Windows Secrets does not publish on any fifth Thursday of the month. Because September’s second Patch Tuesday fell on the 28th (a no-newsletter week), we have posted a special Patch Watch update here in the Lounge.
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Patch Watch update
Home » Forums » Newsletter and Homepage topics » Patch Watch update
- This topic has 6 replies, 5 voices, and was last updated 14 years, 6 months ago.
AuthorTopicWSTracey Capen
AskWoody LoungerSeptember 22, 2010 at 5:09 pm #471841Viewing 5 reply threadsAuthorReplies-
WSSusanBradley
AskWoody LoungerSeptember 28, 2010 at 8:27 pm #1247093MS10-070 Out of band update for ASP.NET
Microsoft released MS10-070 today, an out-of-cycle patch described in an MS Security Response Center blog.
My first recommendation is to not panic, even though out-of-cycle patches are usually worrisome. Note that at this time, this security update just became available on Windows Update, Microsoft Update, and WSUS.
UPDATE 2010-09-30: The patch has now been released to Microsoft Update and Windows Update. Anyone with a standalone workstation — not a server — can simply hide these updates by expanding the patch detail in the Microsoft Update window and uncheck the box.
Once you uncheck the box, click to expand the details of the update and you can click to hide the updates (note you may be offered up to four .NET updates depending on the versions you have installed).
There is a higher risk for small-business and home servers, I still believe that attackers will go after larger targets. This is not the traditional exploit — it’s a tool attackers use to gain information from a target site, while they will then use to gain more access.
Who’s affected by this update
Consumers: You are not at risk here unless you run a web server from your Windows XP, Vista or Windows 7. Since most of you don’t, just ignore all of those server admins running around in a panic and check back tomorrow when I’ll report on the Windows 7 updates that were released today as well.
Server Admins: If you have a Web site that runs .NET versions 1.1 through 4, heads up! You’ll be wanting to be on alert.
.NET used for financial services: For those admins that run .NET-based Web sites and have links inside the webconfig file to financial third-party firms (like paypal.com) you’ll want to test and deploy this as soon as you can. You are the most at risk. The vulnerability can be used to get some key information about your setup and, more importantly, about the security of your Web server.
“In Microsoft .NET Framework 3.5 Service Pack 1 and above, this vulnerability can be used by an attacker to retrieve the contents of any file within the ASP.NET application, including web.config” and “This vulnerability can also be used for data tampering, which, if successfully exploited, could be used to decrypt and tamper with the data encrypted by the server” (from http://isc.sans.edu/diary.html?storyid=9625)
.NET for SharePoint: If you have sensitive data in SharePoint that is open to the Internet, you also should test these patches and quickly install them. However, if you do not have it exposed to the Web — it’s totally inside your firm on an intranet — then I recommend you wait until the updates are available on Microsoft Update, Windows Update, or WSUS.
Small Business or Home Servers using Remote Web Workplace: Don’t panic. Even if you have sensitive information on your server, unless you are specifically seeing Event code 3005 (this will be under the more generic event 1309 in your event logs — *(see this blog for what an actual attack looks like in your event logs), you should not be worried. If you do see Event 3005 in your externally-facing Web-server application log files and the detail of the event looks exactly as what is shown in that blog post, call Microsoft at 1-866-PCSafety or 1-800-Microsoft and let them know you are seeing attacks on your systems.
For those of us in the small-business world, sometimes the risk of the updates are greater than the risk of not updating. Trying to determine what version of .net you have is extremely confusing (more on this below) and we all know how hard it is to install .NET updates. Microsoft is completing their detection testing to allow the update to be deployed via Windows Update, Microsoft Update, and WSUS. Thus I have no hesitation in saying that for us, it’s better to wait for the testing to complete, and to wait for others to go first before deploying these updates ourselves.
If you install these updates and get stuck, use the Aaron Stebner rip out tool (download page) to remove all versions of .NET and reinstall them.
How do determine what version of updates is need
This can be confusing. One of the easiest tools I’ve found to determine what versions of .net you have installed is to review the user-agent string in your Internet Explorer browser.
First go to the Web Site and click on Analyze my UA..
You’ll then get a result similar to: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.2; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729).
In the table below it will list the versions of .NET you have installed. For example:
.NET CLR 1.1.4322 Microsoft dot NET installed. version: 1.1.4322
.NET CLR 2.0.50727 Microsoft dot NET installed. version: 2.0.50727
.NET CLR 3.0.4506.2152 Microsoft dot NET installed. version: 3.0.4506.2152
.NET CLR 3.5.30729 Microsoft dot NET installed. version: 3.5.30729Now comes the fun part. Go to Scott Guthrie’s ASP blog and, from the table he lists, download the patches that correspond to the operating system you’re running. In the example above (a Home Server) it’s Windows 2003 SP2.
You can match up those .NET versions with the corresponding service pack info listed on Aaron Stebner’s blog, and you can compare the exact .NET version with Aaron’s table to determine what version and service pack you have. Now refer back to Scott Guthrie’s ASP blog for the links for our version that we need.
So from our example above:
.NET CLR 1.1.4322 Microsoft dot NET installed. version: 1.1.4322 equals .NET 1.1 SP1
.NET CLR 2.0.50727 Microsoft dot NET installed. version: 2.0.50727 equals .NET 2.0 SP2
.NET CLR 3.0.4506.2152 Microsoft dot NET installed. version: 3.0.4506.2152 equals .NET 3.0 SP2
.NET CLR 3.5.30729 Microsoft dot NET installed. version: 3.5.30729 equals .NET 3.5 SP1And comparing it to Scott’s table for Windows 2003 SP2, it appears we’ll need KB2416451,
KB2418241, and KB2416473.Confusing, isn’t it? As this exercise proves, for Small Business and Home Servers, it’s much safer to wait for the detection of Microsoft Update/Windows Update before we begin a manual deployment like this.
-
WSNanooGeek
AskWoody LoungerOctober 7, 2010 at 10:09 pm #1248529MS Automatic Updates offered this (KB 2416447, 2416472, 2416473, 2418241) to one workstation (WinXP MCE 2005 SP3) on 02Oct. Same patches were offered by Microsoft Update for 3 XP Home SP3 systems. No problems observed on any of those 4 systems, over the 5 days since (crossing fingers Now …).
-
Chris B
AskWoody Plus -
WSSusanBradley
AskWoody Lounger -
Chris B
AskWoody Plus -
WSdickcaro
AskWoody LoungerOctober 28, 2010 at 3:30 pm #1252277Foolishly, I did not wait for Susan’s column and just clicked on OK to install the new patches to Win 7. It appears that the one patch that does not allow itself to be uninstalled, KB976902 (Susan says to ignore it) has killed my wireless adapter. Not only can I not uninstall this patch, but I cannot even restore my system to the pre-patch point because System Recovery fails even in Safe-Mode. I was able to uninstall all of the other patches made on 10/27, but not the one in question. It’s a killer, and I don’t know how to recover other than re-installing Windows 7. Any suggestions?
The symptom is that the wireless adapter is disabled in the Control Panel/Network Connections window and does not respond to the right-click “Enable” command or any other attempt to enable it. I have deleted the device in Device Manager, and rebooted. It is found and installed with the latest driver from Broadcom, but it still will not be enabled. It has been working well up until I installed the Win7 patches. So it seems that this patch is doing me in. I have tried all my usual magic to recover, but this one will not go away. There seems to be nothing on the MS site about any problems with KB976902. Any ideas???
Viewing 5 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Trump signs Take It Down Act
by
Alex5723
44 minutes ago -
Do you have a maintenance window?
by
Susan Bradley
1 hour, 10 minutes ago -
Freshly discovered bug in OpenPGP.js undermines whole point of encrypted comms
by
Nibbled To Death By Ducks
2 hours, 18 minutes ago -
Success Knows No End in the World of Online Slots (Awaiting moderation)
by
isobelhartmann1
2 hours, 27 minutes ago -
Cox Communications and Charter Communications to merge
by
not so anon
4 hours, 4 minutes ago -
Help with WD usb driver on Windows 11
by
Tex265
9 hours, 13 minutes ago -
hibernate activation
by
e_belmont
12 hours, 59 minutes ago -
Red Hat Enterprise Linux 10 with AI assistant
by
Alex5723
16 hours, 46 minutes ago -
Windows 11 Insider Preview build 26200.5603 released to DEV
by
joep517
19 hours, 51 minutes ago -
Windows 11 Insider Preview build 26120.4151 (24H2) released to BETA
by
joep517
19 hours, 53 minutes ago -
Fixing Windows 24H2 failed KB5058411 install
by
Alex5723
2 minutes ago -
Out of band for Windows 10
by
Susan Bradley
1 day ago -
Giving UniGetUi a test run.
by
RetiredGeek
1 day, 7 hours ago -
Windows 11 Insider Preview Build 26100.4188 (24H2) released to Release Preview
by
joep517
1 day, 15 hours ago -
Microsoft is now putting quantum encryption in Windows builds
by
Alex5723
1 hour, 13 minutes ago -
Auto Time Zone Adjustment
by
wadeer
1 day, 19 hours ago -
To download Win 11 Pro 23H2 ISO.
by
Eddieloh
1 day, 17 hours ago -
Manage your browsing experience with Edge
by
Mary Branscombe
21 hours, 55 minutes ago -
Fewer vulnerabilities, larger updates
by
Susan Bradley
10 hours, 21 minutes ago -
Hobbies — There’s free software for that!
by
Deanna McElveen
16 hours, 45 minutes ago -
Apps included with macOS
by
Will Fastie
14 hours, 37 minutes ago -
Xfinity home internet
by
MrJimPhelps
11 hours, 24 minutes ago -
Convert PowerPoint presentation to Impress
by
RetiredGeek
1 day, 12 hours ago -
Debian 12.11 released
by
Alex5723
2 days, 16 hours ago -
Microsoft: Troubleshoot problems updating Windows
by
Alex5723
2 days, 20 hours ago -
Woman Files for Divorce After ChatGPT “Reads” Husband’s Coffee Cup
by
Alex5723
1 day, 23 hours ago -
Moving fwd, Win 11 Pro,, which is best? Lenovo refurb
by
Deo
3 hours, 35 minutes ago -
DBOS Advanced Network Analysis
by
Kathy Stevens
3 days, 13 hours ago -
Microsoft Edge Launching Automatically?
by
healeyinpa
3 days, 3 hours ago -
Google Chrome to block admin-level browser launches for better security
by
Alex5723
1 day, 1 hour ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.