News

Microsoft to Post WMF Vulnerability Patch Ahead of Schedule

Microsoft is releasing an out-of-cycle patch Thursday for the Windows Meta File (WMF) vulnerability that attackers were already exploiting when the flaw was made public in the last week of December. Earlier this week, Microsoft had said it would not release a patch until its regular Patch Tuesday event next week.

"The development and testing teams have put forth a considerable effort to address this issue and respond to the strong customer sentiment that the release should be made available as soon as possible," a Microsoft spokesperson said in an e-mail.

Microsoft planned to post the security update, MS06-001, around 2 p.m. PST. The patch will be automatically distributed to computers with Automatic Updates enabled and to customers using Windows Server Update Services.

Microsoft also plans a special Webcast to answer questions about the vulnerability on Friday. A sign-up page for the Webcast is available at www.microsoft.com/technet/security.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Microsoft Appoints Ex-GE Exec Its First COO Since 2016

    Microsoft has a new chief operating officer (COO), its first since Kevin Turner left the role -- and the company -- in 2016.

  • Image of a futuristic maze

    The 2024 Microsoft Product Roadmap

    Everything Microsoft partners and IT pros need to know about major Microsoft product milestones this year.

  • Microsoft, Oracle Announce Updates to Joint Database IaaS Service

    The Oracle Database@Azure infrastructure-as-a-service offering from Oracle and Microsoft is getting new capabilities, including integrations with key Microsoft data and security services.

  • 2025 Support Cliffs Approaching for Exchange 2016, Dynamics 365 PSA

    Microsoft recently sounded the warning bell for two of its products, Exchange Server 2016 and Dynamics 365 Project Service Automation (PSA), both of which are set to reach end-of-support milestones next year.