Home > Microsoft Security > Microsoft Security Bulletin Ms08 041

Microsoft Security Bulletin Ms08 041

Do not open or save Microsoft Office files that you receive from untrusted sources or that you receive unexpectedly from trusted sources. These capabilities enable consumers and information workers to more efficiently find, manage, and organize the increasing amount of data common in home and enterprise environments. Special Options /overwriteoem Overwrites OEM files without prompting. /nobackup Does not back up files needed for uninstall. /forceappsclose Forces other programs to close when the computer shuts down. /log:path Allows the Supported Security Update Installation Switches SwitchDescription /q Specifies quiet mode, or suppresses prompts, when files are being extracted. /q:u Specifies user-quiet mode, which presents some dialog boxes to the user. /q:a check over here

If a restart is required at the end of Setup, a dialog box will be presented to the user with a timer warning that the computer will restart in 30 seconds. For more information about the Office Inventory Tool and other scanning tools, see SMS 2003 Software Update Scanning Tools. Windows Server Update Services By using Windows Server Update Services (WSUS), administrators can deploy the latest critical updates and security updates for Microsoft Windows 2000 operating systems and later, Office XP These files are located at the path that is specified in the switch. /extract[:path] Extracts files without starting the Setup program. /ER Enables extended error reporting. /verbose Enables verbose logging.

This security update supports the following setup switches. For more information about Administrative Installation Points, refer to the Office Administrative Installation Point information in the Detection and deployment Tools and Guidance subsection. Registry Key Verification You may also be able to verify the files that this security update has installed by reviewing the registry keys listed in the Reference Table in this section. What does the update do? The update removes the vulnerability by improving the validation of data structures within Jet.

These registry keys may not contain a complete list of installed files. Is there anything that helps mitigate the risk of an HTML email attack? The article also documents recommended solutions for these issues. Click Start, and then click Search.

Click Start, and then click Search. No user interaction is required, but installation status is displayed. Additionally, you may not have the option to uninstall the update from the Add or Remove Programs tool in Control Panel. https://technet.microsoft.com/en-us/library/security/ms08-067.aspx Inclusion in Future Service Packs The update for this issue will be included in a future service pack or update rollup Deployment Installing without user interventionFor all supported 32-bit editions of

You will be prompted frequently when you enable this workaround. Supported Security Update Installation Switches SwitchDescription /help Displays the command-line options. How to undo the workaround. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.

Click Start, and then click Search. https://technet.microsoft.com/en-us/library/security/ms08-aug.aspx See also Downloads for Systems Management Server 2.0. If the file or version information is not present, use one of the other available methods to verify update installation. Security updates are also available from the Microsoft Download Center.

Customers who require custom support for older releases must contact their Microsoft account team representative, their Technical Account Manager, or the appropriate Microsoft partner representative for custom support options. check my blog Deployment Information Installing the Update When you install this security update, the installer checks whether one or more of the files that are being updated on your system have previously been For information about how to edit the registry, view the "Changing Keys And Values" Help topic in Registry Editor (Regedit.exe) or view the "Add and Delete Information in the Registry" and When you call, ask to speak with the local Premier Support sales manager.

Servers could be at more risk if administrators allow users to log on to servers and to run programs. See the section, Detection and Deployment Tools and Guidance, earlier in this bulletin for more information. To uninstall an update installed by WUSA, click Control Panel, and then click Security. http://itivityglobal.com/microsoft-security/subscribe-to-microsoft-security-bulletin.html The following table provides the MBSA detection summary for this security update.

You may also click on the Details tab and compare information, such as file version and date modified, with the file information tables provided in the bulletin KB article. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information. If you installed your application from a server location, the server administrator must instead update the server location with the administrative update and deploy that update to your system.

If the file or version information is not present, use one of the other available methods to verify update installation.

Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. This is the same as unattended mode, but no status or error messages are displayed. Microsoft Baseline Security Analyzer Microsoft Baseline Security Analyzer (MBSA) allows administrators to scan local and remote systems for missing security updates as well as common security misconfigurations. Supported Security Update Installation Switches SwitchDescription /?, /h, /help Displays help on supported switches. /quiet Suppresses the display of status or error messages. /norestart When combined with /quiet, the system will

To determine the support lifecycle for your product and edition, visit Microsoft Support Lifecycle. SMS 2003 can also use the Microsoft Office Inventory Tool to detect required updates for Microsoft Office applications. HotPatchingNot applicable Removal Information Microsoft Windows 2000 Service Pack 4:Use Add or Remove Programs tool in Control Panel or the Spuninst.exe utility located in the %Windir%\$NTUninstallKB950749$\Spuninst folder File Information See Microsoft http://itivityglobal.com/microsoft-security/microsoft-security-bulletin-ms04-013.html International customers can receive support from their local Microsoft subsidiaries.

Setup Modes /passive Unattended Setup mode. In the list of files, right-click a file name from the appropriate file information table, and then click Properties.Note Depending on the edition of the operating system, or the programs that The vulnerability addressed by this update does not affect supported editions of Windows Server 2008 if Windows Server 2008 was installed using the Server Core installation option. For example, an online e-commerce site or banking site may use ActiveX Controls to provide menus, ordering forms, or even account statements.

To revert to an installation before the update was installed; you must remove the application, and then install it again from the original media. If /t:path is not specified, you are prompted for a target folder. /c:path Overrides the install command that is defined by author. For more information about the terminology that appears in this bulletin, such as hotfix, see Microsoft Knowledge Base Article 824684. This is an important security update for all supported 32-bit editions of Windows XP Service Pack 2.

For more information, see Microsoft Knowledge Base Article 910723. Special Options /forceappsclose Forces other programs to close when the computer shuts down. /log:path Allows the redirection of installation log files. Update Compatibility Evaluator and Application Compatibility Toolkit Updates often write to the same files and registry settings required for your applications to run. It should be a priority for customers who have older releases of the software to migrate to supported releases to prevent potential exposure to vulnerabilities.

If the file or version information is not present, use one of the other available methods to verify update installation.