Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43434
  • Total Topics: 16528
  • Online today: 3114
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 2
Guests: 3046
Total: 3048









Author Topic: Microsoft Cleans up Bugs After Biggest Patch Release (MS09-056, MS09-043...)  (Read 4506 times)

0 Members and 1 Guest are viewing this topic.

Samker

  • SCF Administrator
  • *****
  • Posts: 7529
  • KARMA: 322
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum


After releasing its largest-ever group of security patches two weeks ago, Microsoft has done a little cleaning up.

Over the past few days, the company has re-released two security updates and issued a workaround for a Windows CryptoAPI patch that caused Microsoft's own instant-messaging server to crash.

"This is the patch month that will not die," said Susan Bradley, chief technology officer with Tamiyasu, Smith, Horn and Braun, an accountancy. She added that the Communicator issue was "a big one to miss," because Microsoft is usually careful about testing its security updates with its own products.

Scott Turner, network systems administrator with the Public Health Institute in Sacramento, California, noticed the bug immediately after installing Microsoft's updates. "We deployed the patch," he said. "When I came in the next day, nobody could connect" to Communicator.

According to a support article on Microsoft's Web site: http://support.microsoft.com/kb/974571 , the MS09-056: http://www.microsoft.com/technet/security/bulletin/MS09-056.mspx update disables several services that Communications Server needs in order to operate. The bug affects Live Communications Server 2005, Office Communications Server 2007 and evaluation versions of Office Communicator 2007.

Microsoft has released a workaround for the problem, but Turner hasn't yet been able to try it out. He's had to disable the MS09-056 update in the meantime to get his company's Communicator users up and running.

Another buggy patch fixed over the past few days was the MS09-043: http://www.microsoft.com/technet/security/bulletin/MS09-043.mspx Office update, first released back in August. This was apparently misconfigured so that customers who use Microsoft update tools such as Windows Server Update Services (WSUS) were given bad scan results. Customers who use Microsoft's tools may believe they're fully patched, when in fact they're not due to this bug, said Eric Schultze, an independent security consultant.

Those customers should re-run their update tools to be sure that they're patched, he added.

The issue affects customers who are running the Microsoft Office Access Runtime 2003, but not any Office products, a Microsoft spokesman said via e-mail. "Essentially, the security update installer detection logic was updated to include an uncommon scenario, where a customer only installed the Microsoft Office Access Runtime 2003 without fully installing the Office 2003 suite or other individual Office 2003 products. Those who are running in this scenario should apply the re-released bulletin immediately."


Microsoft said it also corrected some "detection entries" and "file and registry key verification information" in an update to the MS09-062 patch, released Wednesday: http://www.microsoft.com/technet/security/bulletin/MS09-062.mspx

(PCW)

Samker's Computer Forum - SCforum.info


 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023