Microsoft amends security update after reports of system errors
The company has removed the update from the MS13-036 batch of patches
IDG News Service - Microsoft amended a security update containing a patch that reportedly caused errors in some third-party software.
The update, number 2823324, was distributed on Tuesday as part of MS13-036, a batch of patches that fix three Windows vulnerabilities in a kernel-mode driver.
"We've determined that the update, when paired with certain third-party software, can cause system errors," wrote Dustin Childs, a group manager in Microsoft's Trustworthy Computing division, on a company blog. "As a precaution, we stopped pushing 2823324 as an update when we began investigating the error reports and have since removed it from the download center."
Contrary to some reports, the system errors do not cause data to be lost and also do not necessarily affect all computers that applied the patch, Childs wrote. Microsoft published instructions for how to uninstall the security update.
Microsoft has removed the particular patch from MS13-036, which is still being pushed to its customers, Childs added.
The most severe of the three vulnerabilities that MS13-036 addresses could allow an attacker elevated privileges if the person runs a specially crafted application. But the attacker would need to have valid login credential and physical access to the computer.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- Deep Security +VMware vSphere with Operations Management Most midsize organizations are highly virtualized on VMware, and while this has produced significant savings, it also has created new challenges when it...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- DDoS Infographic: How Are Attacks Evolving? For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger?...
- How to Use Crowd-Sourced Threat Intelligence to Stop Malware in its Tracks Threat sharing networks have been around for a long time, however they have typically been "invitation-only", available to only large companies, or those...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Malware and Vulnerabilities White Papers | Webcasts