News

January Patch 'Critical' for Windows 2000

Microsoft plans to release its January security patch today, which is expected to include just one fix for Windows systems.

The light release follows heavy patch rollouts seen in the last quarter of 2009. However, in recent years, Microsoft has tended to deliver fewer patches January, with heavier delivery starting in February, according to Jason Miller, data and security team leader at Shavlik Technologies.

The vulnerability to be patched has remote code execution security implications for systems. Microsoft's patch affects every Windows supported operating system -- even Windows 7. However, it's particularly important for Windows 2000 users, when the patch gets a "critical" rating. For other Windows OSes, the patch has a "low" rating, Miller explained in an e-mail.

According to an e-mailed statement from Microsoft spokesperson Jerry Bryant, "Customers with Windows 2000 systems will want to review and deploy this update as soon as possible."

Bryant pointed to Security Advisory 977544 describing a patch for the bug-heavy Windows Server Message Block, which is subject to denial-of-service exploit risks.

"We are still working on an update for the issue at this time," Bryant said in a statement. "We are not aware of any active attacks using the exploit code that was made public for this vulnerability and continue to encourage customers to follow the guidance in the advisory."

Meanwhile, the single patch may require a restart, according to Redmond's advance bulletin.

Microsoft also offers a preview of nonsecurity releases through Windows Update, Microsoft Update Services and Windows Server Update Services. The list is available through this knowledgebase article.

IT pros may also want to consider applying Adobe's security patch for Acrobat and Reader, which is scheduled for release today. It's a fix for a zero-day exploit, according to Miller.

"Unlike most months, what the bulletin administrators should look at first is the Adobe patch when it is released later today," Miller stated. "This bulletin will patch vulnerabilities that are currently in the wild affecting users. With any zero-day exploit, it is important to address the issue as soon as possible."

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

Featured

  • Microsoft Offers Support Extensions for Exchange 2016 and 2019

    Microsoft has introduced a paid Extended Security Update (ESU) program for on-premises Exchange Server 2016 and 2019, offering a crucial safety cushion as both versions near their Oct. 14, 2025 end-of-support date.

  • An image of planes flying around a globe

    2025 Microsoft Conference Calendar: For Partners, IT Pros and Developers

    Here's your guide to all the IT training sessions, partner meet-ups and annual Microsoft conferences you won't want to miss.

  • Notebook

    Microsoft Centers AI, Security and Partner Dogfooding at MCAPS

    Microsoft's second annual MCAPS for Partners event took place Tuesday, delivering a volley of updates and directives for its partners for fiscal 2026.

  • Microsoft Layoffs: AI Is the Obvious Elephant in the Room

    As Microsoft doubles down on an $80 billion bet on AI this fiscal year, its workforce reductions are drawing scrutiny over whether AI's ascent is quietly reshaping its human capital strategy, even as official messaging avoids drawing a direct line.