Skip to content
ProVal Technologies
407-588-0101
Facebook Twitter Instagram Linkedin Youtube
  • Home
  • Company
    • ProVal’s Journey
    • Approach
    • Culture & Values
    • Our Team
  • NOC SERVICES FOR MSPS
    • ConnectWise
      • ConnectWise Automate
      • ConnectWise RMM
      • ConnectWise Manage PSA
    • Kaseya
      • Kaseya VSA
      • Datto RMM
    • Managed Backups
    • 24×7 Monitoring
  • Careers
  • Resources
    • MSP Blogs
    • Your Tools. Our Experts.
    • MSP Webinars
    • Testimonials
  • Contact Us
  • Client Portal
Menu
  • Home
  • Company
    • ProVal’s Journey
    • Approach
    • Culture & Values
    • Our Team
  • NOC SERVICES FOR MSPS
    • ConnectWise
      • ConnectWise Automate
      • ConnectWise RMM
      • ConnectWise Manage PSA
    • Kaseya
      • Kaseya VSA
      • Datto RMM
    • Managed Backups
    • 24×7 Monitoring
  • Careers
  • Resources
    • MSP Blogs
    • Your Tools. Our Experts.
    • MSP Webinars
    • Testimonials
  • Contact Us
  • Client Portal

Microsoft Security Updates: March 2019

  • March 13, 2019
  • ProVal Technologies, Inc
  • Microsoft Security Updates
  • patching
Microsoft Patch notes

This month’s Patch Tuesday addresses 65 vulnerabilities, with 18 of them labeled as Critical. Thirteen of the Critical vulns are for scripting engines and browser components, impacting Microsoft browsers and Office. Three remote code execution (RCE) vulnerabilities are patched in the Windows DHCP Client, as well as an RCE vuln in Windows Deployment Services TFTP Server and Privilege Escalation in Microsoft Dynamics 365. Adobe’s release is light, with only two CVEs patched in Photoshop CC and Digital Editions.

Workstation Patches

Browser, Scripting Engine, ActiveX, and MSXML patches should be prioritized for workstation-type devices, meaning any system that is used for email or to access the internet via a browser. This includes multi-user servers that are used as remote desktops for users.

Windows DHCP Client

The Windows DHCP Client is used across workstations and servers. Deployment of patches to cover the three RCE vulnerabilities should be prioritized for all Windows systems.

Windows Deployment Services TFTP Server

If you are using Windows Deployment Services, this patch should be prioritized, as exploitation could lead to remote code execution on the affected host.

Microsoft Dynamics 365

On-prem deployments of Microsoft Dynamics 365 are vulnerable to privilege escalation, and patching for these systems should also be prioritized.

Microsoft Advisories

Microsoft also released three advisories that cover a few topics:

  • ADV190009 announces SHA-2 Code Sign support for Windows 7 SP1 and Windows Server 2008 R2. This update will be required for any new patches released after July 2019. Older versions of WSUS should also be updated to distribute the new SHA-2 signed patches.
  • ADV190010 gives guidance on sharing the same user account across multiple users. Microsoft discourages this behavior and considers it a major security risk.
  • ADV190005 provides mitigations for a potential denial-of-service in http.sys when receiving HTTP/2 requests. The patch allows users to set a limit on how many SETTINGS parameters can be sent in a single request.

Adobe

Adobe released non-security patches for Flash, as well as Critical security patches for Photoshop CC and Digital Editions, each with one vulnerability.

Executive Summary

  • Microsoft released security products for all client and server based versions of Windows that it supports.
  • The company released security updates for the following products next to that: Internet Explorer, Microsoft Edge, Microsoft Office and SharePoint, Skype for Business, Team Foundation Server, Visual Studio, and NuGet.
  • Microsoft released SHA-2 Code sign support for Windows 7 SP1 and Windows Server 2008 R2 SP1 as a security update.

Operating System Distribution

  • Windows 7: 21 vulnerabilities of which 3 are rated critical and 18 are rated important.
    • Same as Windows 10 version 1607
  • Windows 8.1: 20 vulnerabilities of which 3 are rated critical and 17 are rated important.
    • Same as Windows 10 version 1607
  • Windows 10 version 1607:  24 vulnerabilities of which 3 are critical and 21 are important
    • CVE-2019-0603 | Windows Deployment Services TFTP Server Remote Code Execution Vulnerability
    • Same as Windows 10 version 1709
  • Windows 10 version 1703:  24 vulnerabilities of which 2 are critical and 22 are important
    • Same as Windows 10 version 1709
  • Windows 10 version 1709: 28 vulnerabilities of which 2 are critical and 26 are important
    • CVE-2019-0756 | MS XML Remote Code Execution Vulnerability
    • CVE-2019-0784 | Windows ActiveX Remote Code Execution Vulnerability
  • Windows 10 version 1803: 33 vulnerabilities of which 6 are critical and 27 are important
    • same as Windows 10 version 1809
  • Windows 10 version 1809: 33 vulnerabilities of which 6 are critical and 27 are important
    • CVE-2019-0603 | Windows Deployment Services TFTP Server Remote Code Execution Vulnerability
    • CVE-2019-0697 | Windows DHCP Client Remote Code Execution Vulnerability
    • CVE-2019-0698 | Windows DHCP Client Remote Code Execution Vulnerability
    • CVE-2019-0726 | Windows DHCP Client Remote Code Execution Vulnerability
    • CVE-2019-0756 | MS XML Remote Code Execution Vulnerability
    • CVE-2019-0784 | Windows ActiveX Remote Code Execution Vulnerability

Windows Server products

  • Windows Server 2008 R2: 21 vulnerabilities of which 3 are critical and 17 are important.
    • Same as Windows Server 2016.
  • Windows Server 2012 R2: 20 vulnerabilities of which 3 are critical and 17 are important.
    • Same as Windows Server 2016.
  • Windows Server 2016: 24 vulnerabilities of which 3 are critical and 21 are important.
    • CVE-2019-0603 | Windows Deployment Services TFTP Server Remote Code Execution Vulnerability
    • CVE-2019-0756 | MS XML Remote Code Execution Vulnerability
    • CVE-2019-0784 | Windows ActiveX Remote Code Execution Vulnerability
  • Windows Server 2019: 33 vulnerabilities of which 5 are critical and 27 are important.
    • CVE-2019-0603 | Windows Deployment Services TFTP Server Remote Code Execution Vulnerability
    • CVE-2019-0697 | Windows DHCP Client Remote Code Execution Vulnerability
    • CVE-2019-0698 | Windows DHCP Client Remote Code Execution Vulnerability
    • CVE-2019-0726 | Windows DHCP Client Remote Code Execution Vulnerability
    • CVE-2019-0756 | MS XML Remote Code Execution Vulnerability
    • CVE-2019-0784 | Windows ActiveX Remote Code Execution Vulnerability

Other Microsoft Products

  • Internet Explorer 11: 14 vulnerability, 4 critical, 10 important
  • Microsoft Edge: 14 vulnerabilities, 7 critical, 7 important

Known Issues

4489878 Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Monthly Rollup) AND

4489885 Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1 (Security-only update) AND

4489884 Windows Server 2012 (Security-only update) AND

4489891 Windows Server 2012 (Monthly Rollup)

  • Internet Explorer 10 may have authentication issues
    • Create unique user accounts to avoid same user account sharing and resolve the issue.

4489881 Windows 8.1, Windows Server 2012 R2 (Monthly Rollup) AND

4489883 Windows 8.1, Windows Server 2012 R2 (Security-only update)

  • IE11 may have authentication issues.

4489882 Windows 10 version 1607, Windows Server 2016

  • System Center Virtual Machine Manager managed hosts cannot “enumerate and manage logical switches”.
    • Run mofcomp on Scvmmswitchportsettings.mof and VMMDHCPSvr.mof
  • Cluster service may fail with error “2245 (NERR_PasswordTooShort)”.
    • Set the Minimum Password Length policy to less or equal to 14 characters.
  • IE11 may have authentication issues.

4489899 Windows 10 version 1809, Windows Server 2019

  • IE11 may have authentication issues.
  • Output devices may stop working on devices with multiple audio devices. Affected applications include Windows Media Player, Sound Blaster Control Panel, and Realtek HD Audio Manager.
    • Temporary workaround: set the output device to default.

Direct update downloads

Cumulative updates that Microsoft releases as well as other updates get uploaded to the Microsoft Update Catalog website.

You find links to all cumulative updates for client and server versions of Microsoft Windows.

Windows 7 SP1 and Windows Server 2008 R2 SP

  • KB4489878— 2019-03 Security Monthly Quality Rollup for Windows 7
  • KB4489885— 2019-03 Security Only Quality Update for Windows 7

Windows 8.1 and Windows Server 2012 R2

  • KB4489881— 2019-03 Security Monthly Quality Rollup for Windows 8.1
  • KB4489883— 2019-03 Security Only Quality Update for Windows 8.1

Windows 10 and Windows Server 2016 (version 1607)

  • KB4489882— 2019-03 Cumulative Update for Windows 10 Version 1607

Windows 10 (version 1703)

  • KB4489871 — 2019-03 Cumulative Update for Windows 10 Version 1703

Windows 10 (version 1709)

  • KB4489886— 2019-03 Cumulative Update for Windows 10 Version 1709

Windows 10 (version 1803)

  • KB4489868— 2019-03 Cumulative Update for Windows 10 Version 1803

Windows 10 (version 1809)

  • KB4489899 — 2019-03 Cumulative Update for Windows 10 Version 1809
ProVal Technologies, Inc

ProVal Technologies, Inc

PrevPreviousFacing a Challenge, Automation within Kaseya is the Key
NextKaseya Software Management ModuleNext

Categories

Labtech
  • Mac Agent Functionality Within ConnectWise Automate
  • ConnectWise RMM vs Automate: Should I be using CW RMM?
  • ConnectWise Automate on Linux – Best Practices
  • ConnectWise Automate Maintenance Mode Explained Best Practice
  • Uninstalling and Offboarding Automate Agents
  • How to Set Up Automate users to use ConnectWise SSO
  • Windows 10 Build Upgrades are Inevitable – Use Kaseya/ConnectWise Automate to Deploy
  • Best Practice Naming of Patching Groups
  • Automate 12 Patch 9 Now Available!
  • 5 Tips for using the Report Center
  • See All Labtech Posts
Business Continuity
  • See All Business Continuity Posts
Proactive Maintenance
  • See All Proactive Maintenance Posts
Kaseya
  • What Should I be Automating in Kaseya VSA 9.5?
  • Security Best Practices for Kaseya VSA
  • Kaseya VSA: Software Management vs. Patch Management
  • Software Management Enhancements
  • Two-Factor Authentication in Kaseya VSA
  • Windows 7 & Windows 10 Multiple Builds End of Life – Upgrade Using Kaseya or ConnectWise Automate
  • Kaseya Network Monitor: Benefits & Features
  • Kaseya Patch 9.5.0.22 and Future Updates
  • Kaseya’s New State-of-the-Art Contemporary User Interface
  • Kaseya Product Release – April ’19
  • See All Kaseya Posts
Datto
  • Creating & Implementing a Disaster Recovery Plan
  • Disaster Recovery – Minimizing Impact of Downtime
  • Updating a Datto Device
  • Datto Agent Communication Errors
  • Datto
  • See All Datto Posts
StorageCraft
  • See All StorageCraft Posts

Get in touch today for MSP NOC Services

Contact Us

ProVal Technologies, Inc

498 Palm Springs Drive, Ste. 130
Altamonte Springs, FL 32701
United States
Phone: 407-588-0101

Facebook Twitter Instagram Linkedin Youtube
SOC 2 Certified Logo
Form CTA

©2023 ProVal Technologies, Inc All Rights Reserved.

Privacy Policy – Disclaimer

Microsoft Security Updates: March 2019

Microsoft Patch notes

I truly view ProVal as a partner and extension of my team, not as one of my vendors

When our NOC Manager left last fall we wanted to replace the position with an outsourced NOC to reduce headcount, and bring in an expert to both Labtech and our backup solutions. Bringing in ProVal Technologies was one of the best decisions we made last year and has paid for itself.During our first few monthly recurring Labtech admin meetings the ProVal team discovered incorrect settings and policies that were not applying correctly in our Labtech server. Things that we thought were automated and working were not. For example, there were multiple scripts and policies running but set to do nothing such as disk cleanup scripts. Cisco Umbrella was not configured correctly. Server alerting was not set right and the list went on.The backup team sends daily and weekly reports and updates that reduce my technicians time that we used to spend on backup or antivirus tickets that took forever and were tedious.ProVal also brings in great insights to our business and really cares about our success. They will frequently mention to me in meetings what new scripts they can import to make us more efficient or will schedule upgrades to our backups, Labtech, etc so I don’t have to worry. I truly view ProVal as a partner and extension of my team not as one of my vendors.

Chris-Warnick-Headshot
Chris Warnick
Vision Computer Solutions
Northville, MI

They will quickly become an extension of your team and your ROI will reflect the results

We have been a long time user of Labtech and had tried for many years to manage the product internally with no real success at the level we needed to make our solutions more efficient for our customers. Once we hired Vikram and his team at ProVal, it solved all our pain points with the product and we really felt like we were leveraging the tool as it was designed. If this sounds like you and it’s keeping you up at night, then you need these guys. They will quickly become an extension of your team and your ROI will reflect the results.

Bryan-Wolff-Headshot
Bryan Wolff
CEO, Wolff Logics LT Managed & Admin Services
Cedar Park, Texas

They work well, fast and on budget

We met Vikram from ProVal Tech at Gary Pica’s Shnizzfest a year ago. Vikram explained the advantage of having trained, certified personnel take care of our recent Automate implementation. Even though we had taken an implementation package from ConnectWise to start up the program, we felt many custom configurations we needed for our business were lacking. We hired ProVal Tech after Automate was installed to help us with this task. From sales to technicians everyone was professional and knowledgeable. Onboarding was simple, and well documented. Tools on the web were supplied while we did the work, and they allowed us to track what was done, and see the improvements in the environment. It was easy to reach any of the team members, for any concern or question – all answered with courtesy and smile. Once the work was finished, we were given some training and explanations, add to that documentation, about the work and the scripts and features added to the program. We have been happily working with Automate since then. We can only recommend this efficient team of people for any work into Automate: they work well, fast and on budget.

Ben-Prevost-Headshot
Ben Prevost
FarWeb IT
Sherbrooke, Canada