Update: Microsoft pulls crippling patch from Windows Update

Update: Microsoft pulls crippling patch from Windows Update

Leaves rest of MS14-045 on the update service

Although Microsoft has pulled a patch from Windows Update that crippled some computers, it is still pushing a truncated version of the security update that contained the flawed fix.

The update, identified as MS14-045 and one of nine released on "Patch Tuesday," Aug. 12, addressed three separate vulnerabilities, including one related to a font bug and another in the Windows kernel, the heart of the operating system.

Within hours of its release, however, users reported that MS14-045 had generated a Stop 0x50 error on some systems, notably on Windows 7 PCs running the 64-bit version of the OS. They were unable to start up their PCs and typical repair techniques, like booting into Windows' Safe Mode, wouldn't work, some reported.

In response, on Friday Microsoft pulled the patch from its Download Center and revised the accompanying advisory. That was its only public messaging to customers; the company's security center did not blog about the issue or tweet that it had withdrawn the patch.

But Microsoft is still offering part of MS14-045 to users via Windows Update.

MS14-045 was originally composed of two separate "packages," one pegged as 2982791 and the other as 2976897. The former -- the fix for the font problem, and the one Microsoft told customers to uninstall -- has been removed from Windows Update.

The latter (2976897) is still being offered.

While Microsoft correctly identified the crippling package in a support document -- actually, it tapped four, including two specific for Windows 8 and 8.1 -- users who look at the list of available patches in Windows Update and take the time to examine each before installing may be confused, as 2976897 is also identified as associated with MS14-045.

The 2976897 package, however, is safe to install, Microsoft said.

According to Microsoft, all versions of Windows, both client versions like Windows 7 and Windows 8/8.1, and server editions such as Windows Server 2008 and 2012 R2, were fed the 2982791 patch package.

Microsoft has not said when it would again offer the 2982791 part of MS14-045, saying only that it was investigating the issues with that and the other three fixes it told customers to uninstall.

Read more about malware and vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.

Follow Us

Join the newsletter!

Error: Please check your email address.

Tags MicrosoftsecurityWindowssoftwareMalware and Vulnerabilitiesoperating systems



Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Show Comments