Microsoft Windows Updates, January 8, 2019 (1)

Microsoft has published updates for supported versions of Windows. Windows 10 and Windows Server 2019 have update but there is no new feature. Windows Server 2016, 2012 R2, 2012 and 2008 also have same situation. Let’s review that what is fixed in the new updates at January 8, 2019.

Windows Server 2019 and Windows Server 2016 have updates with same fixes and improvements. Also other Windows Server versions have same. Microsoft fixes same security and functionality issues on all these version.

Windows Server 2019

KB4480116
Release Date: January 8, 2019
Version: OS Build 17763.253

This update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:

  • Addresses a security vulnerability in session isolation that affects PowerShell remote endpoints. By default, PowerShell remoting only works with administrator accounts, but can be configured to work with non-administrator accounts. Starting with this release, you cannot configure PowerShell remote endpoints to work with non-administrator accounts. When attempting to use a non-administrator account, the following error will appear:“New-PSSession: [computerName] Connecting to remote server localhost failed with the following error message: The WSMan service could not launch a host process to process the given request. Make sure the WSMan provider host server and proxy are properly registered. For more information, see the about_Remote_Troubleshooting Help topic.”
  • Addresses an issue in which using esentutl /p to repair a corrupt Extensible Storage Engine (ESE) database results in a mostly empty database. The ESE database is corrupted and cannot be mounted.
  • Security updates to Microsoft Edge, Internet Explorer, Windows App Platform and Frameworks, Windows MSXML, Windows Kernel, Windows Storage and Filesystems, Windows Wireless Networking, Microsoft JET Database Engine, Windows Linux, Windows Virtualization, and the Microsoft Scripting Engine.

2019-01 Cumulative Update for Windows Server 2019 for x64-based Systems (KB4480116)


windows10.0-kb4480116-x64_4c8672ed7ce1d839421a36c681f9d3f64c31fe37.msu

Windows Server 2016

KB4480961
Release Date: January 8, 2019
Version: OS Build 14393.2724

This update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:

  • Addresses a security vulnerability in session isolation that affects PowerShell remote endpoints. By default, PowerShell remoting only works with administrator accounts, but can be configured to work with non-administrator accounts. Starting with this release, you cannot configure PowerShell remote endpoints to work with non-administrator accounts. When attempting to use a non-administrator account, the following error will appear:“New-PSSession: [computerName] Connecting to remote server localhost failed with the following error message: The WSMan service could not launch a host process to process the given request. Make sure the WSMan provider host server and proxy are properly registered. For more information, see the about_Remote_Troubleshooting Help topic.”
  • Addresses an issue that may prevent the cluster service from starting if the Group Policy “Minimum Password Length” is configured with greater than 14 characters. The error is, “2245 (NERR_PasswordTooShort)”.
  • Security updates to Internet Explorer, Windows App Platform and Frameworks, the Microsoft Scripting Engine, Windows Kernel, Windows Hyper-V, Windows MSXML, and the Microsoft JET Database Engine.

2019-01 Cumulative Update for Windows Server 2016 for x64-based Systems (KB4480961)


windows10.0-kb4480961-x64_ada63f8d66b2c9994e03c3f5bffe56aff77edeb6.msu

Windows Server 2012 R2

KB4480963
Release Date: January 8, 2019
Version: Monthly Rollup

This security update addresses the following issues:

  • Provides protections against an additional subclass of speculative execution side-channel vulnerability known as Speculative Store Bypass (CVE-2018-3639) for AMD-based computers. These protections aren’t enabled by default. For Windows client (IT pro) guidance, follow the instructions in KB4073119. For Windows Server guidance,follow the instructions in KB4072698. Use these guidance documents to enable mitigations for Speculative Store Bypass (CVE-2018-3639). Additionally, use the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).
  • Addresses a security vulnerability in session isolation that affects PowerShell remote endpoints. By default, PowerShell remoting only works with administrator accounts, but can be configured to work with non-administrator accounts. Starting with this release, you cannot configure PowerShell remote endpoints to work with non-administrator accounts. When attempting to use a non-administrator account, the following error will appear:“New-PSSession: [computerName] Connecting to remote server localhost failed with the following error message: The WSMan service could not launch a host process to process the given request. Make sure the WSMan provider host server and proxy are properly registered. For more information, see the about_Remote_Troubleshooting Help topic.”
  • Security updates to Windows App Platform and Frameworks, Windows MSXML, Windows Kernel, Windows Storage and Filesystems, Windows Wireless Networking, and the Microsoft JET Database Engine.

2019-01 Security Monthly Quality Rollup for Windows Server 2012 R2 for x64-based Systems (KB4480963)


windows8.1-kb4480963-x64_e603973094e2c31c82847884396d1f0f2a30cdaf.msu

Window Server 2012

KB4480975
Release Date: January 8, 2019
Version: Monthly Rollup

This security update addresses the following issues:

  • Provides protections against an additional subclass of speculative execution side-channel vulnerability known as Speculative Store Bypass (CVE-2018-3639) for AMD-based computers. These protections aren’t enabled by default. For Windows Server guidance,follow the instructions in KB4072698. Use this guidance document to enable mitigations for Speculative Store Bypass (CVE-2018-3639). Additionally, use the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).
  • Addresses a security vulnerability in session isolation that affects PowerShell remote endpoints. By default, PowerShell remoting only works with administrator accounts, but can be configured to work with non-administrator accounts. Starting with this release, you cannot configure PowerShell remote endpoints to work with non-administrator accounts. When attempting to use a non-administrator account, the following error will appear:“New-PSSession: [computerName] Connecting to remote server localhost failed with the following error message: The WSMan service could not launch a host process to process the given request. Make sure the WSMan provider host server and proxy are properly registered. For more information, see the about_Remote_Troubleshooting Help topic.”
  • Security updates to Windows App Platform and Frameworks, Windows MSXML, Windows Kernel, Windows Storage and Filesystems, Windows Wireless Networking, and the Microsoft JET Database Engine.

2019-01 Security Monthly Quality Rollup for Windows Server 2012 for x64-based Systems (KB4480975)


windows8-rt-kb4480975-x64_f85d442486290771e32eecd8696207fd5f3fd69c.msu

Windows Server 2008 R2 SP1

KB4480970
Release Date: January 8, 2019
Version: Monthly Rollup

This security update addresses the following issues:

  • Provides protections against an additional subclass of speculative execution side-channel vulnerability known as Speculative Store Bypass (CVE-2018-3639) for AMD-based computers. These protections aren’t enabled by default. For Windows client (IT pro) guidance, follow the instructions in KB4073119. For Windows Server guidance,follow the instructions in KB4072698. Use these guidance documents to enable mitigations for Speculative Store Bypass (CVE-2018-3639). Additionally, use the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).
  • Addresses a security vulnerability in session isolation that affects PowerShell remote endpoints. By default, PowerShell remoting only works with administrator accounts, but can be configured to work with non-administrator accounts. Starting with this release, you cannot configure PowerShell remote endpoints to work with non-administrator accounts. When attempting to use a non-administrator account, the following error will appear:“New-PSSession: [computerName] Connecting to remote server localhost failed with the following error message: The WSMan service could not launch a host process to process the given request. Make sure the WSMan provider host server and proxy are properly registered. For more information, see the about_Remote_Troubleshooting Help topic.”
  • Security updates to Windows Kernel, Windows Storage and Filesystems, Windows Wireless Networking, and the Microsoft JET Database Engine.

2019-01 Security Monthly Quality Rollup for Windows Server 2008 R2 for x64-based Systems (KB4480970)


pciclearstalecache_d184a72109a380c13f3e70c14abacd0a01b3f5fd.exewindows6.1-kb4480970-x64_a97919028931dcf220036af7c582a37f83f0d819.msu

Windows Server 2008 SP2

KB4480957
Release Date: January 8, 2019
Version: Security-only update

This security update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:

  • Provides protections against an additional subclass of speculative execution side-channel vulnerability known as Speculative Store Bypass (CVE-2018-3639) for AMD-based computers. These protections aren’t enabled by default. For Windows Server guidance,follow the instructions in KB4072698. Use this guidance document to enable mitigations for Speculative Store Bypass (CVE-2018-3639). Additionally, use the mitigations that have already been released for Spectre Variant 2 (CVE-2017-5715) and Meltdown (CVE-2017-5754).
  • Addresses a security vulnerability in session isolation that affects PowerShell remote endpoints. By default, PowerShell remoting only works with administrator accounts, but can be configured to work with non-administrator accounts. Starting with this release, you cannot configure PowerShell remote endpoints to work with non-administrator accounts. When attempting to use a non-administrator account, the following error will appear:“New-PSSession: [computerName] Connecting to remote server localhost failed with the following error message: The WSMan service could not launch a host process to process the given request. Make sure the WSMan provider host server and proxy are properly registered. For more information, see the about_Remote_Troubleshooting Help topic.”
  • Security updates to Windows Kernel, Windows Storage and Filesystems, Windows Wireless Networking, and the Microsoft JET Database Engine.

2019-01 Security Only Quality Update for Windows Server 2008 for x64-based Systems (KB4480957)


windows6.0-kb4480957-x64_8c0ed0c128d2cfa5f8c3a6723e2efd4f4bf49748.msu

2019-01 Security Only Quality Update for Windows Server 2008 for x86-based Systems (KB4480957)


windows6.0-kb4480957-x86_79221a5a420b6de52d71a24fe8b0c356dff605a9.msu

See Also

Microsoft Windows Updates – December 2018 (1)

What’s New Windows Server 2019

[Review]: Performance Tuning Guidelines for Windows Server 2016

Microsoft Security Compliance Toolkit 1.0

137 total views, 6 views today

Microsoft Windows Updates, January 8, 2019 (1)
4 (80%) 1 Votes

Davoud Teimouri

Davoud Teimouri is as a professional blogger, vExpert 2015/2016/2017/2018, VCA, MCITP. This blog is started with simple posts and now, it has large following readers.

Leave a Reply

Your email address will not be published. Required fields are marked *