Microsoft Security Update Summary (January 14, 2020)

Windows Update[German]On January 14, 2020, Microsoft released security updates for Windows clients and servers, for Office, etc. Here is a compact overview of these updates.


Advertising

A list of the updates can be found on this Microsoft page. Details about the update packages for Windows, Office etc. are available in separate blog posts.

Servicing Stack Updates

Microsoft now publishes an overview of all current Servicing Stack Updates (SSUs). The list of SSUs can be found at ADV990001  (but is not always up to date).

Notes on updates

All Windows 10 updates are cumulative. The monthly patchday update includes all security fixes for Windows 10 and all non-security related fixes up to the patchday. In addition to the security patches for the vulnerabilities, the updates contain defense-in-depth updates to improve security.

The updates can also be downloaded from the Microsoft Update Catalog. The updates for Windows RT 8.1 and Microsoft Office RT are only available via Windows Update.

Information on the support period for Windows 10 can be found in the Windows Lifecycle Facts Sheet. Internet Explorer 11 is available on Windows Server 2012 since May 2019. This configuration is only available through the Cumulative Update for IE.


Advertising

For Windows 7 SP1 and Windows Server 2008/R2, an updated SHA-2 code signing update KB4474419 was released on October 8, 2019 (see this comment at askwoody.com). Extended Support for these operating systems will end on 01/14/2020 – and further updates will only be available for ESU program participants.

The January 2020 security updates cover 49 CVE vulnerabilities in Microsoft Windows, Internet Explorer (IE), Office and Office Services and Web applications, ASP.NET, .NET Core, .NET Framework, Modern Apps, and Microsoft Dynamics. From these vulnerabilities are listed eight listed with severity as Critical and 41 listed as Important. According to Microsoft, none of these vulnerabilities are publicly known or under active attack at the time of release. However, there have been some reports of an IE bug that is actively exploited but not yet fixed by an update. A list can be found in the blog of the Zero-Day-Initiative – Talos has also published a summary here (details will be covered separately in blog posts).

Critical Security Updates

Internet Explorer 11
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1709 for 32-bit Systems
Windows 10 Version 1709 for ARM64-based Systems
Windows 10 Version 1709 for x64-based Systems
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1903 for 32-bit Systems
Windows 10 Version 1903 for ARM64-based Systems
Windows 10 Version 1903 for x64-based Systems
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows 10 Version 1909 for x64-based Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows RT 8.1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core
installation)
Windows Server 2008 for Itanium-Based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core
installation)
Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core
installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server, version 1803  (Server Core Installation)
Windows Server, version 1903 (Server Core installation)
Windows Server, version 1909 (Server Core installation)
.NET Core 3.0
.NET Core 3.1
ASP.NET Core 2.1
ASP.NET Core 3.0
ASP.NET Core 3.1
Microsoft .NET Framework 3.0 Service Pack 2
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2
Microsoft .NET Framework 3.5 AND 4.7.1/4.7.2
Microsoft .NET Framework 3.5 AND 4.7.2
Microsoft .NET Framework 3.5 AND 4.8
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.5.2
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2
Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2
Microsoft .NET Framework 4.8

Important Security Updates

Dynamics 365 Field Service (on-premises) v7 series
Microsoft Excel 2010 Service Pack 2 (32-bit editions)
Microsoft Excel 2010 Service Pack 2 (64-bit editions)
Microsoft Excel 2013 RT Service Pack 1
Microsoft Excel 2013 Service Pack 1 (32-bit editions)
Microsoft Excel 2013 Service Pack 1 (64-bit editions)
Microsoft Excel 2016 (32-bit edition)
Microsoft Excel 2016 (64-bit edition)
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft Office 2013 RT Service Pack 1
Microsoft Office 2013 Service Pack 1 (32-bit editions)
Microsoft Office 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2016 (32-bit edition)
Microsoft Office 2016 (64-bit edition)
Microsoft Office 2016 for Mac
Microsoft Office 2019 for 32-bit editions
Microsoft Office 2019 for 64-bit editions
Microsoft Office 2019 for Mac
Office 365 ProPlus for 32-bit Systems
Office 365 ProPlus for 64-bit Systems
Office Online Server
OneDrive for Android

Low Security Updates

Internet Explorer 9
Internet Explorer 10

Similar articles:
Microsoft Office Patchday (January 7, 2020)
Microsoft Security Update Summary (January 14, 2020)
Patchday: Updates for Windows 7/8.1/Server (Jan. 14, 2020)


Advertising
This entry was posted in Office, Security, Software, Update, Windows and tagged , , , , . Bookmark the permalink.

5 Responses to Microsoft Security Update Summary (January 14, 2020)

  1. AthaAra says:

    while testing i had the error, that linked mssql tables dont work properly anymore. Fields that are auto increment int from sql are just linked as number and that causes various problems with queries and recordsets. i dont know if it is related to those updates but it happened just now. Anyone else encountered something similar?

    • Robert Richter says:

      is this reproducible? which versions do you use (OS, SQL Server) ?

      • AthaAra says:

        it is reproducable in therms of the problem still being there. Restarting and relinking didnt help. We are using win10, all updates are done. The SQL Server is not the problem. We had different PCs connecting to the same SQL Server. Some Access Versions seem to work, some dont. For now it looks like Runtime 2016/2013 and old Access2010 works fine. The installed full versions and click to run 2016 and 2019 cause the problem.

        • Robert Richter says:

          so you are trying to say that SQL Server works fine? Your problem seems to exist in Office Versions – ist that correct?
          I am asking because we are running SQL Servers 2014 and 2017 on Servers 2008R2/2012R2/2016, but we do not use Office. We are running our on software using SQL Server. As I saw your posting we stopped our planned updates to wait what’s going on.

          • AthaAra says:

            Yes the SQl Server works fine. The Problem just happens when linking the tables to Access. And only in Access the tables are broken, everything is unchanged in sql.

            For now i can say that the broken versions are the full versions mentioned above and the Runtime 2019.

            It is still working in Access 2010 and the Runtimes 2016/2013 both with and without updates.

Leave a Reply

Your email address will not be published. Required fields are marked *