjHfdrwOsTscfgbdd4vYMm9PR+uhB6N22KdlFpmkhY0MzoeeYx4NDcvIfRhTSm0Xg5Ar15yMNpRLiyq9ER21bIsups77tJIXh169s5/iEFu3K7zLLOiPi8/VfQeyP2qcg3As=" target="_blank"> CVE-2018-12126</a>, <a data-content-id="" data-content-type="" href="https://portal.msrc.microsoft.com/{lang-locale}/security-guidance/advisory/adv190013" managed-link="" originalsrc="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv190013" shash="E4IX6mlyH5NLx24b7VuUahrq9c7NkXBibJnG5QpRn/HZKzz5UIdWB9MqMYep129QrYa0uQClNjDeAwm+l3B75yPmvED8K2cvvnKh5uf7sNmfHjP2e4YRb9r6x5ErNCYfWt1jnXOuZ2FrmRQkAy+Ll/3cPkNmhAkY8t8U8OV/Bw4=" target="_blank">CVE-2018-12127</a>, <a data-content-id="" data-content-type="" href="https://portal.msrc.microsoft.com/{lang-locale}/security-guidance/advisory/adv190013" managed-link="" originalsrc="https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv190013" shash="E4IX6mlyH5NLx24b7VuUahrq9c7NkXBibJnG5QpRn/HZKzz5UIdWB9MqMYep129QrYa0uQClNjDeAwm+l3B75yPmvED8K2cvvnKh5uf7sNmfHjP2e4YRb9r6x5ErNCYfWt1jnXOuZ2FrmRQkAy+Ll/3cPkNmhAkY8t8U8OV/Bw4=" target="_blank">CVE-2018-12130</a>). Use the registry settings as described in the <a data-content-id="" data-content-type="" href="https://support.microsoft.com/{lang-locale}/help/4072698/windows-server-speculative-execution-side-channel-vulnerabilities-prot" managed-link="" originalsrc="https://support.microsoft.com/en-us/help/4072698/windows-server-speculative-execution-side-channel-vulnerabilities-prot" shash="cgZ6fxMrQXl5WDKOS9UeiMKo1aOk6N/CLx43s1XLy1TzMAWUeHnq1Kp14OPeyoPe8tRI/5Zhihlc3cV7XL/RZpnWOskkEJcBmZvtkjnvqvPYNC3uJiWgsi/SzHvsx6mI8RcVh69zn+MmkO9QFVvOdgVHRRg2gjP90PvPeesgDM8=" target="_blank">Windows Server</a> article<em>. </em>(These registry settings are disabled by default for Windows Server OS editions).</li><li>Security updates to Windows App Platform and Frameworks, Windows Input and Composition, Windows Shell, Windows Server, Windows Authentication, Windows Datacenter Networking, Windows Storage and Filesystems, Windows Virtualization, Windows Kernel, Internet Information Services, Windows Server, and the Microsoft JET Database Engine.</li></ul><p>For more information about the resolved security vulnerabilities, please refer to the <a data-content-id="" data-content-type="" href="https://portal.msrc.microsoft.com/security-guidance" managed-link="" target="_blank">Security Update Guide</a>.</p></div><h2>Known issues in this update</h2><table class="table"><tbody><tr><td>Symptom</td><td>Workaround</td></tr><tr><td>Internet Explorer 11 may stop working when loading or interacting with Power BI reports that have line charts with markers. This issue may also occur when viewing other content that contains Scalable Vector Graphics (SVG) markers.</td><td><p>This issue is resolved in <a data-content-id="4503271" data-content-type="article" href="" managed-link="" target="_blank">KB4503271</a>.</p></td></tr><tr><td>When trying to expand, view, or create <strong>Custom Views </strong>in Event Viewer, you may receive the error, "MMC has detected an error in a snap-in and will unload it." and the app may stop responding or close. You may also receive the same error when using <strong>Filter Current Log </strong>in the <strong>Action </strong>menu with built-in views or logs. Built-in views and other features of Event Viewer should work as expected.</td><td><p>This issue is resolved in <a data-content-id="4503271" data-content-type="article" href="" managed-link="" target="_blank">KB4503271</a>.</p></td></tr><tr><td>Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error "Status: 0xc0000001, Info: A required device isn't connected or can't be accessed" after installing this update on a WDS server.</td><td><p>This issue is resolved in <a data-content-id="4512499" data-content-type="article" href="" managed-link="" target="_blank">KB4512499</a>.</p></td></tr></tbody></table><p> </p><h2>How to get this update</h2><div><p><strong>Before installing this update</strong></p><p>Microsoft strongly recommends you install the latest servicing stack update (SSU) for your operating system before installing the latest Rollup. SSUs improve the reliability of the update process to mitigate potential issues while installing the Rollup and applying Microsoft security fixes. </p><p>If you are using Windows Update, the latest SSU (<a data-content-id="4493730" data-content-type="article" href="" managed-link="" target="">KB4493730</a>) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the <a aria-live="assertive" data-bi-name="content-anchor-link" data-content-id="" data-content-type="" href="http://www.catalog.update.microsoft.com/home.aspx" managed-link="" tabindex="0" target="_blank">Microsoft Update Catalog</a>. </p><p><strong>Install this update</strong></p><p>This update will be downloaded and installed automatically from Windows Update. To get the standalone package for this update, go to the <a data-content-id="" data-content-type="" href="http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4503273" managed-link="" target="_blank">Microsoft Update Catalog</a> website.</p><p><strong>File information</strong></p><p>For a list of the files that are provided in this update, download the <a data-bi-name="content-anchor-link" data-content-id="" data-content-type="" href="http://download.microsoft.com/download/A/A/D/AADEFFA5-FD28-4AC4-93C6-3A28586CA88D/4503273.csv" managed-link="" tabindex="0" target="_blank">file information for update 4503273</a>. </p></div></body></html>