[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Win 2000 patch



PureBytes Links

Trading Reference Links



I unfortunately added the patch below for Win 2000.  Even though it was
uninstalled using the add/remove in the control panel, some residue must
remain, as using NetScape at times will completely lock up my machine
(whereas it did not before). 

The MS web site(
http://www.microsoft.com/technet/security/bulletin/ms00-079.asp?a=support
), states "The Windows 2000 patch has been removed at this time. An
updated patch is being developed and will be available shortly". This
indicates to me that the patch was faulty. But the MS people say "tough,
read the limitation of liability". Or pay $245 to talk to us about it
(this is their new policy for help on one incident for Win 2000 (it is
$35 for Win 9X). Win 2000 is a "business OS".). Has anyone else had this
problem and found a solution (besides using IE)? 

Does this limitation of liability apply in California? From the above
URL  "some states do not allow the exclusion or limitation of liability
for consequential or incidental damages so the foregoing limitation may
not apply".

wayne

> 
> 
> Subject:           Re:Security Flash
>     Date:           Mon, 23 Oct 2000 12:20:43 -0700
>    From:           Wayne Mathews <wayne@xxxxxxxxx>
>       To:           =omega list <omega-list@xxxxxxxxxx>
> 
> Users of W 2000 should be very cautious about installing the patch
> listed below. I did and it caused NetScape to completely lock up my
> machine. Fortunately, the patch can be uninstalled from the add/remove
> in the control panel. I have never seen this before where a patch can be
> uninstalled from add/remove. Maybe MS had some idea about potential
> problems.
> 
> Besides, the patch is unnecessary for most uses of W 2000 as from MS
> itself --"HyperTerminal is the default Telnet client on Windows 98, 98SE
> and ME. However, it is not the default Telnet client on Windows 2000,
> and Windows 2000 users who have not taken steps to make it the default
> Telnet client would not be affected by the vulnerability."


>> 
>> Subject:           Security Flash
>>     Date:           Sat, 21 Oct 2000 14:01:23 -0600
>>    From:           Mark Jurik <mark@xxxxxxxxxxxx>
>>       To:           "'Omega List'" <Omega-list@xxxxxxxxxx>,
>> "'Realtraders'" <realtraders@xxxxxxxxxxxxxxx>
>> 
>> As reported in SecuritySearch.Net Vulnerability Report...
>> -------------------------------------------------------
>> 
>> If a user opens a HTML e-mail message then a malicious 
>> user could execute arbitrary code on the system. 
>> 
>> Windows 98 and 98SE users should install this patch 
>> http://download.microsoft.com/download/win98/Update/12395/W98/EN-US/274548USA8.EXE 
>> 
>> Windows Me users should install this patch   
>> http://download.microsoft.com/download/winme/Update/12395/WinMe/EN-US/274548USAM.EXE 
>> 
>> Windows 2000 should install this patch 
>> http://www.microsoft.com/downloads/release.asp?releaseid=25112