Home > Microsoft Security > Microsoft Security Patch 10-046

Microsoft Security Patch 10-046

Contents

Supported Security Update Installation Switches SwitchDescription /?, /h, /help Displays help on supported switches. /quiet Suppresses the display of status or error messages. /norestart When combined with /quiet, the system will This security update will also be available through the Microsoft Update Web site. Workarounds for Shortcut Icon Loading Vulnerability - CVE-2010-2568 Workaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before This security update is rated Important for Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.0 Service Pack 2, Microsoft .NET Framework 3.5, and Microsoft .NET Framework 3.5.1 on his comment is here

For more information about the supported installation switches, see Microsoft Knowledge Base Article 262841. Supported Security Update Installation Switches SwitchDescription /help Displays the command-line options Setup Modes /passive Unattended Setup mode. Wait 5-10 minuts. Deployment Information To install the security update without any user intervention, use the following command at a command prompt for Microsoft Windows XP: Windowsxp-kb899589-x86-enu /quiet Note Use of the /quiet switch

Ms16-049

Many websites that are on the Internet or on an intranet use Active Scripting to provide additional functionality. Administrators should use one of the supported methods to verify the installation was successful when they use the /quiet switch. Microsoft Software Update Services Microsoft Windows Server Update Services Microsoft Baseline Security Analyzer (MBSA) Windows Update Microsoft Update Windows Update Catalog: For more information about the Windows Update Catalog, see Microsoft

  • If the file or version information is not present, use one of the other available methods to verify update installation.
  • For more information about how to deploy this security update using Windows Server Update Services, visit the Windows Server Update Services Web site.
  • Restart Options /norestart Does not restart when installation has completed /forcerestart Restarts the computer after installation and force other applications to close at shutdown without saving open files first. /warnrestart[:x] Presents

The following mitigating factors may be helpful in your situation: An attacker who successfully exploits this vulnerability could gain the same user rights as the local user. This Fix it solution deploys the workaround, and thus has the same user impact. File Information See Microsoft Knowledge Base Article 2286198 Registry Key Verification Note A registry key does not exist to validate the presence of this update. Ms16-044 However, an attacker could use this ASLR bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability that could take advantage of the ASLR bypass to run

Also, this registry key may not be created correctly when an administrator or an OEM integrates or slipstreams the 899589 security update into the Windows installation source files. Ms15-046 Do I need to install all the updates listed in the Affected Software table for the software?  Yes. For more information about this behavior, see Microsoft Knowledge Base Article 824994. When you view the file information, it is converted to local time.

For more information about MBSA, visit the Microsoft Baseline Security Analyzer Web site. Ms16-047 See the section, Detection and Deployment Tools and Guidance, earlier in this bulletin for more information. File information See Microsoft Knowledge Base Article 2984625 Registry key verification For Microsoft .NET Framework 2.0 Service Pack 2:Note A registry key does not exist to validate the presence of this update. Can I use Systems Management Server (SMS) to determine whether this update is required?

Ms15-046

Disabling icons from being displayed for shortcuts prevents the issue from being exploited on affected systems. Removal Information WUSA.exe does not support uninstall of updates. Ms16-049 It has saved them days of recovery time on more than one occasion, most recently a few Patch Tuesdays ago. (I've been lucky for several years now.)Mechanical hard drives have become Ms16-048 The content you requested has been removed.

Otherwise, the installer copies the RTMGDR, SP1GDR, or SP2GDR files to your system. this content If the required files are being used, this update will require a restart. Verifying that the Update Has Been Applied Microsoft Baseline Security Analyzer To verify that a security update has been applied to an affected system, you may be able to use the Note If you want to enable certain programs and services to communicate through the firewall, click Settings on the Advanced tab, and then select the programs, the protocols, and the services 046 Area Code

The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits a webpage that contains specially crafted embedded fonts.MS16-040 - Security SoftwareSMS 2.0SMS 2003 with SUITSMS 2003 with ITMUConfiguration Manager 2007 Windows XP Service Pack 3YesYesYesYes Windows XP Professional x64 Edition Service Pack 2NoNoYesYes Windows Server 2003 Service Pack 2YesYesYesYes Windows Server and Canada can receive technical support from Security Support or 1-866-PCSAFETY. weblink Yes No Additional feedback? 1500 characters remaining Submit Skip this Thank you!

Customers who have already installed the update successfully do not need to reinstall the update. 046 Country Code On the Version tab, determine the version of the file that is installed on your computer by comparing it to the version that is documented in the appropriate file information table.Note You can do this by setting your browser security to High.

If this behavior occurs, a message appears that advises you to restart.

Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers when this security bulletin was originally issued. For more information about this behavior, see Microsoft Knowledge Base Article 824994. You may also click on the Details tab and compare information, such as file version and date modified, with the file information tables provided in the bulletin KB article. Windows 10 However, if the required services cannot be stopped for any reason, or if required files are being used, this update will require a restart.

Supported Security Update Installation Switches SwitchDescription /?, /h, /help Displays help on supported switches. /quiet Suppresses the display of status or error messages. /norestart When combined with /quiet, the system will Manage Your Profile | Flash Newsletter | Contact Us | Privacy Statement | Terms of Use | Trademarks | © 2017 Microsoft © 2017 Microsoft check over here Setup Modes /passive Unattended Setup mode.

You should review each software program or component listed to see whether any security updates pertain to your installation. Of course, in the preceding month I had an "Important," pre-checkmarked Windows 10 Compatibility Update that kept mysteriously unhiding itself and which I had to re-uncheck and re-hide two or three Vulnerability Details Client Service for NetWare Vulnerability - CAN-2005-1985 A remote code execution vulnerability exists in the Client Service for NetWare (CSNW) that could allow an attacker who successfully exploited this Not applicable Not applicable Not applicable Affected Software The following tables list the bulletins in order of major software category and severity.

For more information on this installation option, see the TechNet articles, Managing a Server Core Installation and Servicing a Server Core Installation. Also, in certain cases, files may be renamed during installation. The content you requested has been removed. IT Pro Security Community Learn to improve security and optimize your IT infrastructure, and participate with other IT Pros on security topics in IT Pro Security Community.

Powerful devices designed around you.Learn moreShop nowWindows comes to life on these featured PCs.Shop nowPreviousNextPausePlay Security Update for Windows 7 (KB2286198) Select Language: ArabicBulgarianChinese (Hong Kong SAR)Chinese (Simplified)Chinese (Traditional)CroatianCzechDanishDutchEnglishEstonianFinnishFrenchGermanGreekHebrewHungarianItalianJapaneseKoreanLatvianLithuanianNorwegian (Bokmal)PolishPortuguese (Brazil)Portuguese Disclaimer The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. We appreciate your feedback. This mode can help reduce the likelihood of the exploitation of these Adobe Flash Player vulnerabilities in Internet Explorer.

Finally, you may also click on the Previous Versions tab and compare file information for the previous version of the file with the file information for the new, or updated, version Show: Inherited Protected Print Export (0) Print Export (0) Share IN THIS ARTICLE Is this page helpful? Also, this registry key may not be created correctly if an administrator or an OEM integrates or slipstreams the 899589 security update into the Windows installation source files. The content you requested has been removed.

Security Update Deployment Affected Software For information about the specific security update for your affected software, click the appropriate link: Windows XP (all editions) Reference Table The following table contains the I have Microsoft Word 2010 installed. Obtaining Other Security Updates: Updates for other security issues are available at the following locations: Security updates are available in the Microsoft Download Center. In the All or part of the file name box, type a file name from the appropriate file information table, and then click Search.

To re-enable ActiveX controls in Microsoft Office 2007 and Microsoft Office 2010, perform the following steps: Click File, click Options, click Trust Center, and then click Trust Center Settings. You’ll be auto redirected in 1 second.