Patches and Service Packs

Latest MS Security Bulletins

Latest Microsoft Hotfixes and Patches – Hotfix & Security Bulletin ServiceThe following list is taken from the Microsoft HotFix and Security Bulleting Service

Note: This list is NOT a complete list of all Hotfixes and Patches provided by Microsoft. For the complete list please see the link above.

Also, take a look at my Updating and Management Tools section for more info on how to scan your network for missing Security Bulletins and on how to deploy them.

Note: Security Updates that were released during 2004 (starting with MS04) can be found in the MS Security Bulletins – 2004 Archive page.

Sponsored Content

Passwords Haven’t Disappeared Yet

123456. Qwerty. Iloveyou. No, these are not exercises for people who are brand new to typing. Shockingly, they are among the most common passwords that end users choose in 2021. Research has found that the average business user must manually type out, or copy/paste, the credentials to 154 websites per month. We repeatedly got one question that surprised us: “Why would I ever trust a third party with control of my network?

Date Bulletin Description Affected Service Packs Max Bulletin Severity
Jan 10, 2006 Vulnerability in TNEF Decoding in Microsoft Outlook and Microsoft Exchange Could Allow Remote Code Execution: MS06-003 Affected Software: Office 2000, Outlook 2000, Office XP, Outlook 2002, Office 2003, Outlook 2003, Exchange Server 5.0, Exchange Server 5.5, Exchange 2000 Server, Exchange 2000 Enterprise Server Office 2000 Service Pack 3, Office XP SP3 , Office 2003 SP1, Office 2003 SP2, Outlook 2003 SP1, Outlook 2003 SP2, Exchange Server 5.0 SP2, Exchange Server 5.5 SP4, Exchange 2000 SP3 Critical
Jan 10, 2006 Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution: MS06-002 Affected Software: Windows 2000 Advanced Server, Windows 2000 Datacenter Server, Windows 2000 Professional, Windows 2000 Server, Windows XP Home Edition, Windows XP Professional, Windows XP Professional 64-Bit Edition, Windows Server 2003 for Small Business Server, Windows Server 2003, Datacenter Edition, Windows Server 2003, Enterprise Edition, Windows Server 2003, Standard Edition, Windows Server 2003, Web Edition, Windows Server 2003 Datacenter Edition for Itanium-based Systems, Windows Server 2003 Enterprise Edition for Itanium-based Systems, Windows Server 2003 Datacenter x64 Edition, Windows Server 2003 Enterprise x64 Edition, Windows Server 2003 Standard x64 Edition, Windows Me, Windows 98, Windows 98 SE Windows 2000 Service Pack 4, Windows XP Service Pack 1, Windows XP Service Pack 2, Windows XP 64-Bit Gold, Windows Server 2003 Gold, Windows XP 64-Bit SP1, Windows Server 2003 SP1, Windows Server 2003 for Itanium-based Systems Gold, Windows Server 2003 for Itanium-based Systems SP 1, Windows Server 2003 x64 Gold, Windows Me Gold, Windows 98 Gold, Windows 98 SE Gold, Windows 98 SP1 Critical
Jan 5, 2006 Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution (912919): MS06-001 Affected Software: Windows 2000 Advanced Server, Windows 2000 Datacenter Server, Windows 2000 Professional, Windows 2000 Server, Windows XP Home Edition, Windows XP Professional, Windows Server 2003 for Small Business Server, Windows Server 2003, Datacenter Edition, Windows Server 2003, Enterprise Edition, Windows Server 2003, Standard Edition, Windows Server 2003, Web Edition, Windows XP Professional 64-Bit Edition, Windows Server 2003 Datacenter Edition for Itanium-based Systems, Windows Server 2003 Enterprise Edition for Itanium-based Systems, Windows Server 2003 Datacenter x64 Edition, Windows Server 2003 Enterprise x64 Edition, Windows Server 2003 Standard x64 Edition Windows 2000 Service Pack 4, Windows XP Service Pack 1, Windows XP Service Pack 2, Windows Server 2003 Gold, Windows Server 2003 SP1, Windows XP 64-Bit Gold, Windows Server 2003 for Itanium-based Systems Gold, Windows Server 2003 for Itanium-based Systems SP 1, Windows Server 2003 x64 Gold Critical

See older Security Updates in the MS Security Bulletins – 2004 Archive and MS Security Bulletins – 2005 Archive pages.

 

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

Don't leave your business open to attack! Come learn how to protect your AD in this FREE masterclass!REGISTER NOW - Thursday, December 2, 2021 @ 1 pm ET

Active Directory (AD) is leveraged by over 90% of enterprises worldwide as the authentication and authorization hub of their IT infrastructure—but its inherent complexity leaves it prone to misconfigurations that can allow attackers to slip into your network and wreak havoc. 

Join this session with Microsoft MVP and MCT Sander Berkouwer, who will explore:

  • Whether you should upgrade your domain controllers to Windows Server
    2019 and beyond
  • Achieving mission impossible: updating DCs within 48 hours
  • How to disable legacy protocols and outdated compatibility options in
    Active Directory

Sponsored by: