Over 1 million tech questions and answers.

microsoft patch

Q: microsoft patch

every time i open my email, norton screen pops up that it had detected a virus called microsoft patch. every time i delete it the next day it comes back. help???? please.. thanks !!!

RELEVANCY SCORE 200
Preferred Solution: microsoft patch

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)

A: microsoft patch

Sounds like you have Windows XP.

Turn off System Restore. (Right-click on My Computer, Properties, System Restore Tab. Check the box.

Scan your system using the latest signature files for your antivirus software. Reboot, then re-enable System Restore.

Courtney

Read other 2 answers
RELEVANCY SCORE 59.6

Unauthorized Patch For Microsoft WMF Bug Sparks Controversy

Sober worm may hit tomorrow, but businesses are more concerned about the WFM vulnerability and Microsoft's inability to produce a patch this week. Some are choosing an alternative that could lead to other problems.

By Larry Greenemeier
InformationWeek

Jan 4, 2006 01:00 PM

Concerns over the lack of a Microsoft-issued patch have pushed the Windows Metafile/Zero-Day bug to top of mind, surpassing even tomorrow's much-anticipated Sober worm attack.

The lag time between the Dec. 27 discovery of the WMF vulnerability and Microsoft's planned Jan. 10 patch availability has forced IT security departments to find alternative means for protecting their systems and prompted a non-Microsoft developer to create a patch that others could use.

All of this serves to damage Microsoft's reputation as a company that can secure its own products—a reputation that only recently was beginning to improve after years of being dragged through the mud. Experts are divided over whether it's wise to use Ilfak Guilfanov's Hexblog patch to fix the WMF vulnerability, which could allow attackers to use WMF images to execute malicious code on their victims' computers. Some say it's a necessary measure to protect systems until the official Microsoft patch arrives; others say it's not worth the extra work to patch twice or to take the risk of using a third-party fix.

"We're advising against ... Read more

A:Solved: Unauthorized Patch For Microsoft WMF Bug (Patch Attached)

No offense but before anyone considers downloading the unoffical patch from a third party - they should at the least be aware of and check the MD5 checksum's of the files to insure they have not been tampered with...

wmf_checker_hexblog.exe - MD5: ba65e1954070074ea634308f2bab0f6a

wmf_checker_source.zip - MD5: 7ae8ac24e68baaa49e0de3f05e64a571

wmffix_hexblog14.exe - MD5: 15f0a36ea33f39c1bcf5a98e51d4f4f6

wmfhotfix.cpp - MD5: 8cf91671e353bb259cca30e06bee8bc2

An FAQ and the official unofficial hotfix and checker liinks can be found here:
http://castlecops.com/t143213-Hexblog_WMF_FAQ.html
.....Willy
 

Read other 2 answers
RELEVANCY SCORE 50.8

You may want to check, but on my Vista I don't see any new add-on and I don't even have C:\Program Files\Microsoft\Search Enhancement Pack folder. http://arstechnica.com/microsoft/news/2010...lbar-update.ars As part of its regular Patch Tuesday, Microsoft released an update for its various toolbars, and this update came with more than just documented fixes. The update also installs an add-on for Internet Explorer and an extension for Mozilla Firefox, both without the user's permission. As you can see in the Windows Update screenshot above, Microsoft does not indicate that the update will install anything for either browser. It's also not really clear what the installed extension actually does.

A:Microsoft hides mystery Firefox extension in toolbar update As part of its regular Patch Tuesday, Microsoft released an update...

Thanks Broni for the information. As for Firefox can't I just delete the extension. Let us all see which company gits back to B/C with some sort of answer.

Read other 7 answers
RELEVANCY SCORE 50.8

Microsoft will update a patch by next Tuesday that's causing a version of IE (Internet Explorer) to suddenly crash...The patch, MS06-042...The trouble affects users running IE 6.0 with Service Pack 1.0 on the Windows XP OS (operating system) running Service Pack 1 or the Windows 2000 OS with Service Pack 4...The fixed patch will be available through Microsoft's Download Centre and through Windows Update...pcadvisor.co.uk

A:Microsoft Patches Microsoft Patch

"Today, Microsoft released a patch to the patch they released yesterday which patched a previous patch from last week wich addressed issues with a previous patch from last month which was a major overhaul of the original program. A Microsoft spokesperson admitted that no one actually remebers what the original program was called or what it did, but promised that this patch would make whatever it is do whatever it does with a 5% less chance of catastrophic system failure. Maybe."Can't even get the bloody fixes to work right... grumble

Read other 5 answers
RELEVANCY SCORE 49.6

http://support.microsoft.com/kb/912945/en-us

Microsoft is releasing a software update to Microsoft Internet Explorer 6 for Microsoft Windows XP Service Pack 2 (SP2) and for Microsoft Windows Server 2003 Service Pack 1 (SP1). This update changes the way in which Internet Explorer handles some Web pages that use ActiveX controls. Examples of programs that use ActiveX controls include the following:
Adobe Reader
Apple QuickTime Player
Macromedia Flash
Microsoft Windows Media Player
Real Networks RealPlayer
Sun Java Virtual Machine
After you install this update, you cannot interact with ActiveX controls from certain Web pages until these controls are enabled. To enable an ActiveX control, manually click the control. There are also techniques that Web developers can use to update their Web pages. For more information about these techniques, visit the following MSDN Web site:
http://msdn.microsoft.com/ieupdate (http://msdn.microsoft.com/ieupdate)
As part of this Internet Explorer update, Microsoft will release updates to the current versions of Windows XP and of Windows Server 2003. All client operating systems will be updated. These client operating systems include the following:? Windows XP Starter Edition
? Windows XP Home Edition
? Windows XP Professional Edition
? Windows XP Tablet PC Edition
? Windows XP Media Center Edition
? Windows XP Professional for Embedded Systems
Currently, Microsoft has not released updates for earlier versions of Internet Exp... Read more

Read other answers
RELEVANCY SCORE 49.6

Hi,

I was considering doing a reinstall of windows in the near future but I read somewhere that Microsoft's latest patch was for a vulnerability that would leave computers open to attack even if they were merely connected to the internet.

My problem is that if I reinstall, my computer will obviously be unpatched until I have downloaded all the windows updates. With my connection that is going to taked over 5 hours. Is there a chance that I could get infected in this time even if I only visit the Microsoft site.

A:About microsoft's Oct 23 patch

Hi,

It is possible to become infected whilst trying to download the updates.

What i would do is to download SP3 and all updates possible to CD and then run the installation from the CD once you have reinstalled Windows. This way you will not have to connect to the internet until you are properly up to date.

Read other 5 answers
RELEVANCY SCORE 48.8

I read in the news today that we need to install the patch. Do we need to do this and if so, where do we get the patch?

Thanks.
 

A:Patch for Microsoft Windows? Do we need this?

Read other 6 answers
RELEVANCY SCORE 48.8

New Microsoft patch jams up IE7Last Tuesday's "critical" security fix for Internet Explorer is causing trouble for users who have been testing the new IE 7 browser.

Read other answers
RELEVANCY SCORE 48.8

Have clean XP disk but because of files being partitioned when I loaded the new Microsoft released patch made specific for XP the computer no longer starts up properly and I can not see, and do not know how to get to the hard drive(s). Specifically the command prompt!
I can see it has partitioned the files when I try to open in safe mode - (F8)
I can also see that if I could get to c: and do a chkdsk /r the problem would be solved - (system message through Advanced Options - F8)
However I can not get to the c: drive!

If I could merge the partition files back to the c: drive I would assume all would be back to normal.
If I could get to the OS C: drive I would happily do a chkdsk /f /r!
HP Pavilion but can not even get F11 recovery to respond.
Computer does see the CD drive as it did read the start option of the clean XP disk but when I do either repair option or reinstall it says it can not see hard drive. When I just try and power up it just goes directly to the F8 main screen but none of the options work. It just loops back to the same screen after a number of seconds!

I am stuck in FRED territory! Luckily data is not an issue as I backed up everything prior to installing this specially released patch for the ransomeware issue.

Save
Save

A:XP3 will not load after Microsoft patch

There are partition recovery software programs, but for more clarity were you set up with personal files on one partition and programs or XP on another?

Read other 10 answers
RELEVANCY SCORE 48.8

Have clean XP disk but because of files being partitioned when I loaded the new Microsoft released patch made specific for XP the computer no longer starts up properly and I can not see, and do not know how to get to the hard drive(s). Specifically the command prompt!
I can see it has partitioned the files when I try to open in safe mode - (F8)
I can also see that if I could get to c: and do a chkdsk /r the problem would be solved - (system message through Advanced Options - F8)
However I can not get to the c: drive!

If I could merge the partition files back to the c: drive I would assume all would be back to normal.
If I could get to the OS C: drive I would happily do a chkdsk /f /r!
HP Pavilion but can not even get F11 recovery to respond.
Computer does see the CD drive as it did read the start option of the clean XP disk but when I do either repair option or reinstall it says it can not see hard drive. When I just try and power up it just goes directly to the F8 main screen but none of the options work. It just loops back to the same screen after a number of seconds!

I am stuck in FRED territory! Luckily data is not an issue as I backed up everything prior to installing this specially released patch for the ransomeware issue.

Save
Save

A:XP3 will not load after Microsoft patch

There are partition recovery software programs, but for more clarity were you set up with personal files on one partition and programs or XP on another?

Read other 2 answers
RELEVANCY SCORE 48.8

I recieved this (below) in my Outlook Express email, and I've gotten wary of attachments (even though it says it's certified virus free, anyone can say anything)

It also came in my Yahoo Mail, but didn't have the option that's usually there to scan the attachment.

I "SAVED TARGET AS" desktop, and scanned it with AVG and The Cleaner and it was fine. It said P161976.exe on it.

I clicked on it (on desktop) and it said it wasn't a valid windows file.

I'm thinking I have to click on the actual attachment in the Yahoo Mail?

I think there is a long thread about this on here, but I couldn't understand a lot of it, and it's now CLOSED so I can't ask if this is the same thing and if I need it, and should try to find it elsewhere, IF it won't open/install from the email?

I have I.E.6 and WIN98 SE (which seems to work fine)

Most of the time I don't try looking for updates and patches, because I'm not sure what they are, if I need them, and as I said it seems to work okay the way it is.

Thanks,
Carrie

Microsoft Customer

this is the latest version of security update, the
"April 2003, Cumulative Patch" update which eliminates
all known security vulnerabilities affecting Internet Explorer,
Outlook and Outlook Express as well as five newly
discovered vulnerabilities. Install now to protect your computer
from these vulnerabilities, the most serious of which could allow
an attacker to run executable on yo... Read more

A:Microsoft security patch?

Read other 16 answers
RELEVANCY SCORE 48.4

Microsoft has fixed a bug in a critical security patch that may have been causing problems for some Windows Server 2003 users...pcadvisor.co.ukArticle ID: 924054

Read other answers
RELEVANCY SCORE 48.4

.

http://www.pcpro.co.uk/news/security/357262/microsoft-refuses-to-patch-infected-windows-xp-machines

Microsoft's latest patches also contain kernel updates, and in an effort to avoid a repeat performance, the company has prevented the patches from installing on infected machines. This security update includes package-detection logic that prevents the installation of the security update if certain abnormal conditions exist on 32-bit systemsClick to expand...

.
 

A:Microsoft will not patch XP if rootkit is present

Read other 14 answers
RELEVANCY SCORE 48.4

Microsoft has re-issued another security patch that it originally published in August over a bug that can corrupt users' files. The patch is the third that Microsoft has had to fix from its August set.Version 2.0 of MS06-049, "Vulnerability in Windows Kernel Could Result in Elevation of Privilege," was posted on Tuesday, the same day that Microsoft issued an emergency out-of-cycle patch to fix a VML flaw in Internet Explorer...Microsoft warned that the original version could corrupt files on NTFS-formatted drives when using Windows compression...pcadvisor.co.ukMicrosoft Security Bulletin MS06-049Vulnerability in Windows Kernel Could Result in Elevation of Privilege (920958)Updated: September 26, 2006Affected Software: Microsoft Windows 2000 Service Pack 4

Read other answers
RELEVANCY SCORE 48.4

Microsoft is sure starting to jump through hoops to TRY to please people. And once again. If you do not have Windows XP, Windows 2000, Windows Server 2003, Office 2003 and Exchange Server 2003. You are just out of luck.

Is this really a fix or just a sales pitch?

"Gates and [Microsoft CEO Steve] Ballmer promised that Microsoft was going to get down to no more than two patching technologies,"

http://www.eweek.com/article2/0,1759,1765406,00.asp
 

A:Microsoft to Put Patch Service to the Test

jd_957 said:

Microsoft is sure starting to jump through hoops to TRY to please people. And once again. If you do not have Windows XP, Windows 2000, Windows Server 2003, Office 2003 and Exchange Server 2003. You are just out of luck.

Is this really a fix or just a sales pitch?

"Gates and [Microsoft CEO Steve] Ballmer promised that Microsoft was going to get down to no more than two patching technologies,"

http://www.eweek.com/article2/0,1759,1765406,00.aspClick to expand...
Is this really a fix or just a sales pitch?

Only time will tell

Thanks jd_957
 

Read other 1 answers
RELEVANCY SCORE 48.4

Microsoft to patch 17-year-old computer bug.

A 17-year-old bug in Windows will be patched by Microsoft in its latest security update.

-- Tom
 

Read other answers
RELEVANCY SCORE 48.4

Microsoft promises emergency IE patch
VULNERABILITIES

Microsoft today announced that it will issue an emergency security update for Internet Explorer (IE), but postponed setting a ship date for the fix until tomorrow.

"Given the significant level of attention this issue has generated, confusion about what customers can do to protect themselves and the escalating threat environment, Microsoft will release a security update out-of-band for this vulnerability," said George Stathakopoulos?in an entry on the Microsoft Security Response Center blog. ? Researchers have been busy building exploits since the original attack code went public last

Thursday. Today, for example, a noted American vulnerability researcher and a French security company disclosed that they had created exploits that worked on the newer IE7 and IE8, and could bypass the DEP (data execution prevention) protection that Microsoft has been touting since it acknowledged the bug.

As he did over the weekend, Stathakopoulos downplayed the threat again today. "We continue to see very limited, and in some cases, targeted attacks," he said, adding that th eonly successful attacks found thus far have aimed at IE6.

Date: 19 January 2010

More...........http://www.computerworld.com/s/article/9146038/ 1969 Cougar

A:Microsoft promises emergency IE patch

You would think they would patch it before the hack was made public, seems a bit backwards but at least they are fixing it

Read other 1 answers
RELEVANCY SCORE 48.4

Microsoft has patched almost as many critical vulnerabilities in the first 8 months of 2006 as it did in 2004 and 2005 combined, security researchers said..."2006 already is a record year,"..."It's great that we're finding them prior to large-scale attacks, but at the same time it's a concern about the quality of [Microsoft's] code." Thus far this year, there have been 51 security bulletins and 98 patches, 64 of which were deemed critical...techweb.com

A:Microsoft Breaks Patch Records

Windows needs a complete rewrite from the ground up, instead of patching the legacy system and interfacing new modules with bloated the code.
John

Read other 5 answers
RELEVANCY SCORE 48.4

Quote:
Microsoft Corp. last week said that three Windows security updates, including one rated "critical," will be released tomorrow. The company acknowledged, however, that it will not deliver a fix for an Excel flaw that attackers are now exploiting.


more: computerworld.com

A:Microsoft won't fix Excel bug on Patch Tuesday

I think someone already posted this somewhere, but I'm too lazy to find it :P
I find it more interesting that two out of the three fixes are for spoofing.

Read other 6 answers
RELEVANCY SCORE 48.4

New Worm Poses as Microsoft Patch

'Gruel' also impersonates Symantec tool, lifts Outlook addresses.

Paul Roberts, IDG News Service
Wednesday, July 16, 2003

Antivirus company TruSecure is warning users about a new e-mail worm that is beginning to spread on the Internet and over the Kazaa peer-to-peer network.

The new worm, dubbed Gruel, is a mass-mailing worm that masquerades as a Windows software patch from Microsoft and as a virus-removal tool from Symantec, according to an alert from TruSecure.

Familiar Attack
Like other mass-mailing worms, Gruel spreads by stealing e-mail addresses from an infected computer's Microsoft Outlook address book and mailing copies of itself to those addresses, TruSecure representatives say.

The worm deletes files from machines it infects and copies itself into various locations. It particularly targets and infests folders used by the Kazaa file-sharing network, enabling it to spread on that network as well, according to TruSecure.

The antivirus company received word of five infections and fielded around 20 calls from users who have received e-mail messages containing the virus, according to Bruce Hughes, content security lab manager at TruSecure.

While the number of infections is still low, Gruel has a number of characteristics that have allowed other worms to successfully spread in recent months, Hughes says.

In addition to its clever use of so-called "social engineering" tricks such as using the names of M... Read more

A:New Worm Poses as Microsoft Patch

Thanks for the info ladyjeweler.Much appreciated.
 

Read other 1 answers
RELEVANCY SCORE 48.4

OS: windows XP

I mistakenly removed microsoft office 2003 from my computer. I then could not open my documents (I am using wordpad to open them now). I did "system restore" and MO 2003 was back in my programs file but I could still not open my documents. I tried removing again and the computer would not let me do it. I tried re-installing from the CD and got the message: This patch package could not be opened. Verify that the patch package exists and that you can access it, or contact the application vendor to verify that this is a valid Windows Installer package.

What do I do now?

When I click on the document icon, a box comes up with the title "windows installer" and the message reads "preparing to install". If I don't use the "open with" on right click, the box disappears and no document. If I use the "open with...wordpad, the document opens after the above box does its thing.
 

A:Patch package for Microsoft office

Read other 7 answers
RELEVANCY SCORE 48.4

Last week I cleaned out and updated a friends Dell computer. About three days later I get a call saying its blue screened with the following stop code.

stop: 0x0000007E (0xc0000001d, 0x80537008, 0xba4c3508, 0xba4c3204)

I looked it up and it appears to be a Microsoft patch causing the problem. The question is how do I roll back the patch? One would be the Microsoft recovery console but what am I looking for once inside it? Another option I believe would be using Ubuntu, but again once its up what would I be looking for?

Repairing this would be a lot less of a headache for the owner than rebuilding from scratch.

A:Rolling back a Microsoft patch?

Hi Dirtpitt289,

There is a report that patch KB977165 is causing BSOD with computers that have an infected atapi.sys file.

We could remove the patch, but personally, I'd like confirmation that an infected atapi.sys file is to blame. Please do the following:


Code:
1. Boot from your Windows installation CD

Insert your Windows installation CD and boot your computer. If your computer is not set to boot from CD first, you may need to reconfigure your BIOS or press a boot menu key (often F12, F8 or Esc). If you are unsure of how to do this, consult your favorite geek. As soon as the boot starts, you should see a message like ?Press any key to boot from CD?? ? press a key.

2. Start the Recovery Console

After the CD loads (it may take a minute), you will be presented with a few choices. One of these options is to start a recovery by pressing ?R?. Press ?R? to launch the Recovery Console.

* You may be asked to choose a Windows installation. If so, choose the damaged installation (probably ?1″).
* You may be prompted for the Administrator password. If you do not have one, press ?Enter?.

3. Identify your CD drive letter

You should now be at the command prompt. Enter the following command:

map

Look for the drive letter for your CD drive. It may look something like this:

D: \Device\CdRom0

In this case, your CD drive is ?D:?.

4. Replace ATAPI.SYS

Enter the following, replacing ?D:? with your CD drive:

cd system32\drivers
ren ata... Read more

Read other 4 answers
RELEVANCY SCORE 48.4

Hi, Everyone.

I have downloaded the patch that Microsoft has for the worm that is going around. but when I install it, it gives me an error message, the message says


Quote:




Setup could not verify t he integrity of the file update.inf. Make sure the Cryptographic service is running on this computer.




What do I do?

A:Problem with the Worm patch from Microsoft

Check out the thread "strange windows XP error". That's what it's all about.

Read other 2 answers
RELEVANCY SCORE 48.4

Ok, some of you may remember a few weeks back I posted a thread about recieving a 'Microsoft' e-mail that supposedly included a critical patch with it, it turned at to be the Dumaru virus. Anyway, I have today recieved a new one that goes something like this...

Sender: Microsoft Coporation Security Center
Subject: Latest Microsoft Critical Patch

Content...
Microsoft Partner

this is the latest version of security update, the "September 2003, Cumulative Patch" update which fixes all known security vulnerabilities affecting MS Internet Explorer, MS Outlook and MS Outlook Express as well as three newly discovered vulnerabilities. Install now to help protect your computer from these vulnerabilities. This update includes the functionality of all previously released patches.

System requirements Windows 95/98/Me/2000/NT/XP
This update applies to MS Internet Explorer, version 4.01 and later
MS Outlook, version 8.00 and later
MS Outlook Express, version 4.01 and later
Recommendation Customers should install the patch at the earliest opportunity.
How to install Run attached file. Choose Yes on displayed dialog box.
How to use You don't need to do anything after installing this item.

Microsoft Product Support Services and Knowledge Base articles can be found on the Microsoft Technical Support web site. For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site, or Contact Us.

Thank you for using Mi... Read more

A:Another spoof Microsoft e-mail patch?

Read other 16 answers
RELEVANCY SCORE 48

Microsoft has announced what vulnerabilities it designs to patch on Tuesday.
According to the company, its Tuesday revise will encompass fixes for nine matters. Three of those matters are "Critical" vulnerabilities, meaning that they can allow cipher execution without any user interaction. The remaining vulnerabilities are labeled as "Important."
whereas all three of of the Critical vulnerabilities center on Windows, one of them furthermore encompasses Internet Explorer 9. Interestingly, the flaw does not extend to previous versions of the browser, so it appears it's something new. after that, the nine patches address flaws in everything from Windows XP Service Pack 3 to Windows Server 2008.
As with previous security bulletins, Microsoft is urging users revise their influenced programs as soon as likely. The business will be holding a Webcast on July 11 to address clientele questions.

VIA: TH3Tech

Read other answers
RELEVANCY SCORE 48

Hi All,
Your can read about here.
Barry
 

A:Microsoft Releases Patch for Windows Flaw

Run a scan at the Windows Updates site and the KB912919 patch should appear in the critical updates section.

Microsoft has released it 5 days early.

-------------------------------------------------------------------------------------
 

Read other 1 answers
RELEVANCY SCORE 48

Users complain about last week's security updateMicrosoft is investigating reports that last week's Internet Explorer security update has crippled some users' web connection. Users started posting messages to multiple Microsoft support newsgroups almost immediately after Microsoft released the MS07-069 security bulletin on December 11, saying that they were unable to connect to the internet, either because IE refused to open or because when it did open, it could not reach various sites."About 60 percent of the time, I would get an 'Internet Explorer has encountered a problem and must close' dialog,"...both IE6 and IE7 balked at loading, or while loading, some pages, particularly home pages, on both Windows XP and Windows Vista machines...pcadvisor.co.ukEdit in title for Update: Info from MS Security Response Center

A:Internet Explorer Crippled By Microsoft Patch

That's very useful info, quietman7. I've noticed there have been a number of posts here lately from people experiencing just these problems. Would you recommend that folks uninstall that update until such time as a patch or new update is available? Or do you think that whatever security issues it addresses are more important than the problems it apparently creates?

Thanks.

Read other 19 answers
RELEVANCY SCORE 48

Microsoft is urging users of its Windows 7 operating system (OS) to immediately uninstall a recently-released patch that is reportedly crashing customers' PCs. In some cases, users have been faced with constant system reboots.
The patch was released Tuesday, April 8, 2013, and was part of Microsoft's monthly Patch Tuesday security update. It was issued by Microsoft's Windows Update service but has since been pulled because of reported issues.http://www.infopackets.com/news/bus...crosoft_patch_causes_blue_screen_of_death.htm

Is this related to this thread http://www.techspot.com/community/t...ing-windows-7-security-update-2823324.191521/
 

Read other answers
RELEVANCY SCORE 48

Patch Tuesday 5/12/2015 bug or Microsoft Hiding something?

KB976932 shows up after installing the following updates.


Code:
Security Update for Windows 7 for x64-based Systems (KB3061518)
Cumulative Security Update for Internet Explorer 11 for Windows 7 for x64-based Systems (KB3049563)
Security Update for Windows 7 for x64-based Systems (KB3055642)
Update for Microsoft Security Essentials - 4.8.204.0 (KB3063917)
Security Update for Windows 7 for x64-based Systems (KB3045171)
Security Update for Windows 7 for x64-based Systems (KB3051768)
Security Update for Windows 7 for x64-based Systems (KB3046002)
Windows Malicious Software Removal Tool x64 - May 2015 (KB890830)
Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB3035490)
Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB3032655)
Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB3023215)
Security Update for Microsoft .NET Framework 4.5, 4.5.1 and 4.5.2 on Windows 7, Vista, Server 2008, Server 2008 R2 x64 (KB3023224)
Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 SP1 for x64-based Systems (KB3048070)
Security Update for Microsoft Silverlight (KB3056819)
To get that KB976932 update to show up. You to need re-run the windows updates after you install those updates,... Read more

A:Patch Tuesday 5/12/2015 bug or Microsoft Hiding something?

The update you're getting is fairly common - it's most likely a minor patch to prevent problems further down the line, and WU appears to have picked up that it's not yet been installed.
It shouldn't do any harm to install it.

Read other 2 answers
RELEVANCY SCORE 48

Hiya

This is a cumulative patch that includes the functionality of all
previously released patches for SQL Server 7.0, SQL Server 2000, MSDE
1.0, and MSDE 2000. In addition, it eliminates three newly discovered
vulnerabilities.

- Named Pipe Hijacking -
Upon system startup, SQL Server creates and listens on a specific
named pipe for incoming connections to the server. A named pipe is a
specifically named one-way or two-way channel for communication
between a pipe server and one or more pipe clients. The named pipe is
checked for verification of which connection attempts can log on to
the system running SQL Server to execute queries against data that is
stored on the server.

A flaw exists in the checking method for the named pipe that could
allow an attacker local to the system running SQL Server to hijack
(gain control of) the named pipe during another client's
authenticated logon password. This would allow the attacker to gain
control of the named pipe at the same permission level as the user
who is attempting to connect. If the user who is attempting to
connect remotely has a higher level of permissions than the attacker,
the attacker will assume those rights when the named pipe is
compromised.

- Named Pipe Denial of Service -
In the same named pipes scenario that is mentioned in the "Named Pipe
Hijacking" section of this bulletin, it is possible for an
unauthenticated user who is local to the intranet to send a very
large packet to a specific named pip... Read more

Read other answers
RELEVANCY SCORE 48

.

http://news.cnet.com/8301-27080_3-20001428-245.html

Run Windows update manually!

.
 

A:Microsoft issues emergency patch for 10 IE holes

Read other 13 answers
RELEVANCY SCORE 48

I need some major help with the latest Windows Update (the set of patches that came out this Tuesday to help with the security issues), I think it is causing issues for my laptop PC. I'm not computer illiterate but I'mdefinitely nothing more than a beginner and this is starting to make me panic a little ^_^;

My laptop has been having major Startup and boot issues since the update. My laptop freezes and goes to a white-grey screen. The computer does start up - ie: the screen comes on (white screen, unless I am lucky enough to get a boot screen for a moment) the fans run, but it takes several attempts at turning it on and off again, and hitting either F12 or F8 (still not sure which one is the one that works) to get to a screen that allows me to repair the Startup and go back to a retore point. The last time this happened it also beeped at me however I would not be able to tell you what the code sounded like (I...panicked somewhat).

However, the restore point was made just after Windows downloaded the updates onto my comouter (I had automatic updates on), and I cannot shut down without my computer wanting to install the updates. So I'm stuck in an endless cycle of downloading these updates, then being forced to restore.

Can anyone help with either finding a way to stop my laptop installing these updates, or does anyone know a way to troubleshoot the updates themselves?

Specs:

Dell Studio

Windows Version:

7 - Home

Uses:

Internet/MS Office/Some digital art... Read more

A:Issue with latest Microsoft Patch Update

Read other 7 answers
RELEVANCY SCORE 48

Websense? Security Labs? ThreatSeeker? Network has discovered a substantial number of spam messages utilizing a reliable social engineering trick that lures users to download a Microsoft critical security update...The message uses an open redirect at the legitimate shopping site shopping.***.com; the redirect forwards users to a malicious URL offering to download a malicious executable.securitylabs.websense(screenshots included)

Read other answers
RELEVANCY SCORE 48

I'm trying to get rid of the Conficker worm, and so I used this guide: http://www.bleepingcomputer.com/malware-re...nadup-confickerWhen I copied the files into my laptop and attempted to install the microsoft patch it kept saying that it was searching for updates, and then it would say the update does not apply to my system. Why wont it install? I really need it to so I can get rid of Conficker!P.S. I'm on vista.

A:Microsoft MS08-067 Patch Won't Install!Moved to AII

Hello.Please run MBAM first.Download and run MalwareBytes Anti-MalwarePlease download Malwarebytes Anti-Malware and save it to your desktop.alternate download link 1alternate download link 2Make sure you are connected to the Internet.Double-click on Download_mbam-setup.exe to install the application.When the installation begins, follow the prompts and do not make any changes to default settings.When installation has finished, make sure you leave both of these checked:Update Malwarebytes' Anti-MalwareLaunch Malwarebytes' Anti-MalwareThen click Finish.MBAM will automatically start and you will be asked to update the program before performing a scan. If an update is found, the program will automatically update itself. Press the OK button to close that box and continue. If you encounter any problems while downloading the updates, manually download them from here and just double-click on mbam-rules.exe to install.On the Scanner tab:Make sure the "Perform Quick Scan" option is selected.Then click on the Scan button.If asked to select the drives to scan, leave all the drives selected and click on the Start Scan button. The scan will begin and "Scan in progress" will show at the top. It may take some time to complete so please be patient.When the scan is finished, a message box will say "The scan completed successfully. Click 'Show Results' to display all objects found".Click OK to close the message box and continue with the removal proce... Read more

Read other 1 answers
RELEVANCY SCORE 48

Lots of fixing going on today!

Microsoft said four of the new patches -- software updates that write over glitches -- were of the highest priority and should be deployed immediately to protect users from potential criminal attacks on the Windows operating systems.

Microsoft said it also repaired other less serious security weaknesses in Windows, along with security problems in its widely used Office software for PCs and Microsoft Server software for business computers.
Click to expand...
http://www.msnbc.msn.com/id/39637091/ns/technology_and_science-security

I'm not seeing it being offered in XP w/SP3 here but no doubt it will appear later on.
 

A:Microsoft issues biggest security patch ever

Read other 6 answers
RELEVANCY SCORE 48

The monthly update to the Windows Malicious Software Removal Tool adds detection and deletion for "F4IRootkit," Microsoft's name for the invisibility tool Sony BMG added to 52 of its music albums, and placed on more then 5 million CDs.securitypipeline.com

Read other answers
RELEVANCY SCORE 47.2

Like most people here the update stuck at 45%. I restarted several times & it was still stuck at 45%. Nice going Microsoft.! Today it mysteriously downloaded. Is anyone having problems with this latest update.? I am not a computer Guru but, it seems everything is OK so far. At least I hope it is. I am very Paranoid about any Microsoft updates as they usually Botch them up. I have my settings checked on Defer updates now. I have Windows 10 Pro if that helps. Thanks.! Marg
 

A:Microsoft Patch Tuesday 13th September 2016

There was indeed something wrong with the updates like described here: KB3189866 stuck at 45% or 95%? Install it manually instead - gHacks Tech News
I didn't have any problems, even not the 45% problem and I'm also on W10 pro.
 

Read other 3 answers
RELEVANCY SCORE 47.2

I downloaded patch from download link for my Sony PCV-RX 755. Installation seemed to work, but after rebooting, I cannot find Microsoft Office or Registry Patch for Microsoft Office 2000.

I am trying to install my Sharp OZ- 590 A CD but cannot do so because it requires Microsoft Outlook which is part of Microsoft Office.
 

A:Solved: Registry Patch for Microsoft Office 2000

Read other 6 answers
RELEVANCY SCORE 47.2

By Emil Protalinski
According to the Microsoft Security Response Center, Microsoft will issue nine Security Bulletins on Tuesday, and it will host a webcast to address customer questions on the bulletin the following day (August 12 at 11:00am PST, if you're interested). Five of the vulnerabilities are rated "Critical," and the other four are marked as "Important." All of the Critical vulnerabilities earned their rating through a remote code execution impact, meaning a hacker could potentially gain control of an infected machine. At least seven of the nine patches will require a restart.Further info -
Microsoft Patch Tuesday for August 2009: nine bulletins - Ars Technica

Read other answers
RELEVANCY SCORE 47.2

Quote:
On Monday, Microsoft confirmed reports of unpatched -- or zero-day -- vulnerabilities in a large number of Windows programs, then published a tool it said would block known attacks. At the same time, the company said it would not patch Windows because doing so would cripple existing applications.


This worries the hell out of me. Is this as bad as it sounds?

For now I'm using Linux.

Windows DLL load hijacking exploits go wild | Reuters

A:Microsoft said it couldn't patch Windows to fix a systemic problem

hi !

if you had looked at the forum before you posted you would have seen this thread: Critical bug in 40 different Windows apps

there is some info there...

Read other 7 answers
RELEVANCY SCORE 47.2

http://securityresponse.symantec.com/avcenter/security/Content/15352.html

Microsoft Windows Graphics Rendering Engine WMF/EMF Format Code Execution Vulnerability

Risk
High

Date Discovered
11-08-2005

Description
Microsoft Windows WMF/EMF graphics rendering engine is affected by a remote code execution vulnerability.

The problem presents itself when a user views a malicious WMF or EMF formatted file causing the affected engine to attempt to parse it. Exploitation of this issue can trigger an integer overflow that may facilitate heap memory corruption and arbitrary code execution.

Any code execution that occurs will be with SYSTEM privileges due to the nature of the affected engine. Successful exploitation can facilitate a remote compromise or local privilege escalation.

Symantec Enterprise Security Manager
Symantec Enterprise Security Manager posted an update to the OS Patch Policy that detects and reports systems that are not patched against this vulnerability. Click here for the advisory released November 10, 2005.

Symantec Enterprise Security Manager Network Assessment Module detects and reports this vulnerability. Click here for the advisory released November 11, 2005.

Symantec Vulnerability Assessment
Symantec Vulnerability Assessment detects and reports this vulnerability. Click here for the advisory released November 8, 2005.

Platforms Affected
Avaya DefinityOne Media Servers
Avaya IP600 Media Servers
Avaya S3400 Message Application Server
Avaya S8100 Media Ser... Read more

A:Microsoft Windows Graphics Rendering Engine WMF/EMF Patch

Unauthorized Patch For Microsoft WMF Bug Sparks Controversy

Sober worm may hit tomorrow, but businesses are more concerned about the WFM vulnerability and Microsoft's inability to produce a patch this week. Some are choosing an alternative that could lead to other problems.

By Larry Greenemeier
InformationWeek

Jan 4, 2006 01:00 PM

Concerns over the lack of a Microsoft-issued patch have pushed the Windows Metafile/Zero-Day bug to top of mind, surpassing even tomorrow's much-anticipated Sober worm attack.

The lag time between the Dec. 27 discovery of the WMF vulnerability and Microsoft's planned Jan. 10 patch availability has forced IT security departments to find alternative means for protecting their systems and prompted a non-Microsoft developer to create a patch that others could use.

All of this serves to damage Microsoft's reputation as a company that can secure its own products—a reputation that only recently was beginning to improve after years of being dragged through the mud. Experts are divided over whether it's wise to use Ilfak Guilfanov's Hexblog patch to fix the WMF vulnerability, which could allow attackers to use WMF images to execute malicious code on their victims' computers. Some say it's a necessary measure to protect systems until the official Microsoft patch arrives; others say it's not worth the extra work to patch twice or to take the risk of using a third-party fix.

"We're advising against ... Read more

Read other 1 answers
RELEVANCY SCORE 47.2

Against a backdrop of increasing concern for Microsoft's patching ways, the re-appearance of KB 3035583 does not inspire confidence
 

 
Article

A:Microsoft re-re-re-issues controversial Windows 10 patch KB 3035583

Just like every time I've seen it before I'll be rejecting it into the "hidden" list, and never letting my updates go full auto therefore giving me the chance to check for nasty ones like these before they can install. Note that 8.0 users do not get bugged with this, only 8.1 and 7 users are affected.

Read other 3 answers
RELEVANCY SCORE 47.2

I have had a k-mart/bluelight email address and it has gotten the fake Microsoft latest patch install immediately and other variation emails in the past. Lately it has been getting multiple ones daily. My Juno is the same or worse, I got 7-10 at one time. I recognize them and don't get the virus, but they are 144-154kb a piece and they load up my box. Free Juno doesn't allow filtering to trash can just to junk and you have to give the actual email address and the addresses seem to be random strings of letters. Plus free Juno is only 2mb so it fills up quick.

Does anybody know how they get your addresses or how to get off the lists? Juno suggested I install a patch from Microsoft:

Cumulative Patch for Internet Explorer (822925)

Summary
Who should read this bulletin: Customers using Microsoft® Internet Explorer.

Impact of vulnerability: Two new vulnerabilities, the most serious of which could enable an attacker to run arbitrary code on a user’s system if the user either browsed to a hostile Web site or opened a specially crafted HTML-based email message.

Maximum Severity Rating: Critical

I'm just wondering if there's any way to get off these lists once you're on or if I should just change my email accounts. They don't get sent to hotmail and yahoo because they have automatic scanning of attachments and they won't let you open virus infected attachments.

I have Microsoft Windows ME and am using internet explorer 5.5, I had to updat... Read more

A:fake Microsoft security patch virus emails

"Does anybody know how they get your addresses or how to get off the lists?"

Your e-mail address will have been "harvested" somewhere. If your address exists on other peoples PC, if you have used it on a website anywhere, then its available.

There are some that earn a living from running crawler programs which filter everything on any webpage and collect anything resembling an email address. They sell these to the spammers.

If you ever try and "unsubscribe" from a list you then confirm to the spammers that your address is valid, and its worth more.

The only pointer I have come up with as to why some people get a lot and some no spam, is that people who insist on emailing to a large group of recipients, and put all their addresses in the To: field seem to increase the chances of span to all those unfortunate enough to be in the list.

The correct way is to put all the names in Bcc:

However, once your email address is harvested, there is nothing you can easily do to stop the torrent of mail.

Using a program like Mailwasher to delete them from the server is about all you can do. Some ISPs are installing spam filters.

Patching OE is not going to fix your getting spam. Its a good idea to keep up to date with security patches but the problem does not reside with your PC.
 

Read other 2 answers
RELEVANCY SCORE 47.2

There has been some information collected on the issue. It appears there is an incompatibility with the touchscreen driver (from Wacom) and the latest Windows 10 Creator Update.  This thread has indicated that Lenovo is aware of the issue, but is waiting for Microsoft to release a patch. I will not mark this topic solved until they provide a working solution. https://forums.lenovo.com/t5/Lenovo-Yoga-Series-Notebooks/Yoga-720-Touchscreen-Not-Functional-Wacom-...

Read other answers
RELEVANCY SCORE 47.2

From the article:
 
 
 
Microsoft yesterday announced that beginning in October it will offer only cumulative security updates for Windows 7 and 8.1, ending the decades-old practice of letting customers choose which patches they apply.
 
Microsoft to end decades-old pick-a-patch practice in Windows 7

Read other answers
RELEVANCY SCORE 47.2

Quote:
According to the Microsoft Security Response Center, Microsoft will issue a single Security Bulletin on Tuesday, and it will host a webcast to address customer questions about the bulletins the following day (January 13 at 11:00am PST, if you're interested). The vulnerability is rated "Critical" and it earned the rating through a remote code execution impact, meaning a hacker could potentially gain control of an infected machine. The single patch may require a restart.


Source -
Microsoft Patch Tuesday for January 2010: one bulletin

A:Microsoft Patch Tuesday for January 2010: one bulletin.

Thanks for the heads up Jan!

Read other 2 answers