Windows Millennium (ME) Patches

Windows Millennium (ME) Patches

No one will help you, no one will support you, no one will ever hear you cry!

The best patch to this sorry-looking, miserable, ill-fated, bugged, problematic and sick operating system is to format your hard disk and install a fresh copy of Windows XP Pro (Home Edition if you must). Even Windows 98 SE is a better choice (As Microsoft themselves say, and as support for this Joke-OS is virtually non-existent). No, an upgrade is not an option. Format your HD and get done with it.

Required Patches

If you really must, Windows ME requires the following security-related patches:

Sponsored Content

What is “Inside Microsoft Teams”?

“Inside Microsoft Teams” is a webcast series, now in Season 4 for IT pros hosted by Microsoft Product Manager, Stephen Rose. Stephen & his guests comprised of customers, partners, and real-world experts share best practices of planning, deploying, adopting, managing, and securing Teams. You can watch any episode at your convenience, find resources, blogs, reviews of accessories certified for Teams, bonus clips, and information regarding upcoming live broadcasts. Our next episode, “Polaris Inc., and Microsoft Teams- Reinventing how we work and play” will be airing on Oct. 28th from 10-11am PST.

Make sure you read Internet Explorer 5.X and 6.0 Patches and Internet Explorer 6.0 SP1 Patches before you go on.

August 2005

MS05-040 : Vulnerability in Telephony Service Could Allow Remote Code Execution (893756)

July 2005

MS05-037 : Vulnerability in JView Profiler Could Allow Remote Code Execution (903235)

MS05-036 : Vulnerability in Microsoft Color Management Module Could Allow Remote Code Execution (901214)

June 2005

MS05-032 : Vulnerability in Microsoft Agent Could Allow Spoofing (890046)

MS05-030 : Cumulative Security Update in Outlook Express (897715)

MS05-026 : Vulnerability in HTML Help Could Allow Remote Code Execution (896358)

May 2005

MS05-024 : Vulnerability in Web View Could Allow Remote Code Execution (894320)

April 2005

MS05-019 : Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service (893066)

MS05-018 : Vulnerability in Windows Kernel Could Allow Elevation of Privilege and Denial of Service (890859)

MS05-016 : Vulnerability in Windows Shell that Could Allow Remote Code Execution (893086)

February 2005

MS05-015 : Vulnerability in Hyperlink Object Library Could Allow Remote Code Execution (888113)

MS05-013 : Vulnerability in the DHTML Editing ActiveX Control could allow code execution (891781)

MS05-012 : Vulnerability in OLE and COM Could Allow Remote Code Execution (873333)

MS05-010 : Vulnerability in the License Logging Service Could Allow Code Execution (885834)

MS05-009 : Vulnerability in PNG Processing Could Lead to Buffer Overrun (890261)

January 2005

MS05-002 : Vulnerability in Cursor and Icon Format Handling Could Allow Remote Code Execution (891711)

MS05-001 : Vulnerability in HTML Help Could Allow Code Execution (890175)

December 2004

MS04-041 : Vulnerability in WordPad Could Allow Code Execution (885836)

October 2004

MS04-037 : Vulnerability in Windows Shell Could Allow Remote Code Execution (841356)

MS04-032 : Security Update for Microsoft Windows (840987)

MS04-031 : Vulnerability in NetDDE Could Allow Remote Code Execution (841533)

July 2004

MS04-024 : Vulnerability in Windows Shell Could Allow Remote Code Execution (839645)

MS04-023 : Vulnerability in HTML Help Could Allow Code Execution (840315)

October 2003

MS03-044 : Buffer Overrun in Windows Help and Support Center Could Lead to System Compromise (825119)

July 2003

MS03-030 : Unchecked Buffer in DirectX Could Enable System Compromise (819696)

MS03-023 : Buffer Overrun In HTML Converter Could Allow Code Execution (823559)

June 2003

MS03-020 : Cumulative Patch for Internet Explorer (818529)

April 2003

MS03-011 : Flaw in Microsoft VM Could Enable System Compromise (816093)

March 2003

MS03-008 : Flaw in Windows Script Engine could allow code execution (814078)

February 2003

MS03-006 : Flaw in Windows Me Help and Support Center Could Enable Code Execution (812709)

November 2002

MS02-065 : Buffer Overrun in Microsoft Data Access Components Could Lead to Code Execution (329414)

MS02-050 : Certificate Validation Flaw Could Enable Identity Spoofing (328115) (Reposted)

October 2002

MS02-055 : Unchecked Buffer in Windows Help Facility Could Enable Code Execution (323255)

MS02-054 : Unchecked Buffer in File Decompression Functions Could Lead to Code Execution (329048)

August 2002

MS02-048 : Flaw in Certificate Enrollment Control Could Allow Deletion of Digital Certificates (323172)

March 2002

MS02-013 : 04 March 2002 Cumulative VM Update

December 2001

MS01-059 : Unchecked Buffer in Universal Plug and Play Can Lead to System Compromise

November 2001

MS01-054 : Invalid Universal Plug and Play Request Can Disrupt System Operation

April 2001

MS01-022 : WebDAV Service Provider Can Allow Scripts to Levy Requests as User

March 2001

MS01-019 : Passwords for Compressed Folders are Recoverable

MS01-017 : Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard

November 2000

MS00-091 : Incomplete TCP/IP Packet Vulnerability

October 2000

MS00-079 : HyperTerminal Buffer Overflow Vulnerability

MS00-074 : WebTV for Windows Denial of Service Vulnerability

MS00-073 : Malformed IPX NMPI Packet Vulnerability

MS00-072 : Share Level Password Vulnerability

August 2000

MS00-059 : Java VM Applet Vulnerability

February 2000

MS00-011 : VM File Reading Vulnerability

Note: Applying these patches will not help your OS. Your OS is sick. It was a genetic hybrid, a no-no, a product of some really bad stuff someone at Microsoft took one stormy night. Format your HD and burn your ME CD.

Do it now!

For more info see

General Information About Windows Millennium Edition Hotfixes – 295413


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: