News

Looking Backwards: 3 Security Patches Re-released

Think your organization is up to date on its Microsoft security patches? Then make sure you've reviewed the events of the last week. Since Wednesday evening, Microsoft has re-released three security bulletins for reasons ranging from quality control problems to underestimates of the number of platforms affected by a threat to underestimates of the seriousness of a threat.

The quality control issue involves a Windows XP patch originally issued in April. Bulletin MS03-013 fixed an important flaw allowing a local elevation of privilege in Windows NT 4.0, Windows 2000 and Windows XP. But the medicine was worse than the cure for some customers with Windows XP Service Pack 1, where the patch could cause the system to slow to a crawl. Microsoft reissued the bulletin on Wednesday with a new patch for Windows XP Service Pack 1. The bulletin is available at www.microsoft.com/technet/security/bulletin/MS03-013.asp.

In another reissue, Microsoft put out a new version of bulletin MS03-007 from March. The original bulletin fixed a critical flaw involving WebDAV that only affected Windows 2000. It turns out the underlying flaw is in a core operating system component, ntdll.dll, which exists in both Windows XP and Windows NT 4.0. Fortunately, the flaw is less exposed in those two platforms, where Microsoft gives it an "important" severity rating rather than the "critical" rating for the Windows 2000 issue. Patches for the additional platform can be found at www.microsoft.com/technet/security/bulletin/MS03-007.asp.

On Friday, in a quicker turnaround, Microsoft reissued a bulletin that the company's security team had originally issued on Wednesday. The reason for the re-release is to slightly raise the estimate of the severity of the vulnerability being addressed.

The flaw exists in the ISAPI extension for Windows Media Services, and it gives an attacker a way to execute code on Windows NT 4.0 and Windows 2000. Microsoft originally rated the vulnerability as a "moderate" threat. "Subsequent to that release we have determined that the actions an attacker could take as a result of exploiting this vulnerability could include the ability to execute arbitrary code," Microsoft's bulletin states. Microsoft now rates the flaw "important," which is one rung below "critical." The patch for the vulnerability is unchanged and can be found with the original bulletin: www.microsoft.com/technet/security/bulletin/MS03-019.asp.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • An image of planes flying around a globe

    2025 Microsoft Conference Calendar: For Partners, IT Pros and Developers

    Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss.

  • Microsoft to Shut Down Skype Services

    Microsoft will discontinue its Skype telecommunications and video calling services on May 5, 2025, marking the end of the platform's decades-long run.

  • Big Blue To Acquire Datastax in Enterprise AI Play

    In a bid to bolster its enterprise-aimed AI capabilities, IBM is planning to acquire Datastax, a leading AI and data solutions provider, for an undisclosed amount.

  • Microsoft Confirms End of HoloLens Mixed Reality Hardware

    Microsoft officially announced this week that it is discontinuing its HoloLens mixed reality hardware, marking the end of its efforts in the space.