Microsoft's suggested workaround for Internet Explorer vulnerability breaks printing
We're still waiting for Microsoft to release a patch for the actively exploited security vulnerability in Internet Explorer -- at least for those who will receive it. In the meantime, the company suggested a workaround which involved restricting access to JScript.dll, acknowledging that this might lead to certain problems.
But it seems that the company underestimated the negative impact the workaround could have. In addition to problems with services that rely on JScript.dll or PAC scripts, users are also experiencing problems with printing.
See also:
- Microsoft pledges to patch Internet Explorer bug that is being actively exploited
- 0patch releases micropatch for Internet Explorer vulnerability -- including for Windows 7
- Microsoft confirms that most Windows 7 users won't get a critical Internet Explorer security patch
There have been numerous complaints online -- including on Reddit -- pointing out that JScript.dll is used by many printers. As the workaround suggested by Microsoft restricted access to this file, people have been experiencing errors with their printers. It was initially believed to only affect HP printers, but actually other brands have issues too.
If you have implemented the workaround suggested by Microsoft and you're having problems with printing, you can reverse the changes to JShell.dll permissions. On 32-bit systems, use the following command at an administration Command Prompt:
cacls %windir%\system32\jscript.dll /E /R everyone
For 64-bit systems, the commands you need are:
cacls %windir%\system32\jscript.dll /E /R everyone
cacls %windir%\syswow64\jscript.dll /E /R everyone
Image credit: Surchesth / Shutterstock