Incroyable HULK Posted January 6, 2005 Author Posted January 6, 2005 It was listed as a critical update?I just ran a simulation today (to check for other things) and just for the fun of it I went to Windows Update... and I didn't get this one.
Incroyable HULK Posted January 7, 2005 Author Posted January 7, 2005 @mythosazwell, what to say, I've been using this command since the beginning of my Unattended adventure... I've seen it in the guide and some other place too.You are probably right about the fact there is no needs for to much switches!
ander Posted January 7, 2005 Posted January 7, 2005 yepp, it was listed as critical....as i'm still building and "trying" my cd, i let u know, if it happens again.
Reino Posted January 7, 2005 Posted January 7, 2005 Perhaps this "(Replaced) Hotfixes document" I made my self whould help clearing some things out for you guys http://www.microsoft.com/technet/security/bulletin/MS..-....mspxhttp://support.microsoft.com/?kbid=......================================================================Security Updates included in WinXP SP2:---------------------------------------MS04-025 KB867801 - Cumulative Security Update for Internet ExplorerMS04-024 KB839645 - Vulnerability in Windows Shell Could Allow Remote Code ExecutionMS04-023 KB840315 - Vulnerability in HTML Help Could Allow Code ExecutionMS04-022 KB841873 - Vulnerability in Task Scheduler Could Allow Code ExecutionMS04-018 KB823353 - Cumulative Security Update for Outlook ExpressMS04-016 KB839643 - Vulnerability in DirectPlay Could Allow Denial of ServiceMS04-015 KB840374 - Vulnerability in Help and Support Center Could Allow Remote Code ExecutionMS04-014 KB837001 - Vulnerability in the Microsoft Jet Database Engine Could Allow Code ExecutionMS04-013 KB837009 - Cumulative Security Update for Outlook ExpressMS04-012 KB828741 - Cumulative Update for Microsoft RPC/DCOMMS04-011 KB835732 - Security Update for Microsoft WindowsMS04-007 KB828028 - ASN.1 Vulnerability Could Allow Code ExecutionMS04-004 KB832894 - Cumulative Security Update for Internet ExplorerMS04-003 KB832483 - Buffer Overrun in MDAC Function Could Allow Code ExecutionMS03-051 KB813360 - Buffer Overrun in Microsoft FrontPage Server Extensions Could Allow Code ExecutionMS03-049 KB828749 - Buffer Overrun in the Workstation Service Could Allow Code ExecutionMS03-048 KB824145 - Cumulative Security Update for Internet ExplorerMS03-045 KB824141 - Buffer Overrun in the ListBox and in the ComboBox Control Could Allow Code ExecutionMS03-044 KB825119 - Buffer Overrun in Windows Help and Support Center Could Lead to System CompromiseMS03-043 KB828035 - Buffer Overrun in Messenger Service Could Allow Code ExecutionMS03-041 KB823182 - Vulnerability in Authenticode Verification Could Allow Remote Code ExecutionMS03-040 KB828750 - Cumulative Patch for Internet ExplorerMS03-039 KB824146 - Buffer Overrun in RPCSS Service Could Allow Code ExecutionMS03-034 KB824105 - Flaw in NetBIOS Could Lead to Information DisclosureMS03-032 KB822925 - Cumulative Patch for Internet ExplorerMS03-030 KB819696 - Unchecked Buffer in DirectX Could Enable System CompromiseMS03-027 KB821557 - Unchecked Buffer in Windows Shell Could Enable System CompromiseMS03-026 KB823980 - Buffer Overrun in RPC Interface Could Allow Code ExecutionMS03-024 KB817606 - Buffer Overrun in Windows Could Lead to Data CorruptionMS03-023 KB823559 - Buffer Overrun in HTML Converter Could Allow Code ExecutionMS03-021 KB819639 - Flaw in Windows Media Player May Allow Media Library AccessMS03-020 KB818529 - Cumulative Patch for Internet ExplorerMS03-018 KB811114 - Cumulative Patch for Internet Information ServiceMS03-015 KB813489 - Cumulative Patch for Internet ExplorerMS03-014 KB330994 - Cumulative Patch for Outlook ExpressMS03-013 KB811493 - Buffer Overrun in Windows Kernel Message Handling Could Lead to Elevated PrivilegesMS03-010 KB331953 - Flaw in RPC Endpoint Mapper Could Allow Denial of ServiceMS03-008 KB814078 - Flaw in Windows Script Engine Could Allow Code ExecutionMS03-007 KB815021 - Unchecked Buffer in Windows Component Could Cause Server CompromiseMS03-005 KB810577 - Microsoft Security Bulletin MS03-005MS03-004 KB810847 - Cumulative Patch for Internet ExplorerMS03-001 KB810833 - Unchecked Buffer in Locator Service Could Lead to CodeMS02-072 KB329390 - Unchecked Buffer in Windows Shell Could Enable System CompromiseMS02-071 KB328310 - Flaw in Windows WM_TIMER Message Handling Could Enable Privilege ElevationMS02-070 KB329170 - Flaw in SMB Signing Could Enable Group Policy to be ModifiedMS02-068 KB324929 - Cumulative Patch for Internet ExplorerMS02-066 KB328970 - Cumulative Patch for Internet ExplorerMS02-063 KB329834 - Unchecked Buffer in PPTP Implementation Could Enable Denial of Service AttacksMS02-062 KB327696 - Cumulative Patch for Internet Information ServiceMS02-055 KB323255 - Unchecked Buffer in Windows Help Facility Could Enable Code ExecutionMS02-050 KB329115 - Certificate Validation Flaw Could Enable Identity Spoofing========================================================================================================SP1 Hotfixes:-------------MS03-008 KB814078 - Flaw in Windows Script Engine Could Allow Code Execution (JS56NEN.exe)Switch: /q:a /r:nReplaced by: WinXp SP2The problematic version of Windows Script 5.6.0.8513 should be replaced by version 5.6.0.8825 > http://www.microsoft.com/downloads/details.aspx?displaylang=nl&FamilyID=c717d943-7e4b-4622-86eb-95a22b832caaMS03-011 KB816093 - Flaw in the Microsoft VM Could Enable System CompromiseSwitch: /q:a /r:nFor XP SP1 and not SP1aKB817778 - Advanced Networking Pack for Windows XPSwitch: /q /o /n /z (not svcpack.inf supported)MS03-017 KB817787 - Flaw in Windows Media Player skins downloading could allow code executionSwitch: /q:a /r:n (not svcpack.inf supported and applicable upto WMP8 > no WMP9!)KB822603 - Availability of the Windows XP SP1 USB 1.1 and 2.0 UpdateSwitch: /q /o /n /zMS03-041 KB823182 - Vulnerability in Authenticode Verification Could Allow Remote Code ExecutionSwitch: /q /o /n /zReplaced by: WinXP SP2MS04-018 KB823353 - Cumulative Security Update for Outlook ExpressSwitch: /q:a /r:nReplaced by: WinXP SP2MS03-034 KB824105 - Flaw in NetBIOS Could Lead to Information DisclosureSwitch: /q /o /n /zReplaced by: WinXP SP2MS03-045 KB824141 - Buffer Overrun in the ListBox and in the ComboBox Control Could Allow Code ExecutionSwitch: /q /o /n /zReplaced by: MS04-032 KB840987, MS04-031 KB841533 and WinXP SP2MS04-030 KB824151 - Vulnerability in WebDAV XML message handler could lead to a denial of serviceSwitch: /q /o /n /zMS03-044 KB825119 - Buffer Overrun in Windows Help and Support Center Could Lead to System CompromiseSwitch: /q /o /n /zReplaced by: WinXP SP2KB826939 - Update Rollup 1 for Windows XPSwitch: /q /o /n /zReplaced by: WinXP SP2 (almost completely)KB828026 - Update for Windows Media Player URL Script Command BehaviorSwitch: /q /o /n /zReplaced by: KB832353 (applicable upto WMP9 > no WMP10!)MS03-043 KB828035 - Buffer Overrun in Messenger Service Could Allow Code ExecutionSwitch: /q /o /n /zReplaced by: WinXP SP2MS04-012 KB828741 - Cumulative Update for Microsoft RPC/DCOMSwitch: /q /o /n /zReplaced by: WinXP SP2MS04-003 KB832483 - Buffer Overrun in MDAC Function Could Allow Code ExecutionSwitch: /C:""dahotfix.exe /q /n"" /q:a"Replaced by: WinXP SP2KB832353 - Some URL script commands do not work after you apply the Windows Media update from Knowledge Base article 828026Switch: /q /o /n /zReplaces: KB828026 (applicable upto WMP9 > no WMP10!)MS04-028 KB833987 - Buffer overrun in JPEG processing (GDI+) could allow code executionSwitch: /q /o /n /zMS04-038 KB834707 - Cumulative Security Update for Internet ExplorerSwitch: /q /o /n /zReplaces: MS04-025 KB867801Replaced by: KB873377, MS04-040 KB889293 and KB889669MS04-011 KB835732 - Security Update for Microsoft WindowsSwitch: /q /o /n /zReplaced by: WinXP SP2MS04-014 KB837001 - Vulnerability in the Microsoft Jet Database Engine Could Allow Code ExecutionSwitch: /q /o /n /zReplaced by: WinXP SP2MS04-024 KB839645 - Vulnerability in Windows Shell Could Allow Remote Code ExecutionSwitch: /q /o /n /zReplaced by: MS04-027 KB841356 and WinXP SP2MS04-023 KB840315 - Vulnerability in HTML Help Could Allow Code ExecutionSwitch: /q /o /n /zReplaced by: WinXP SP2MS04-015 KB840374 - Vulnerability in Help and Support Center Could Allow Remote Code ExecutionSwitch: /q /o /n /zReplaced by: WinXP SP2MS04-032 KB840987 - Security Update for Microsoft WindowsSwitch: /q /o /n /zReplaces: MS03-045 KB824141MS04-027 KB841356 - Vulnerability in Windows Shell Could Allow Remote Code ExecutionSwitch: /q /o /n /zReplaces: MS04-024 KB839645MS04-031 KB841533 - Vulnerability in NetDDE Could Allow Remote Code ExecutionSwitch: /q /o /n /zReplaces: MS02-071 KB328310 and MS03-045 KB824141 (both are within WinXP SP2)MS04-022 KB841873 - Vulnerability in Task Scheduler Could Allow Code ExecutionSwitch: /q /o /n /zReplaced by: WinXP SP2 KB842773 - Update for Background Intelligent Transfer Service (BITS) 2.0 and WinHTTP 5.1Switch: /q /o /n /zMS04-025 KB867801 - Cumulative Security Update for Internet ExplorerSwitch: /q:a /r:nReplaced by: MS04-038 KB834707KB870669 - Critical Update for Microsoft Data Access Components - Disable ADODB.Stream object from Internet ExplorerSwitch: /q:a /r:nKB873374 - Microsoft GDI+ Detection Tool (related to MS04-028 KB833987)The Microsoft GDI+ Detection Tool is not a hotfix but a little programwhich detects programs that maybe vulnerable to MS04-28 KB833987.MS04-034 KB873376 - Vulnerability in Compressed (zipped) Folders Could Allow Remote Code ExecutionSwitch: /q /o /n /zReplaces: MS02-054 KB329048)KB873377 - Update Rollup for Internet Explorer SP1Switch: /q /o /n /zReplaces: MS04-038 KB834707Replaced by: KB889669KB883357 - Your backup program may fail or incorrectly exclude some files from your backup in Windows XPSwitch: /q /o /n /zMS04-044 KB885835 - Vulnerabilities in Windows Kernel and LSASS could allow elevation of privilegeSwitch: /q /o /n /zMS04-040 KB889293 - Cumulative Security Update for Internet ExplorerSwitch: /q /o /n /zReplaces: MS04-038 KB834707Replaced by: KB889669KB889669 - Update Rollup for Internet Explorer 6 SP1Switch: /q /o /n /zReplaces: MS04-040 KB889293, KB873377 and MS04-038 KB834707===========================================================================================================================SP2 Hotfixes:-------------KB884020 - Programs that connect to IP addresses that are in the loopback address range may not work as you expect in Windows XP Service Pack 2Switch: /q /o /n /zMS04-044 KB885835 - Vulnerabilities in Windows Kernel and LSASS could allow elevation of privilegeSwitch: /q /o /n /zReplaces: MS03-005 KB810577 and MS03-013 KB811493 (both are within WinXP SP2)KB886185 - Critical Update for Windows XP Service Pack 2Switch: /q /o /n /zKB887797 - Cumulative Update for Outlook Express for Windows XPSwitch: /q /o /n /zKB823353 is required to be installed before applying this hotfix!!!
SilverBulletUK Posted January 7, 2005 Posted January 7, 2005 @CoRoNeVery nice list mate, appreciated.
Lucius Snow Posted January 10, 2005 Posted January 10, 2005 According clubic.com, 3 new security holes in I.E. have been discovered.
Incroyable HULK Posted January 10, 2005 Author Posted January 10, 2005 According Clubic.com, three new security holes have been discovered in Windows XP. Only one of them concerns Windows XP SP2. No hotfix released yet.You are Double Posting!
Lucius Snow Posted January 10, 2005 Posted January 10, 2005 According Clubic.com, three new security holes have been discovered in Windows XP. Only one of them concerns Windows XP SP2. No hotfix released yet.You are Double Posting! lol !
RyanVM Posted January 10, 2005 Posted January 10, 2005 According clubic.com, 3 new security holes in I.E. have been discovered.They aren't new security holes. They've been known about for three months. What's new is that Secunia upgraded their threat level.2004-10-21: Updated advisory.2004-10-28: Added another workaround in "Solution" section and linked to Microsoft Knowledge Base article.2004-11-02: Updated with additional information in "Description" and "Solution" section.2004-11-29: Updated "Description" section with additional information from Paul.2004-12-23: Added link to US-CERT vulnerability note.2004-12-25: Updated "Description" section with additional information from Paul and Michael Evanchik.2005-01-07: Increased rating. Added link to test. Updated "Description" and "Solution" sections.Leave it to the sensationalists to botch the story
Lucius Snow Posted January 10, 2005 Posted January 10, 2005 Ahhh so they're the same. Fair enough, that'll make less hotfixes.
willpantin Posted January 11, 2005 Posted January 11, 2005 OK, two new updates are out which seem to be missing on the list on page 1...!KB890830andKB890175
sixpack Posted January 11, 2005 Posted January 11, 2005 KB890830 is a scan tool for mydoom etc.but show's up on windows updatethe last time we had somthing like this there was a regtweak if i remember well
RyanVM Posted January 11, 2005 Posted January 11, 2005 Version 1.0.5 of my update pack is in final testing now. It should be ready to go in a couple hours barring an emergency. Keep your eyes on my signature or my website for when it's officially out.EDIT: It's out.
war59312 Posted January 12, 2005 Posted January 12, 2005 So are the two new ones included?Yeap appears so.
Incroyable HULK Posted January 12, 2005 Author Posted January 12, 2005 I have added the two new hotfixes for Windows XP SP2.
Recommended Posts