Microsoft Word

Microsoft Provides a Workaround for KB4011730 that Breaks Word While it Works on a Fix

In the batch of updates that Microsoft has delivered this month so far, there have been many reported issues. One of those affects Microsoft Word 2016. See: Tracking: KB4011730 Might Break Word 2016. Microsoft has now admitted to being aware of the issue and is working on a fix. In the interim, the company has provided a workaround that involves installing another update. That update is the March 6, 2018, update for Office 2016 (KB4018295). According to the support document released for this issue, the problem only affects those copies of Word 2016 that were installed using MSI technology. It does not affect Click-to-Run editions of Office.   Looking for an awesome, no-nonsense technical conference for IT Pros, Developers, and DevOps? IT/Dev Connections kicks off in Dallas, Texas in 2...

Tracking: KB4011730 Might Break Word 2016

UPDATED March 19, 2018: Microsoft is now aware of this issue and has provided a workaround while developing a full fix. Original article… One of the updates delivered for Patch Tuesday seems to be causing fits for Microsoft Word 2016. After installing, customers have reported they can’t open Word documents by double-clicking on them. So far, uninstalling the update seems to be the most current fix. We’ll be tracking updates to this issue, so stay tuned. Microsoft forums thread: KB4011730 breaks Word 2016     Looking for an awesome, no-nonsense technical conference for IT Pros, Developers, and DevOps? IT/Dev Connections kicks off in Dallas, Texas in 2018!

KB4011039 Causes Disappearing Text, Says Fix Won’t Come Until Next Month

Microsoft is admitting to a mistake in KB4011039 where the only fix right now is to uninstall the update. The update causes the following to occur… If you merge vertical cells in a table, the cell content disappears, and you can’t select the merged cell. If you open an existing document that has a table with merged cells, the cells are displayed as blank.   Microsoft says a fix won’t come until October’s patch cycle: We anticipate releasing the fix for these issues in the next monthly update that’s tentatively scheduled for October 3, 2017. Looking for an awesome, no-nonsense technical conference for IT Pros, Developers, and DevOps? IT/Dev Connections kicks off in San Francisco in 2017!

Microsoft Garage Brings Cortana Dictation to Office with Dictate

Microsoft Garage has released a new add-in for Microsoft Outlook, Word and PowerPoint that uses the speech recognition behind Cortana to convert speech to text. Called Dictate, the add-in supports 20 languages for dictation and 60 languages for real-time translations. Dictate is available now for Windows 8.1 or later, Office 2013 or later, and .Net Framework 4.5.0 or later. Get it here: Dictate Looking for an awesome, no-nonsense technical conference for IT Pros, Developers, and DevOps? IT/Dev Connections kicks off in San Francisco in 2017!

Microsoft Plugs Open Hole in Word that Was Being Actively Exploited

To close the loop, the zero-day Word vulnerability we reported just a day ago in, Zero-day Word Vulnerability Attacks Spotted in the Wild, Microsoft has now resolved the exploit in the April Patch Tuesday updates. The fix is this one: Description of the security update for Office 2010: April 11, 2017 (KB3141538) Looking for an awesome, no-nonsense technical conference for IT Pros, Developers, and DevOps? IT/Dev Connections kicks off in San Francisco in 2017!

Zero-day Word Vulnerability Attacks Spotted in the Wild

Late last week, McAfee (who is recently separated from Intel) identified and reported a zero-day flaw in Microsoft Word that allows attackers to take advantage of vulnerabilities in .doc files. This problem affects all versions of Word and Windows – including the latest versions of Office 2016 and Windows 10. Then, on Saturday, FireEYE confirmed the flaw on its own blogs: Acknowledgement of Attacks Leveraging Microsoft Zero-Day FireEYE says… The attack involves a threat actor emailing a Microsoft Word document to a targeted user with an embedded OLE2link object. When the user opens the document, winword.exe issues a HTTP request to a remote server to retrieve a malicious .hta file, which appears as a fake RTF file. The Microsoft HTA application loads and executes the malicious ...