Lucene search

K
mskbMicrosoftKB4507458
HistoryAug 06, 2019 - 7:00 a.m.

July 9, 2019—KB4507458 (OS Build 10240.18275)

2019-08-0607:00:00
Microsoft
support.microsoft.com
336
security
active directory
bitlocker
spectre variant 1
windows update
internet explorer
microsoft edge
mmc
calculator
windows server
microsoft scripting engine
windows storage
filesystems
microsoft graphics component
windows kernel
windows app platform
windows input
microsoft edge
known issues
cluster shared volume
window-eyes
jaws

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0.859

Percentile

98.7%

July 9, 2019—KB4507458 (OS Build 10240.18275)

For more information about the various types of Windows updates, such as critical, security, driver, service packs, etc., please see the following article.

July 19, 2019 - IMPORTANT: Beginning with the July 2019 updates, Active Directory domain controllers will intentionally block unconstrained delegation across forest, external, and quarantined trusts. Authentication requests for services that use unconstrained delegation over the listed trust types will fail when you request new tickets. Administrators should reconfigure the affected services to use resource-based constrained delegation. For more information, see KB4490425.

Highlights

  • Updates an issue with BitLocker encryption recovery mode.
  • Updates to improve security when using Internet Explorer, Microsoft Edge, wireless technologies, and Microsoft Office products.

Improvements and fixes

This update includes quality improvements. Key changes include:

  • Provides protections against a variant (CVE-2019-1125) of the Spectre Variant 1 speculative execution side channel vulnerability.
  • Addresses an issue that may display the error, “MMC has detected an error in a snap-in and will unload it.” when you try to expand, view, or create Custom Views in Event Viewer. Additionally, the application may stop responding or close. You may also receive the same error when usingFilter Current Login theAction menu with built-in views or logs.
  • Addresses an issue that prevents the Calculator application from following the Gannen setting when it is enabled. For more information, see KB4469068.
  • Addresses an issue that may cause BitLocker to go into recovery mode if BitLocker is being provisioned at the same time as updates are being installed.
  • Security updates to Windows Server, Microsoft Scripting Engine, Windows Storage and Filesystems, Microsoft Graphics Component, Internet Explorer, Windows Kernel, Windows App Platform and Frameworks, Windows Input and Composition, and Microsoft Edge.

If you installed earlier updates, only the new fixes contained in this package will be downloaded and installed on your device.For more information about the resolved security vulnerabilities, please refer to the Security Update Guide.

Windows Update Improvements Microsoft has released an update directly to the Windows Update client to improve reliability. Any device running Windows 10 configured to receive updates automatically from Windows Update, including Enterprise and Pro editions, will be offered the latest Windows 10 feature update based on device compatibility and Windows Update for Business deferral policy. This doesn’t apply to long-term servicing editions.

Known issues in this update

Symptom Workaround
Certain operations, such as rename , that you perform on files or folders that are on a Cluster Shared Volume (CSV) may fail with the error, “STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5)”. This occurs when you perform the operation on a CSV owner node from a process that doesn’t have administrator privilege. Do one of the following:
  • Perform the operation from a process that has administrator privilege.
  • Perform the operation from a node that doesn’t have CSV ownership.

Microsoft is working on a resolution and will provide an update in an upcoming release.
After installing this update, opening or using the Window-Eyes screen reader app may result in an error and some features may not function as expected.Note Users who have already migrated from Window-Eyes to Freedom Scientific’s other screen reader, JAWS, should not be affected by this issue.| This issue is resolved in KB4512497.

How to get this update

Before installing this update Microsoft strongly recommends that you install the latest servicing stack update (SSU) for your operating system before installing the latest cumulative update (LCU). SSUs improve the reliability of the update process to mitigate potential issues while installing the LCU and applying Microsoft security fixes. For more information, see Servicing stack updates.If you are using Windows Update, the latest SSU (KB4509090) will be offered to you automatically. To get the standalone package for the latest SSU, search for it in the Microsoft Update Catalog.Install this update****Release Channel Available Next Step
Windows Update and Microsoft Update Yes None. This update will be downloaded and installed automatically from Windows Update.
Microsoft Update Catalog Yes To get the standalone package for this update, go to the Microsoft Update Catalog website.
Windows Server Update Services (WSUS) Yes This update will automatically synchronize with WSUS if you configure Products and Classifications as follows:Product : Windows 10Classification : Security Updates File information For a list of the files that are provided in this update, download the file information for cumulative update 4507458.

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.6

Confidence

High

EPSS

0.859

Percentile

98.7%