Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

MS 'WMF' Patch released today - Please Update!


  • Please log in to reply

#1
Chachazz

Chachazz

    Member 3k

  • Member
  • PipPipPipPipPipPip
  • 3,046 posts
Title: Microsoft Security Response Center Bulletin Notification
Issued: January 05, 2006
********************************************************************

Summary
=======
Important Information for Thursday 5 January 2006

Microsoft announced that it would release a security update to help
protect customers from exploitations of a vulnerability in the
Windows Meta File (WMF) area of code in the Windows operating system
on Tuesday, January 2, 2006, in response to malicious and criminal
attacks on computer users that were discovered last week.

Microsoft will release the update today on Thursday, January 5, 2006,
earlier than planned.


Microsoft originally planned to release the update on Tuesday,
January 10, 2006 as part of its regular monthly release of security
bulletins, once testing for quality and application compatibility
was complete. However, testing has been completed earlier than
anticipated and the update is ready for release.

In addition, Microsoft is releasing the update early in response to
strong customer sentiment that the release should be made available
as soon as possible.

Microsoft's monitoring of attack data continues to indicate that the
attacks are limited and are being mitigated both by Microsoft's
efforts to shut down malicious Web sites and with up-to-date
signatures form anti-virus companies.

The security update will be available at 2:00 pm PT as MS06-001.

Enterprise customers who are using Windows Server Update Services
will receive the update automatically. In additional the update is
supported Microsoft Baseline Security Analyzer 2.0, Systems
Management Server, and Software Update Services. Enterprise
customers can also manually download the update from the Download
Center.

Microsoft will hold a special Web cast on Friday, January 6, 2006,
to provide technical details on the MS06-001 and to answer questions.
Registration details will be available at
http://www.microsoft...ty/default.mspx.

Microsoft will also be releasing additional security updates on
Tuesday, January 10, 2006
as part of its regularly scheduled release
of security updates.

More Info: MS Security Alert»

The patch is available through Windows Update

Please also see:
Microsoft Security Bulletin «MS06-001»
Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution (912919)
Published: January 5, 2006
Version: 1.0
Manual Download available.
  • 0

Advertisements


#2
diggeryo

diggeryo

    Member

  • Member
  • PipPipPip
  • 343 posts
If I originally applied the "regsvr32.exe /u shimgvw.dll" workaround and now have downloaded and installed the official update, is there anything additional I must do since I used the unofficial workaround at first?

thanks,
mike.
  • 0

#3
physician

physician

    Member

  • Member
  • PipPipPip
  • 100 posts

If I originally applied the "regsvr32.exe /u shimgvw.dll" workaround and now have downloaded and installed the official update, is there anything additional I must do since I used the unofficial workaround at first?

thanks,
mike.


This needs to be done...doc

http://isc.sans.org/...ss&storyid=1019

1. Reboot your system to clear any vulnerable files from memory
2. Download and apply the new patch
3. Reboot
4. Uninstall the unofficial patch, by using one of these methods:
a. Add/Remove Programs on single systems. Look for "Windows WMF Metafile Vulnerability HotFix"
b. or at a command prompt:
"C:\Program Files\WindowsMetafileFix\unins000.exe" /SILENT
c. or, if you used msi to install the patch on multiple machines you can uninstall it with this:
msiexec.exe /X{E1CDC5B0-7AFB-11DA-8CD6-0800200C9A66} /qn
5. Re-register the .dll if you previously unregistered it (use the same command but without the "-u"):
regsvr32 %windir%\system32\shimgvw.dll
6. Optionally, reboot one more time just for good measure (not required, but doesn't hurt)
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP