From: Ablang on
< I am definitely fearful of Windows Updates. I do a manual creating
a Restore before doing an update.

My other laptop is still down from the damage of KB977165.>

--

Microsoft Tries to Avoid Windows Blue Screen Repeat

Gregg Keizer
Apr 14, 2010 5:09 am

http://www.pcworld.com/article/194205/microsoft_tries_to_avoid_windows_blue_screen_repeat.html

Microsoft took steps Tuesday to avoid repeating the debacle two months
ago that left Windows XP users staring at the notorious "Blue Screen
of Death" error message after they applied a patch.

In February, a security update that fixed two flaws in the Windows
kernel -- the operating system's most important component -- wreaked
havoc when it was applied by users, who almost immediately flooded
Microsoft 's support forum with reports of crippled computers .

As the number of reports grew, Microsoft first stopped automatically
serving the MS10-015 update, then confirmed that a rootkit caused the
crashes . Only PCs that had been previously infected with the Alureon
rootkit were incapacitated, Microsoft's investigation found.

Microsoft restarted distribution of the update only after it had come
up with a way to block rootkit-infected PCs from receiving the
patches. "If detection logic included in Automatic Update discovers
abnormal conditions in certain operating system file configurations,
the update will fail and customers will be presented with an error
message that offers alternative support options," said Jerry Bryant,
general manager with the Microsoft Security Response Team, in early
March.

MS10-021 , one of the 11 updates issued yesterday as part of
Microsoft's monthly Patch Tuesday cycle , also fixed flaws in the
Windows kernel. But Microsoft is hoping that this month's update won't
trigger a repeat Blue Screen of Death.

"This security update includes package detection logic that prevents
the installation of the security update if certain abnormal conditions
exist on 32-bit systems," stated the MS10-021 bulletin. "These
abnormal conditions on a system could be the result of an infection
with a computer virus that modifies some operating system files, which
renders the infected computer incompatible with the kernel update."

One security expert applauded the move.

"I give Microsoft a big tip of the hat for not taking [the February
incident] as a one-off," said Jason Miller, data and security team
manager at network compliance and security vendor Shavlik
Technologies. "The kernel is something that if something goes bad,
that's not good. Patching the kernel is not like patching a media
player."

Microsoft obviously learned a lesson. Even though the February update
crashed a relatively small number of PCs, the problem actually
affected many more, he argued. "It may have affected just a few
people, but it scared almost everyone into not patching," Miller said.

Although scattered reports of problems with Tuesday's security updates
have been posted on Microsoft's support forum, Computerworld did not
find any message threads describing Blue Screen of Death crashes after
users applied yesterday's MS10-021 kernel update.

Enterprises should still test the update before widely deploying it,
Miller recommended. "With every kernel patch, you really have to test.
We're pretty adamant about that," he said.

Microsoft also urged users to apply MS10-021 to protect themselves.
Although attacks had not been found in the wild exploiting any of the
eight vulnerabilities addressed by the update, the company noted that
users would "likely...see reliable exploit code developed for one or
more of these eight vulnerabilities" in the next 30 days.

This month's security update, including MS10-021, can be downloaded
and installed via the Windows Update and Microsoft Update services, as
well as through Windows Server Update Services.
From: Tecknomage on
On Wed, 14 Apr 2010 19:43:14 -0700 (PDT), Ablang <ron916(a)gmail.com>
wrote:

> Microsoft Tries to Avoid Windows Blue Screen Repeat
>
> Gregg Keizer
> Apr 14, 2010 5:09 am
>
> http://www.pcworld.com/article/194205/microsoft_tries_to_avoid_windows_blue_screen_repeat.html
>
> Microsoft took steps Tuesday to avoid repeating the debacle two months
> ago that left Windows XP users staring at the notorious "Blue Screen
> of Death" error message after they applied a patch.
>
> In February, a security update that fixed two flaws in the Windows
> kernel -- the operating system's most important component -- wreaked
> havoc when it was applied by users, who almost immediately flooded
> Microsoft 's support forum with reports of crippled computers .
>
> As the number of reports grew, Microsoft first stopped automatically
> serving the MS10-015 update, then confirmed that a rootkit caused the
> crashes . Only PCs that had been previously infected with the Alureon
> rootkit were incapacitated, Microsoft's investigation found.
>
> Microsoft restarted distribution of the update only after it had come
> up with a way to block rootkit-infected PCs from receiving the
> patches. "If detection logic included in Automatic Update discovers
> abnormal conditions in certain operating system file configurations,
> the update will fail and customers will be presented with an error
> message that offers alternative support options," said Jerry Bryant,
> general manager with the Microsoft Security Response Team, in early
> March.
>
> MS10-021 , one of the 11 updates issued yesterday as part of
> Microsoft's monthly Patch Tuesday cycle , also fixed flaws in the
> Windows kernel. But Microsoft is hoping that this month's update won't
> trigger a repeat Blue Screen of Death.
>
> "This security update includes package detection logic that prevents
> the installation of the security update if certain abnormal conditions
> exist on 32-bit systems," stated the MS10-021 bulletin. "These
> abnormal conditions on a system could be the result of an infection
> with a computer virus that modifies some operating system files, which
> renders the infected computer incompatible with the kernel update."
>
> One security expert applauded the move.
>
> "I give Microsoft a big tip of the hat for not taking [the February
> incident] as a one-off," said Jason Miller, data and security team
> manager at network compliance and security vendor Shavlik
> Technologies. "The kernel is something that if something goes bad,
> that's not good. Patching the kernel is not like patching a media
> player."
>
> Microsoft obviously learned a lesson. Even though the February update
> crashed a relatively small number of PCs, the problem actually
> affected many more, he argued. "It may have affected just a few
> people, but it scared almost everyone into not patching," Miller said.
>
> Although scattered reports of problems with Tuesday's security updates
> have been posted on Microsoft's support forum, Computerworld did not
> find any message threads describing Blue Screen of Death crashes after
> users applied yesterday's MS10-021 kernel update.
>
> Enterprises should still test the update before widely deploying it,
> Miller recommended. "With every kernel patch, you really have to test.
> We're pretty adamant about that," he said.
>
> Microsoft also urged users to apply MS10-021 to protect themselves.
> Although attacks had not been found in the wild exploiting any of the
> eight vulnerabilities addressed by the update, the company noted that
> users would "likely...see reliable exploit code developed for one or
> more of these eight vulnerabilities" in the next 30 days.
>
> This month's security update, including MS10-021, can be downloaded
> and installed via the Windows Update and Microsoft Update services, as
> well as through Windows Server Update Services.

My question would be why didn't the version of "Malicious Software
Removal Tool" prior to the update causing the BSoD find and remove
offending rootkit? Isn't that what the tool is for??

Was this a case where Microsoft was not aware of the particular
rootkit at the time?



--
======== Tecknomage ========
Computer Systems Specialist
IT Technician
San Diego, CA
From: Swifty on
On Thu, 15 Apr 2010 04:19:46 -0700, Tecknomage <tecknode(a)NOSPAM.com>
wrote:

>My question would be why didn't the version of "Malicious Software
>Removal Tool" prior to the update causing the BSoD find and remove
>offending rootkit? Isn't that what the tool is for??

I've never managed to work out whether the Malicious Software Removal
Tool is just something that just runs whenever it downloads in Windows
Update, or it is (as the name implies) a tool that can be used by the
user to help them remove malicious software.

I've got quite a lot of stuff on my PC which I'd class as malicious -
put there by my employer. :-)

--
Steve Swift
http://www.swiftys.org.uk/swifty.html
http://www.ringers.org.uk
From: Tecknomage on
On Thu, 15 Apr 2010 16:30:38 +0100, Swifty <steve.j.swift(a)gmail.com>
wrote:

> On Thu, 15 Apr 2010 04:19:46 -0700, Tecknomage <tecknode(a)NOSPAM.com>
> wrote:
>
> >My question would be why didn't the version of "Malicious Software
> >Removal Tool" prior to the update causing the BSoD find and remove
> >offending rootkit? Isn't that what the tool is for??
>
> I've never managed to work out whether the Malicious Software Removal
> Tool is just something that just runs whenever it downloads in Windows
> Update, or it is (as the name implies) a tool that can be used by the
> user to help them remove malicious software.
>

I know it does run when installed. Took 45min to scan our Fileserver
just the other day (large hard drive storage). On desktops it takes
something like 5min.

As to running manually? Good question. Run at bootup?

Of course, the newer, good AntiVirus have rootkit detection/removal.
We use Symantec AntiVirus Corporate at work and I use BitDefender
AntiVirus 2009 at home, both take care of rootkits.



--
======== Tecknomage ========
Computer Systems Specialist
IT Technician
San Diego, CA
 | 
Pages: 1
Prev: HP Deskjet 935 C
Next: error messages