Microsoft reissues Windows 2000 patch

Microsoft Corp. has reissued a Windows security patch that it published last week because the software did not work properly on Windows 2000 systems.

The Oct. 10 patch did not correctly configure a Windows Registry setting called a “kill bit,” to prevent Windows 2000 from running software that could be attacked, Microsoft said Thursday. Other versions of the operating system, including Windows XP and Windows Server 2003, are not affected by this problem, Microsoft said.

The patch, described in the MS06-061 security bulletin fixed problems in the Windows XML (Extensible Markup Language) parser. A bulletin describing the patch can be found at this Web site.

“The revised version we released today protects against all the vulnerabilities discussed in MS06-061 and correctly sets the kill bit,” wrote Microsoft Security Program Manager Ben Richeson in a Thursday blog posting. That blog item can be found at this Web site.

Microsoft, which is in the process of reorganizing its security divisions, has had a few high-profile security gaffes over the past few months. In August, it was forced to reissue a critical security patch after researchers discovered that the software introduced a critical security bug.

And some Windows users had to wait for hours last Tuesday as Microsoft sorted out networking problems that kept the security patches from being properly copied between Microsoft’s internal staging systems and those used by its customers.

This latest error is an embarrassing one for Microsoft, said Russ Cooper, a senior information security analyst at Cybertrust Inc.”They might as well have issued M&M’s for Windows 2000 customers,” he said via instant message. “How basic a task is it to ensure the patch does what they wrote in the bulletin? How poorly are their Q&A [quality assurance] processes if such a problem can slip through?”

IDefense’s Ken Dunham, however, was reluctant to criticize Microsoft for the error. A lot of factors can cause a patch to go wrong, said Dunham, a director of malicious code with the VeriSign Inc. “Vulnerability patching and patch management is a very complicated process. Anybody who thinks it’s a very simple process for large enterprises doesn’t understand it.”

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now