Jump to content

dhoffman_98

Member
  • Posts

    40
  • Joined

  • Last visited

  • Donations

    0.00 USD 
  • Country

    United States

About dhoffman_98

Contact Methods

  • Website URL
    http://

dhoffman_98's Achievements

0

Reputation

  1. XP Service Pack 3 Pushed Back to 2008 http://redmondmag.com/news/article.asp?editorialsid=7915
  2. Well, on doing a little more research, it looks like KB905474 was actually released on January 16th. However, it seems that as of today it is showing up as a high priority update. Here is the link for information about KB905474 but I am not able to find a link for the full redistributable version yet, so if anyone else finds it, please post a link. And here is the information link for KB900485 which shows a release date of April 25, and is available for download.
  3. Someone posted one here but I haven't tried doing it that way. Instead I have another way that I have been getting WGA installed. If you follow that link and look at several posts before that, you'll see other info about how I was doing mine.
  4. More updates??? New updates showed up today, both listed as High Priority. KB900485 - Prevents a stop 0x7e error in AEC.SYS KB905474 - WGA Notification Tool
  5. You are correct. See my update post for updated information. Hopefully Incroyable Hulk will have the front page updated shortly.
  6. Can I make a suggestion? How about instead of including long lists like this, put the list in a text file and add it as an attachment. It makes for easier reading. Just a thought.
  7. You are installing 911565 from your svcpack.inf, but when are you installing Media Player 10? Perhaps it's showing up in your add/remove list because the files were modified for MP9. If you install MP10 after your installation (like from RunOnceEx) then the default installation may be laying down the original files and you would need to re-patch with 911565. If you install MP10 and THEN install 911565 then it should work. If there is a way to install MP10 during the base install (like an integration) then I'm interested in knowing how well that works. In the meantime, I am using RunOnceEx after all my base OS stuff is done so that after it logs in, I install several applications (including MP10 and the fix). That being said, I did run into some problems with 911565 yesterday. It seems that the version of the file that I downloaded early yesterday was version 1.0.0.0, but later in the day, there was a version 1.1.0.0 that appeared. I had errors with the earlier version, but then re-downloaded the patch again and got the new version. I have a new simulation running right now with the new version, and I'll report my findings shortly. David
  8. It's Patch Day again... Here's what I found: ADDED: KB911565 -- Vulnerability in Windows Media Player could allow remote code execution Updated 04/11/06 Download KB911567 -- Cumulative Security Update for Outlook Express Download KB908531 -- Vulnerability in Windows Explorer that could allow remote code execution Download KB912812 -- Cumulative Security Update for Internet Explorer Replaces KB905915 Download KB911562 -- Vulnerability in MDAC that could allow remote code execution Download KB890830 -- Updated Malicious Software Removal Tool - Version 1.15 (April 2006) Download REMOVED: KB905915 -- Superceded by KB912812 My full list now shows the following 42 Files: KB873339 -- Vulnerability in HyperTerminal could allow code execution KB885250 -- Vulnerability in server message block could allow remote code execution KB885835 -- Vulnerabilities in Windows Kernel and LSASS could allow elevation of privilege KB885836 -- A vulnerability in WordPad could allow code execution KB886185 -- Critical Update for Windows XP KB887742 -- You receive the Stop error "Stop 0x05 (INVALID_PROCESS_ATTACH_ATTEMPT)" KB888113 -- Vulnerability in hyperlink object library could allow remote code execution KB888302 -- Vulnerability in Windows could allow information disclosure KB890046 -- Vulnerability in Microsoft agent could allow spoofing KB890830 -- Microsoft® Windows® Malicious Software Removal Tool (v1.14) KB890859 -- Vulnerabilities in Windows kernel could allow elevation of privilege and denial of service KB891781 -- Vulnerability in the DHTML editing component ActiveX control could allow code execution KB893756 -- Vulnerability in Telephony service could allow remote code execution KB893803 -- Windows Installer 3.1 (v2) KB894391 -- FIX: DBCS attachment file names are not displayed in Rich Text e-mail messages and you may receive a "Generic Host Process" error message after you install security update MS05-012 KB896358 -- A vulnerability in HTML Help could allow remote code execution KB896422 -- Vulnerability in Server Message Block could allow remote code execution KB896423 -- Vulnerability in Print Spooler service could allow remote code execution KB896424 -- Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution KB896428 -- Vulnerability in Telnet client could allow information disclosure KB898461 -- Installs a permanent copy of the Package Installer for Windows version 6.1.22.4 KB899587 -- Vulnerabilities in Kerberos could allow denial of service, information disclosure, and spoofing KB899589 -- Vulnerability in the Client Service for NetWare Could Allow Remote Code Execution KB899591 -- Vulnerability in Remote Desktop Protocol could allow denial of service KB900725 -- Vulnerabilities in Windows Shell Could Allow Remote Code Execution KB901017 -- Vulnerability in the Microsoft Collaboration Data Objects could allow code execution (Windows) KB901214 -- Vulnerability in Microsoft Color Management Module could allow remote code execution KB902400 -- Vulnerabilities in MS DTC and COM+ Could Allow Remote Code Execution KB904706 -- Vulnerability in DirectShow Could Allow Remote Code Execution KB905414 -- Vulnerability in Network Connection Manager Could Allow Denial of Service KB905749 -- Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege KB908519 -- Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution KB908531 -- Vulnerability in Windows Explorer that could allow remote code execution KB910437 -- Automatic Updates can no longer download updates after an Access Violation error occurs KB911562 -- Vulnerability in MDAC that could allow remote code execution KB911564 -- Vulnerability in Windows Media Player plug-in with non-Microsoft Internet browsers could allow remote code execution. KB911565 -- Vulnerability in Windows Media Player could allow remote code execution. (Install AFTER MP10) KB911567 -- Cumulative Security Update for Outlook Express KB911927 -- Vulnerability in Web Client Service could allow remote code execution. KB912812 -- Cumulative Security Update for Internet Explorer KB912919 -- Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution KB913446 -- Vulnerability in TCP/IP could allow Denial of Service.
  9. Well, that is for the next Service Pack, but that doesn't mean that it would be impossible to expect a roll-up package before then... or at least we can hope for one.
  10. Is anyone getting the new 890830 package? This page (http://support.microsoft.com/kb/890830) is showing that version 1.14 was released today, but follow the link in the page to download the actual package, and it takes you to a page where version 1.13 is still showing as the latest. Also version 1.14 is showing up on the Windows Update site. Is anyone else getting the new version yet?
  11. @Sonic... I never said there was a problem. I simply was asking people for other ideas about how they were doing it, or if the way I was doing it seemed to be the best solution.
  12. OK, I guess you were replying to me after all. Not that I could tell from the post since you didn't indicate... But I did a little looking into the inf file that controls laying down the WGA installation, and found the CLSID key you referred to. However, the explanation for why that key is added to the registry says "Limit Add-On Manager to always enabled". Basically what this key does is it forces the WGA ActiveX contol to be locked in the enable state in Internet Explorer. Explanation (for anybody who might be confused) In IE, select "Tools -> Manage Add-Ons". This list shows you additional controls loaded into your IE, and by selecting each one, you have an option to enable or disable the add-on. The reg key that boooggy provided forces the WGA add-on to stay enabled. I suppose I could add that key, but I don't see the benefit. If you turn it off in the Add-On Manager, then next time you need to validate, you will be told to download the control again.
  13. Who's post were you replying to? I don't think it was mine, because I don't have to add the registry key, and you can't do direct integration if they don't provide a redistributable installation package. If you weren't replying to my post... nevermind...
×
×
  • Create New...