Over 1 million tech questions and answers.

Microsoft Patches Microsoft Patch

Q: Microsoft Patches Microsoft Patch

Microsoft will update a patch by next Tuesday that's causing a version of IE (Internet Explorer) to suddenly crash...The patch, MS06-042...The trouble affects users running IE 6.0 with Service Pack 1.0 on the Windows XP OS (operating system) running Service Pack 1 or the Windows 2000 OS with Service Pack 4...The fixed patch will be available through Microsoft's Download Centre and through Windows Update...pcadvisor.co.uk

Preferred Solution: Microsoft Patches Microsoft Patch

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)

A: Microsoft Patches Microsoft Patch

"Today, Microsoft released a patch to the patch they released yesterday which patched a previous patch from last week wich addressed issues with a previous patch from last month which was a major overhaul of the original program. A Microsoft spokesperson admitted that no one actually remebers what the original program was called or what it did, but promised that this patch would make whatever it is do whatever it does with a 5% less chance of catastrophic system failure. Maybe."Can't even get the bloody fixes to work right... grumble

Read other 5 answers

Microsoft has fixed a bug in a critical security patch that may have been causing problems for some Windows Server 2003 users...pcadvisor.co.ukArticle ID: 924054

Read other answers

You may want to check, but on my Vista I don't see any new add-on and I don't even have C:\Program Files\Microsoft\Search Enhancement Pack folder. http://arstechnica.com/microsoft/news/2010...lbar-update.ars As part of its regular Patch Tuesday, Microsoft released an update for its various toolbars, and this update came with more than just documented fixes. The update also installs an add-on for Internet Explorer and an extension for Mozilla Firefox, both without the user's permission. As you can see in the Windows Update screenshot above, Microsoft does not indicate that the update will install anything for either browser. It's also not really clear what the installed extension actually does.

A:Microsoft hides mystery Firefox extension in toolbar update As part of its regular Patch Tuesday, Microsoft released an update...

Thanks Broni for the information. As for Firefox can't I just delete the extension. Let us all see which company gits back to B/C with some sort of answer.

Read other 7 answers

Unauthorized Patch For Microsoft WMF Bug Sparks Controversy

Sober worm may hit tomorrow, but businesses are more concerned about the WFM vulnerability and Microsoft's inability to produce a patch this week. Some are choosing an alternative that could lead to other problems.

By Larry Greenemeier

Jan 4, 2006 01:00 PM

Concerns over the lack of a Microsoft-issued patch have pushed the Windows Metafile/Zero-Day bug to top of mind, surpassing even tomorrow's much-anticipated Sober worm attack.

The lag time between the Dec. 27 discovery of the WMF vulnerability and Microsoft's planned Jan. 10 patch availability has forced IT security departments to find alternative means for protecting their systems and prompted a non-Microsoft developer to create a patch that others could use.

All of this serves to damage Microsoft's reputation as a company that can secure its own products—a reputation that only recently was beginning to improve after years of being dragged through the mud. Experts are divided over whether it's wise to use Ilfak Guilfanov's Hexblog patch to fix the WMF vulnerability, which could allow attackers to use WMF images to execute malicious code on their victims' computers. Some say it's a necessary measure to protect systems until the official Microsoft patch arrives; others say it's not worth the extra work to patch twice or to take the risk of using a third-party fix.

"We're advising against ... Read more

A:Solved: Unauthorized Patch For Microsoft WMF Bug (Patch Attached)

No offense but before anyone considers downloading the unoffical patch from a third party - they should at the least be aware of and check the MD5 checksum's of the files to insure they have not been tampered with...

wmf_checker_hexblog.exe - MD5: ba65e1954070074ea634308f2bab0f6a

wmf_checker_source.zip - MD5: 7ae8ac24e68baaa49e0de3f05e64a571

wmffix_hexblog14.exe - MD5: 15f0a36ea33f39c1bcf5a98e51d4f4f6

wmfhotfix.cpp - MD5: 8cf91671e353bb259cca30e06bee8bc2

An FAQ and the official unofficial hotfix and checker liinks can be found here:

Read other 2 answers

Courtesy of the folks at SANS Internet Storm Centerhttp://isc.sans.org/diary.html?storyid=1940

Read other answers

Where on earth are these Microsoft patches?

Particularly, the patch to Windows Media Player? In addition to that missing patch, the article discusses 5 other missing patches to serious problem vulnerabilities - yet, another reason to switch to using Firefox 3.0 as your normal browser, and only use IE for getting patches on patch Tuesday every month!

-- Tom

A:Where on earth are these Microsoft patches?

First you'll have to get on the web and then open Media Player. The type of patches that you get depends upon the system that you're using.

Read other 2 answers

More trouble with Microsoft patchesBy Joris EversStaff Writer, CNET News.comPublished: October 20, 2005, 4:29 PM PDT A "critical" patch for a problem in a Windows component for streaming media, called DirectShow, apparently isn't as straightforward as Microsoft thought. Some Windows 2000 users have applied the incorrect patch, leaving their computers vulnerable even though they think they've patched up,...news.com

Read other answers

So my teacher had this Compaq Evo n600c, but it had all this stupid crap on it that he didn't like, so I offered to help him out. I wiped the whole thing, put windows XP SP2 on it, and reistalled everything. Everything was perfect exept, the ESS Allegro Audio Drivers (WMD) now cause teh sound to be very, very, very soft. We watch movies in class, and hes awesome speakers, yet for some reason the osund is still soft. It was fine previously when it had Windows 2000. I called up compaq, they said it was a glitch with XP, but that there was a patch. They guy said that if i were to call up Microsoft, they'd help me. The guy at MS just told me to go their support database, but it doens't say anything. Can anyone help me out? The audio card is ESS allegro. Thx! I've tried ev erything and I feel terrible cuase its ruining his lesson plan!


A:Windows XP Patches and MIcrosoft was of no Use

Are you using a native windows driver or did you download the driver from hp/compaq's site? The latest driver I found was dated 31 Oct 2001 ver 7.0

Read other 3 answers

Microsoft patches may break Web sitesBy Joris Evers, CNET News.comPublished on ZDNet News: November 2, 2005, 9:50 PM PTTwo Microsoft security updates for Internet Explorer can break the functionality of Web sites that use certain custom applications.The problems occur after installing the patches Microsoft delivered with security bulletins MS05-038 and MS05-052, Microsoft said in two advisories posted on its Web site Wednesday...Both patches can cause problems with ActiveX controls, small programs designed to perform simple tasks that can make a Web site more interactive. The MS05-038 patch can also hinder Java applications. After the patches are installed, applications that are programmed in specific ways will no longer work in Internet Explorer, Microsoft said...news.zdnet.com

Read other answers

Microsoft Security Response Center BlogNext Tuesday, on October 10, 2006 at approximately 10:00 am PT we are slated to release eleven new security bulletins...Microsoft Security Bulletin Advance NotificationOn 10 October 2006 Microsoft is planning to release:Security Updates? Six Microsoft Security Bulletins affecting Microsoft Windows...? Four Microsoft Security Bulletins affecting Microsoft Office...? One Microsoft Security Bulletin affecting Microsoft .NET Framework...

A:Microsoft Preps 11 Security Patches

And it seems that we no longer have an option to opt out of the Windows Genuine Advantage Validation tool. Has anyone else been forced to download this prior to getting your updates, or was it just me?

Read other 2 answers


FIX: Cursor Type and Column Updatability May Change with Some Sort Orders (Q310572)

A cursor declared as DYNAMIC is actually open as KEYSET/OPTIMISTIC.

An ODBC application may receive the following error message when SQL Server updates a result set:

...runtime error 40038, can't assign value to non-updatable field
A call to the SQLColAttribute SQL_DESC_UPDATABLE property made on the column present in the ORDER BY clause returns SQL_ATTR_READWRITE_UNKNOWN (#define SQL_ATTR_READWRITE_UNKNOWN 2). Any subsequent update attempt on the result set column returns the error message mentioned earlier.


FIX: SQL Server Text Formatting Functions Contain Unchecked Buffers (Q304851)

SQL Server 7.0 provides a number of functions that enable database queries to generate text messages. In some cases, the functions create a text message and store it in a variable; in others, the functions directly display the message. A vulnerability has been discovered with these functions.

Use of an invalid format type character may allow SQL Server to overwrite an internal buffer that may overwrite an address in the SQL Server process space with arbitrary data. If SQL Server overwrites an address in the SQL Server process space with arbitrary data, SQL Server may potentially allow you to execute arbitrary code within SQL Server or the SQL Server process may abnormally terminate.

http://sup... Read more

Read other answers

Microsoft has now released three cumulative updates for Windows 10. These updates combine security fixes with non-security bug fixes, and so far, Microsoft hasn't done a very good job of describing the contents of these cumulative updates. While the security content is quite fully described, explanations of the non-security fixes have been lacking.
Many, including your author, feel that this is undesirable and that a key part of the Windows-as-a-Service concept, in which Microsoft releases a steady stream of fixes and functional improvements, is a clear explanation of what those updates are. This is a new approach for Microsoft, and it seems like reassuring users and administrators that issues are getting fixed—and that functional changes are clearly described—should be important.
This is doubly important in those unfortunate situations that a patch has a problem. Microsoft will tend to update such patches when the problems have been fixed, but it does a poor job of clearly communicating this.


Read other answers

Ignore the ads at the top of this report.

When you apply a security update for one of the programs on your PC, beware of uninvited software that wants to come along for the ride.

Vendors are more and more often going over the line, piggy-backing unsolicited commercial products and services onto crucial security patches.

If you're like many people, you were tricked into installing Apple's Safari browser as part of an iTunes or QuickTime update ? a marketing tactic the company has been employing for more than a year. (I reported in my March 27, 2008, Patch Watch column that Apple had quietly started installing its browser using a little-noticed check box.)

You may also have succumbed to Microsoft's incessant offer of Silverlight and Office Live as part of the Microsoft Update service. And you may have tired of saying "no!" to downloading Internet Explorer 8. (I don't feel IE 8 is a necessary upgrade, due to IE 7's relative security and IE 8's incompatibility with some sites, as I describe below.)

Now, the latest Sun Java update shows how cavalier some vendors have become in taking advantage of software updates, including vital security patches.

The latest Sun Java SE Update 16 (6u16), released on Aug. 11, includes seven security updates and fixes a few bugs. What the release notes don't document, however, is that this update comes with a surprise.

Full aticle here-
Sun, Apple, Microsoft install chaff with patches

Read other answers

Microsoft patches critical Hotmail hole
By Sam Varghese
March 24, 2004

Microsoft has responded promptly to the discovery of a critical vulnerability in its Hotmail service and issued a patch in less than two days, according to an advisory posted by GreyMagic Software, an Israel-based security company.

However, GreyMagic said in its posting to the Bugtraq list that it had found a similar flaw in Yahoo!'s webmail service but found it impossible to contact the company.

GreyMagic said it had started work on the issue with Microsoft on March 11. "They have quickly confirmed our findings and were able to produce a fix less than two days later. As a result, Hotmail is no longer vulnerable to this method of exploitation," the advisory said.

"All attempts to contact Yahoo unfortunately failed. Mail was sent to security and secure at yahoo.com and at yahoo-inc.com, no replies were received to date."

The vulnerability is a cross site scripting or XSS flaw. To exploit such a flaw, a web application is sent with a script that activates when it is read by an unsuspecting user’s browser or by an application that has not protected itself against cross-site scripting.

GreyMagic found that it was possible to exploit the flaw when people accessed their Hotmail or Yahoo! mail accounts using Internet Explorer.

The company said a malicious attacker could exploit the flaw and it could result in theft of login and password; disclosure of the content of any emai... Read more

Read other answers

Microsoft has posted a security bulletin advanced notice on their website, detailing 4 patches to be released on Tuesday, February the 10th, addressing security issues within their Windows operating systems.

more:Microsoft releasing 4 security patches on Tuesday

A:Microsoft releasing 4 security patches on Tuesday

well that would be awesome, if I could get my Windows Update Softaware Updated.......

Read other 2 answers

Three critical Microsoft patches coming next week.

Microsoft is to patch three ActiveX vulnerabilities rated 'critical' next Tuesday (July 14).

-- Tom

A:Three critical Microsoft patches coming next week

Dear lotuseclat79,
People recognize a great genius when it is too late! You are the one! A gentleman using Open Source system and still alerting us all about MS pitfalls! I have recently passed a small milestone, when i posted a 1000th post and as usual forgot one of the the most important persons who influenced me most in this site-YOU!

I have bought five easy step-by-step books on learning two flavours of Linux and one of them was Mandriva Linux to read and you are the inspiration behind it all! Accept my grateful thanks!

Thank u for the latest alert!


Read other 1 answers

"Microsoft today delivered six security updates to patch 11 vulnerabilities in Windows, Internet Explorer (IE), Office and several other products, including one bug that attackers are already exploiting." - 4/10/2012

Read other answers

This past week Microsoft released some security patches. I'm wondering how to locate them on my computer?
Just remember: you're not a "dummy," no matter what those computer books claim. The real dummies are the people who, though technically expert, couldn't design hardware and software that's usable by normal consumers if their lives depended upon it. (Walter Mossberg)

A:Where can I get a list of the security patches that Microsoft just released?

Read other 9 answers


we are taking the highly unusual step of providing a security update [kb4012598] for all customers to protect Windows platforms... [even those] that are in custom support only, including Windows XP, Windows 8, and Windows Server 2003.
Direct download for Windows XP SP3 x86   : http://download.windowsupdate.com/d/csa/csa/secu/2017/02/windowsxp-kb4012598-x86-custom-enu_eceb7d5023bbb23c0dc633e46b9c2f14fa6ee9dd.exe

Read other answers

Where do Microsoft security patches get installed within Windows XP?

A:Where can I view what Microsoft patches are installed on my machine

If you go to windowsupdate.microsoft.com (windows only) or update.microsoft.com (all microsoft products), and click on "view your update history" on the left pane, you should have them listed in reverse chronological order in which they were installed.
The other, more tedious way of doing it is looking in your event viewer. I think it's in the system log, and the events are entitled "NtServicePack". Double-click each one to see the KB number of the patch that was installed.

Read other 1 answers

Note from me: There is an extra version of April's Malicious Software Removal Tools (mrt.exe), along with miscellaneous security updates, some optional, available on Windows/Microsoft Update and apply to all systems XP, Vista and Windows 7, both 32 and 64-bit).

Modifications made as part of a Windows update released by Microsoft this week effectively kill the notorious TDL4 rootkit on 64-bit Windows Vista and 7.

Since 64-bit Windows only accepts digitally-signed drivers, there are very few rootkits that manage to infect such systems.

One of them is TDL4, the latest version from the TDSS family of rootkits. It installs itself in the master boot record, making it possible to modify the operating system since the first moment it starts.

On 64-bit systems, it leverages a BCD (Boot Configuration Data) option called BcdOSLoaderBoolean_WinPEMode to disable the code integrity checks in the OS.

On Tuesday, Microsoft released KB2506014, an update which according to the corresponding advisory "addresses a method by which unsigned drivers could be loaded by winload.exe."

Security researchers from ESET note that this update removes the BcdOSLoaderBoolean_WinPEMode option abused by the TDL4 rootkit. In addition, the update intentionally modifies the size of a file called kdcom.dll by adding a KdReserved0 exported symbol.

Under normal circumstances TDL4 checks the size of this file's export directory and replace it with its own malicious version. Acc... Read more

A:Microsoft patches TDL4 rootkit on 64-bit (& 32-bit) systems

Vista/Home Basic SP2/32bit/3.46GHz processor/3GB DDR2 Ram/ATI Radion 3400 seris 512MB

(32bit_64bit) Applications :

I do beleave that the newest vr. of TDL4, Can be unhooked with;
"Rootrepeal": rootrepeal Latest version is Here:http://www.virustotal.com/file-scan/...259-1250214648

As well As dicusses here @ Sysinternals:

Root Repeal - Sysinternals Forums - Page 1

Also with AVG 2011 Internet Security w/SP1
can heal it.

Read other 1 answers

Will microsoft continue to host the patches and service packs for XP after 4/8/2014? Would the automatic downloads work? Would we need to manually download them? I searched and could not find a direct answer. What happens if one would like to re-install the software after that date? thank you.

A:Will microsoft continue to host the patches and service packs for XP after 4/8?

Hello veerboa,
Although the following seems to be addressed to Enterprise customers, all your questions are answered in the FAQ section toward the end.  It is the page linked to from Microsoft Security Essentials, running with the latest updates on an XP system:
In short, you can still install, activate and update XP installations, via Windows Update, even after 8 April 2014.

Read other 8 answers

Recently discovered on deep scan using emsissoft malware 4 fake av alerts and one trojan "exploit java/cve-2010". Unfortunately, was unable to delete trojan. Several attempts have yielded same results. Now full scan of system takes over 4 hours and freezes up at 100%. Attempted to run DR. Web. and entire os becomes unstable.
I have been unsuccessful at either automatically, or manually installing security updates from microsoft (kb2518864, and kb2478658).
Will attach all logs except for GMER (system reboots or finishes without log) although no rootkit activity is ever indicated.
Any assistance would be greatly appreciated.
Thanks .....John D
Tech Support Guy System Info Utility version
OS Version: Microsoft Windows XP Professional, Service Pack 3, 32 bit
Processor: AMD Athlon(tm) 64 X2 Dual Core Processor 3800+, x86 Family 15 Model 43 Stepping 1
Processor Count: 2
RAM: 1022 Mb
Graphics Card: RADEON X600 Series , 256 Mb
Hard Drives: C: Total - 115992 MB, Free - 89583 MB; D: Total - 116458 MB, Free - 108171 MB;
Motherboard: Acer, FC51GM , ,
Antivirus: Microsoft Security Essentials, Updated: Yes, On-Demand Scanner: Enabled

Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 12:51:51 PM, on 6/19/2011
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal
Running processes:
C:\WIN... Read more

Read other answers

Microsoft today delivered nine security updates that patched 19 vulnerabilities in several crucial components of Windows, as well as in Windows Media Player, Outlook Express, IIS (Internet Information Server), Office and several other products.
Security researchers pegged Tuesday's batch as "all over the map" and a "smorgasbord" of updates.

Read article below -

Microsoft patches 19 bugs in sweeping security update | Security Central - InfoWorld

A:Microsoft patches 19 bugs in sweeping security update

As ever shall be

Read other 1 answers

Microsoft and Cisco have issued updates that protect against a new class of attack that requires very little bandwidth and can leave servers and routers paralyzed even after a flood of malicious data has stopped.
The bug in the TCP, or transmission control protocol, was disclosed in October by security researchers Jack Louis and Robert E. Lee of Sweden-based Outpost24. It gave many security watchers pause because it provided attackers with a new way to launch potentially crippling attacks on a wide array of equipment used to route traffic over the internet.

Link -
Microsoft, Cisco issue patches for newfangled DoS exploit ? The Register

Read other answers

In addition to this you will want to install the cumulative Microsoft IE Patch.


There is also a separate patch related to Virtual Machine, which should also be installed:


And one for Windows Media Player:


A:Google (and others) Domain Hijacking; Symantec Fix; Microsoft IE Patches

Read other 7 answers


Microsoft makes one-time exception, patches IE on Windows XP
Calls news coverage of IE vulnerability 'overblown,' but patches IE6, IE7 and IE8 on XP anywayClick to expand...

A:Microsoft makes one-time exception, patches IE on Windows XP

Read other 6 answers

I have been unable to connect to Microsoft update server for 3 months now, and when I install the MS rollup updates the OS still reports those updates have not been installed so it's impossible to keep up with what patches have already been installed. I have been having major problems with MS update since Windows 10 was released, but it was not until 3 months ago that I could not connect to MS Update Server at all.

Well, I contact Microsoft Support today after trying every possible fix for the past several months, and I speak with a support agent named Namrata Sarki. I explain to her that I have tried all possible solutions, and I have 8 Windows 7X64 machines that would not update with Windows 7 installed. I also explain to her that I have tried reformatting each machine, and none of them will update after a fresh installation of Windows. She then runs all her remote test, and then informs me that it is a problem with their update server so I will not be able to do anything about it. She proceeds to inform me that I will have to wait for a fix, and that many Windows 7 users have the same problem (which I already knew). She then informs me I should not trouble shoot the PC any further in case I want to call back about the issue in the future even though she already informed me they would have to fix the problem. I then explain to her that I need to use this PC for my College Classes which are all online, and that i'm a Network & Database Security major so all my... Read more

A:Microsoft Support says Security Patches will not make your PC more secure!

If security updates are not important, then why does Microsoft spend many millions of dollars per year to create fixes and push them ?

It's a monumental task involving thousands of Microsoft employees and an expansive infrastructure - both of which are no trivial expense.

The vast majority of M$ security patches address OS and application vulnerabilities. If those vulnerabilities still exist on a system, then it requires the execution of exploiting code.

If you don't connect outbound and don't download and\or run unknown\untrusted files, then there it is almost a certainty that nothing will happen to your system. But who uses their system like that ?

If you surf the net and use unpatched Internet Explorer or Edge, an exploit (execution of malicious code) might occur when you visit a website. Not to mention Flash - which Windows Update is needed to update. And, further, not to mention other product security updates for Office, Silverlight, Skype, etc.

So, I don't know how the tech could rationally state that security patches are not needed\do not make the system more secure.


Read other 0 answers

Microsoft?s latest round of security patches appears to be causing some PCs to seize up and display a black screen, rendering the computer useless. The problem affects Microsoft products including Windows 7, Vista, and XP operating systems, said the CEO and CTO for the U.K. security company Prevx. Prevx was alerted to the problem by users of its security software last week, the CEO said.

Microsoft apparently made changes to the Access Control List (ACL), a list of permissions for a logged-on user. The ACL interacts with registry keys, creating visible desktop features such as a sidebar. However, the latest patches appear to make some changes to those registry keys. The effect is that some installed applications are not aware of the changes and do not run properly, causing a black screen. Security applications seem to be particularly affected. The CEO said users of other security products have also complained about the issue, even going so far as trying to reinstall the operating system to fix it. Prevx has released software that fixes the registry to match the ACL settings, which should resolve the problem, the CEO said. Users could do this on their own by modifying their registry settings, but making alterations to those settings is risky since it can severely affect how the operating system runs. The CEO said Microsoft was likely just trying to fortify the security of the operating systems when it inadvertently made the error in its patches.

More http://www.computerwo... Read more

A:Latest Microsoft patches cause black screen of death

Someone posted a mention earlier, but it's now well and truly out of the bag as it has appeared in the mainstream news - evidently Microsoft wish to have every bit as much press as Apple did over their guest account glitch on Snowleopard...

Read other 8 answers

Eddie: I wasn't sure this could go in your stickyed thread...if so feel free to move it there! Take care! angel

Microsoft Schedules 8 Patches For Tuesday

Fri Apr 8, 1:53 PM ET Technology - TechWeb

Tuesday, April 12, will be a busy day at Microsoft.

The Redmond, Wash.-based developer will release eight patches for Windows, Office, Exchange, and MSN Messenger, at least half of which will be marked "critical," the company said late Thursday.

The patches will hit on the same day that Microsoft turns off its automatic blocking of Windows XP Service Pack 2 (SP2), which many companies applied last summer when the OS revision released.

According to information posted on Microsoft's Security Bulletin Advance Notification Web site, five of the eight fixes will be for Windows, and one each for Office, Exchange, and MSN Messenger.

Microsoft doesn't hand out details of its upcoming patches when it makes monthly pre-announcements, so the exact nature of the fixes are unknown. The Common Vulnerabilities and Exposures (CVE) database, however, lists a pair of unresolved Office vulnerabilities -- one with InfoPath, the other relating to bypassing policies that limit access to hidden drives by browsing from Office applications -- and one unpatched Exchange issue.

Third-party security firms give other hints of the upcoming patches, although most play it close to the vest. eEye Digital Security, for instance, is a frequent discoverer of Microsoft Windows v... Read more

Read other answers

I did, a whole slew of them, when I was redirected to a spoofed Microsoft Update site. How do I go about removing them, and/or repairing the damage done, anyone have any idea?

A:Anyone Else Download Bogus Microsoft Patches/Updates/Hotfixes?

Follow this: http://www.techsupportforum.com/secu...sting-log.html

Read other 1 answers

Microsoft patches 'super nasty' Windows bugsExpect worm soon, says researcher, who sees damage potential on par with Blaster, Sasser...http://www.computerworld.com/action/articl...ticleId=9125858

A:Microsoft Patches 'super nasty' Windows bugs

What would be best to do if this is coming? What would be best to install something to block it out. Before attacking a computer?

Ill start prepearing.

Read other 2 answers

Less than a week after acknowledging Windows was also vulnerable to a decade-old encryption flaw, Microsoft has issued a fix as part of its monthly Patch Tuesday. The vulnerability in question is known as FREAK (Factoring RSA Export Keys), and it...

Read more

A:Microsoft releases patches for FREAK vulnerability and Stuxnet worm

Holy [expletive]!! 15 Critical AND 17 optional updates resolving issues. Downloading...

Read other 8 answers

Does anyone know if Microsoft still uses this format and if so where I could obtain a updated listMicrosoft Security Bulletins and cross references them to the applicable Knowledge base article number? example MS05-025 - KB883939

Read other answers

Microsoft today said it will deliver six security updates Tuesday, less than half the number it issued last month, to fix flaws in Windows and Office.
The updates will patch a total of 15 separate vulnerabilities, Microsoft said in a follow-up entry to its security response center's blog.
"Six is the lucky number this month," said Andrew Storms, director of security operations at nCircle Network Security. "Really, anything less than 13 is a lucky number."

More -
Microsoft plans six patches next week, ties November record

Read other answers


Microsoft is releasing a software update to Microsoft Internet Explorer 6 for Microsoft Windows XP Service Pack 2 (SP2) and for Microsoft Windows Server 2003 Service Pack 1 (SP1). This update changes the way in which Internet Explorer handles some Web pages that use ActiveX controls. Examples of programs that use ActiveX controls include the following:
Adobe Reader
Apple QuickTime Player
Macromedia Flash
Microsoft Windows Media Player
Real Networks RealPlayer
Sun Java Virtual Machine
After you install this update, you cannot interact with ActiveX controls from certain Web pages until these controls are enabled. To enable an ActiveX control, manually click the control. There are also techniques that Web developers can use to update their Web pages. For more information about these techniques, visit the following MSDN Web site:
http://msdn.microsoft.com/ieupdate (http://msdn.microsoft.com/ieupdate)
As part of this Internet Explorer update, Microsoft will release updates to the current versions of Windows XP and of Windows Server 2003. All client operating systems will be updated. These client operating systems include the following:? Windows XP Starter Edition
? Windows XP Home Edition
? Windows XP Professional Edition
? Windows XP Tablet PC Edition
? Windows XP Media Center Edition
? Windows XP Professional for Embedded Systems
Currently, Microsoft has not released updates for earlier versions of Internet Exp... Read more

Read other answers

every time i open my email, norton screen pops up that it had detected a virus called microsoft patch. every time i delete it the next day it comes back. help???? please.. thanks !!!

A:microsoft patch

Sounds like you have Windows XP.

Turn off System Restore. (Right-click on My Computer, Properties, System Restore Tab. Check the box.

Scan your system using the latest signature files for your antivirus software. Reboot, then re-enable System Restore.


Read other 2 answers


I was considering doing a reinstall of windows in the near future but I read somewhere that Microsoft's latest patch was for a vulnerability that would leave computers open to attack even if they were merely connected to the internet.

My problem is that if I reinstall, my computer will obviously be unpatched until I have downloaded all the windows updates. With my connection that is going to taked over 5 hours. Is there a chance that I could get infected in this time even if I only visit the Microsoft site.

A:About microsoft's Oct 23 patch


It is possible to become infected whilst trying to download the updates.

What i would do is to download SP3 and all updates possible to CD and then run the installation from the CD once you have reinstalled Windows. This way you will not have to connect to the internet until you are properly up to date.

Read other 5 answers

Have clean XP disk but because of files being partitioned when I loaded the new Microsoft released patch made specific for XP the computer no longer starts up properly and I can not see, and do not know how to get to the hard drive(s). Specifically the command prompt!
I can see it has partitioned the files when I try to open in safe mode - (F8)
I can also see that if I could get to c: and do a chkdsk /r the problem would be solved - (system message through Advanced Options - F8)
However I can not get to the c: drive!

If I could merge the partition files back to the c: drive I would assume all would be back to normal.
If I could get to the OS C: drive I would happily do a chkdsk /f /r!
HP Pavilion but can not even get F11 recovery to respond.
Computer does see the CD drive as it did read the start option of the clean XP disk but when I do either repair option or reinstall it says it can not see hard drive. When I just try and power up it just goes directly to the F8 main screen but none of the options work. It just loops back to the same screen after a number of seconds!

I am stuck in FRED territory! Luckily data is not an issue as I backed up everything prior to installing this specially released patch for the ransomeware issue.


A:XP3 will not load after Microsoft patch

There are partition recovery software programs, but for more clarity were you set up with personal files on one partition and programs or XP on another?

Read other 10 answers

I recieved this (below) in my Outlook Express email, and I've gotten wary of attachments (even though it says it's certified virus free, anyone can say anything)

It also came in my Yahoo Mail, but didn't have the option that's usually there to scan the attachment.

I "SAVED TARGET AS" desktop, and scanned it with AVG and The Cleaner and it was fine. It said P161976.exe on it.

I clicked on it (on desktop) and it said it wasn't a valid windows file.

I'm thinking I have to click on the actual attachment in the Yahoo Mail?

I think there is a long thread about this on here, but I couldn't understand a lot of it, and it's now CLOSED so I can't ask if this is the same thing and if I need it, and should try to find it elsewhere, IF it won't open/install from the email?

I have I.E.6 and WIN98 SE (which seems to work fine)

Most of the time I don't try looking for updates and patches, because I'm not sure what they are, if I need them, and as I said it seems to work okay the way it is.


Microsoft Customer

this is the latest version of security update, the
"April 2003, Cumulative Patch" update which eliminates
all known security vulnerabilities affecting Internet Explorer,
Outlook and Outlook Express as well as five newly
discovered vulnerabilities. Install now to protect your computer
from these vulnerabilities, the most serious of which could allow
an attacker to run executable on yo... Read more

A:Microsoft security patch?

Read other 16 answers

New Microsoft patch jams up IE7Last Tuesday's "critical" security fix for Internet Explorer is causing trouble for users who have been testing the new IE 7 browser.

Read other answers

Have clean XP disk but because of files being partitioned when I loaded the new Microsoft released patch made specific for XP the computer no longer starts up properly and I can not see, and do not know how to get to the hard drive(s). Specifically the command prompt!
I can see it has partitioned the files when I try to open in safe mode - (F8)
I can also see that if I could get to c: and do a chkdsk /r the problem would be solved - (system message through Advanced Options - F8)
However I can not get to the c: drive!

If I could merge the partition files back to the c: drive I would assume all would be back to normal.
If I could get to the OS C: drive I would happily do a chkdsk /f /r!
HP Pavilion but can not even get F11 recovery to respond.
Computer does see the CD drive as it did read the start option of the clean XP disk but when I do either repair option or reinstall it says it can not see hard drive. When I just try and power up it just goes directly to the F8 main screen but none of the options work. It just loops back to the same screen after a number of seconds!

I am stuck in FRED territory! Luckily data is not an issue as I backed up everything prior to installing this specially released patch for the ransomeware issue.


A:XP3 will not load after Microsoft patch

There are partition recovery software programs, but for more clarity were you set up with personal files on one partition and programs or XP on another?

Read other 2 answers

I read in the news today that we need to install the patch. Do we need to do this and if so, where do we get the patch?


A:Patch for Microsoft Windows? Do we need this?

Read other 6 answers

New Worm Poses as Microsoft Patch

'Gruel' also impersonates Symantec tool, lifts Outlook addresses.

Paul Roberts, IDG News Service
Wednesday, July 16, 2003

Antivirus company TruSecure is warning users about a new e-mail worm that is beginning to spread on the Internet and over the Kazaa peer-to-peer network.

The new worm, dubbed Gruel, is a mass-mailing worm that masquerades as a Windows software patch from Microsoft and as a virus-removal tool from Symantec, according to an alert from TruSecure.

Familiar Attack
Like other mass-mailing worms, Gruel spreads by stealing e-mail addresses from an infected computer's Microsoft Outlook address book and mailing copies of itself to those addresses, TruSecure representatives say.

The worm deletes files from machines it infects and copies itself into various locations. It particularly targets and infests folders used by the Kazaa file-sharing network, enabling it to spread on that network as well, according to TruSecure.

The antivirus company received word of five infections and fielded around 20 calls from users who have received e-mail messages containing the virus, according to Bruce Hughes, content security lab manager at TruSecure.

While the number of infections is still low, Gruel has a number of characteristics that have allowed other worms to successfully spread in recent months, Hughes says.

In addition to its clever use of so-called "social engineering" tricks such as using the names of M... Read more

A:New Worm Poses as Microsoft Patch

Thanks for the info ladyjeweler.Much appreciated.

Read other 1 answers

Microsoft promises emergency IE patch

Microsoft today announced that it will issue an emergency security update for Internet Explorer (IE), but postponed setting a ship date for the fix until tomorrow.

"Given the significant level of attention this issue has generated, confusion about what customers can do to protect themselves and the escalating threat environment, Microsoft will release a security update out-of-band for this vulnerability," said George Stathakopoulos?in an entry on the Microsoft Security Response Center blog. ? Researchers have been busy building exploits since the original attack code went public last

Thursday. Today, for example, a noted American vulnerability researcher and a French security company disclosed that they had created exploits that worked on the newer IE7 and IE8, and could bypass the DEP (data execution prevention) protection that Microsoft has been touting since it acknowledged the bug.

As he did over the weekend, Stathakopoulos downplayed the threat again today. "We continue to see very limited, and in some cases, targeted attacks," he said, adding that th eonly successful attacks found thus far have aimed at IE6.

Date: 19 January 2010

More...........http://www.computerworld.com/s/article/9146038/ 1969 Cougar

A:Microsoft promises emergency IE patch

You would think they would patch it before the hack was made public, seems a bit backwards but at least they are fixing it

Read other 1 answers

Microsoft has patched almost as many critical vulnerabilities in the first 8 months of 2006 as it did in 2004 and 2005 combined, security researchers said..."2006 already is a record year,"..."It's great that we're finding them prior to large-scale attacks, but at the same time it's a concern about the quality of [Microsoft's] code." Thus far this year, there have been 51 security bulletins and 98 patches, 64 of which were deemed critical...techweb.com

A:Microsoft Breaks Patch Records

Windows needs a complete rewrite from the ground up, instead of patching the legacy system and interfacing new modules with bloated the code.

Read other 5 answers