While talk heats up that Windows 8 is killing the PC market it turns out that a Windows 7 security patch may be literally knocking out some PCs. Microsoft is warning Windows 7 users to uninstall a security patch it issued earlier this week because some PCs won't restart after deploying the fix.
Specifically, Microsoft is advising users of both Windows 7 and Windows Server 2008 R2 to revert to the pre-patch state. These users should uninstall the patch in security bulletin MS 13-036. MS13-036 is another kernel mode drivers issue, similar to the other kernel issue this month.
"We've determined that the update, when paired with certain third-party software , can cause system errors," said Dustin Childs, group manager of Response Communications for Microsoft Trustworthy Computing. "As a precaution, we stopped pushing 2823324 as an update when we began investigating the error reports, and have since removed it from the download center ."
Setting the Record Straight
Childs then moved to set the record straight. Contrary to some reports, he said, the system errors do not result in any data loss nor affect all Windows customers. However, he added, all customers should follow the guidance Microsoft has provided to uninstall the security update if it is already installed. That information can be found at support.microsoft.com/kb/2839011.
"[The patch] addresses a moderate-level vulnerability that requires an attacker to have physical computer access to exploit," Childs said. "MS13-036 remains available for download and is being pushed via updates to help protect customers against the other issues documented in the security bulletin -- it no longer contains the affected update."
What are the other issues? We asked Paul Henry, a forensics analyst at Lumension, for a rundown on the threats. He told us there are four Common Vulnerabilities and Exposures (CVE) in MS13-036.
"Three allow a local user to use kernel-raise conditions to elevate to system access. The fourth CVE is a moderate elevation of privilege issue, which is unusual for Microsoft. To leverage this CVE, an attacker would need to be an admin, which removes the need to leverage it," Henry said. (continued...)
Posted: 2013-05-04 @ 12:40pm PT
Nice to tell us something we already know. Horrible because it offers no solution when, like me, my server 2008 R2 is dead and can't recover.