Microsoft is preparing to release a pair of updates next Tuesday

Microsoft is preparing to release a pair of updates next Tuesday.

The company said in an advance notice that the November edition of the 'Patch Tuesday' release will include one fix labeled 'critical' and a second labeled 'important.'
The critical fix addresses a vulnerability in the Microsoft XML Core Services component in Windows 2000, XP, Server 2003, 2008 and Windows Vista. While Microsoft did not disclose the exact nature of the vulnerability, the company said that if exploited it could allow an attacker to remotely execute code on a targeted system.
While the second flaw could also allow an attacker to remotely execute code, Microsoft rated the issue as an 'important' risk. The vulnerability lies within a component in Windows 2000, XP, Server 2003, Server 2008 and Windows Vista.
Microsoft offered little more on the nature of the vulnerability. The company typically refrains from disclosing specific details on a flaw until a fix can be released.
The November update comes just two weeks after the disclosure and patching of another critical vulnerability in a Windows component. Shortly after the company posted the fix, an attack for the flaw was reported.
Microsoft is planning to release the update next Tuesday. The update is typically released by early afternoon US Pacific time.

Microsoft to deliver a pair of November fixes - vnunet.com
 
I'd seen the notice about this, I expect there will also be the monthly Malicious Software Removal tool and I suppose we'll have to wait and see if there are any for Office at the same time ;)
 

My Computer

System One

  • Operating System
    Windows 10 Home
    Manufacturer/Model
    HP Envy x360 Convertible 15-bq0xx
    CPU
    AMD A9 Stoney Ridge Technology
    Motherboard
    HP 8312 (Socket FP4)
    Memory
    8.00GB Dual-Channel Unknown (?-0-0-0)
    Graphics card(s)
    Generic PnP Monitor (1920x1080@60Hz) 512MB ATI AMD Radeon R5
    Sound Card
    AMD High Definition Audio Device Realtek High Definition Aud
    Monitor(s) Displays
    Generic PnP Monitor on AMD Radeon R5 Graphics
    Screen Resolution
    1920 x 1080
    Hard Drives
    119GB SanDisk SD8SN8U-128G-1006 (SSD) 931GB Hitachi HGST HTS721010A9E630 (SATA
    Mouse
    Microsoft Optical Wheel Mouse
    Keyboard
    Standard PS/2 Keyboard
    Internet Speed
    62.86Mbps down 18.19Mbps up
    Other Info
    EPSON78D0CF (XP-332 335 Series) (Default Printer)
How many times are we going to download the XML core services fixes.
 

My Computer

System One

  • Manufacturer/Model
    HP Compaq Presario/SR5113WM
    CPU
    AMD Athlon 64 X2 3600+ 1.9Ghz
    Motherboard
    Asus M2N68-LA
    Memory
    PNY Optima Memory DDR2 2GB 2x1 kit
    Graphics card(s)
    PNY Nvidia 8400 GS 256MB
    Sound Card
    On board RealTek
    Monitor(s) Displays
    Acer X163W LCD
    Screen Resolution
    1366x768
    Hard Drives
    Western Digital 160 GB SATA 3G (3.0Gb/sec) 7200 rpm Western Digital 160 GB IDE
    PSU
    Dynex 400w
    Case
    Nothin Special
    Cooling
    Stock
    Mouse
    Wireless Logitech LX7
    Keyboard
    Standard 102 key with volume and sleep buttons
    Internet Speed
    Comcrap 10mb cable
    Other Info
    Insignia 2.1 speakers, wireless Xbox 360 controller w/plug n play charger, Belkin wireless G + mimo usb network adapter.
Eight times?
 

My Computer

System One

  • CPU
    E8400
    Motherboard
    750i FTW
    Memory
    4Gb corsiar 2 x 2Gb @ 1066Hhz
    Graphics card(s)
    GTX 260 SLI
    Sound Card
    on board realtek HD
    Monitor(s) Displays
    Samsung 226BW
    Screen Resolution
    1680 x 1050
    Hard Drives
    2 x WD320 RAID 0
    PSU
    Corsair 1000
    Case
    Antec P180 B
    Cooling
    Zalman 8700NT
    Mouse
    MS Habu Razor
    Keyboard
    Logitech Wave
    Internet Speed
    ADSL 8Mb
After all thease attacker Violations I beging to think it's the Employees at Microsoft and the ware house in the usa and canada call centers that are doing this,

My friend worked at the call center and he worked form home for microsoft,
and he was generating freen codes from microsft Look Microsoft trained him how to created and make the software and they did all the testing now so many diffrent version are out some still by pass the system no matter what Microsoft does.

First thing is Microsoft had a year to fix Vista we should not be Charged to used the new version thats not gonna be called vista,if you have a Current Vaild Copy and have the UPS Purches code and the store reciept that should be good enough ..

Lokk at the screw ups in the Call Center In India I got a Teir One Just Like Sympatics Ters there right down the hall from each other in the same Building i found through are Bell Canada compony now offices in the Phillpines now?

and there still not trained propperly to help us with our problems with vista they still can't even read the Techsupport Sheets assigned to them by there team supervisor must be nice to walk off the street no computer experience what so even and be hired I'm a Techsupport person but I dont[ know hoe to shut the computer off and reboot it have to what my boss game me what Microsoft told us to tell the Customer it's true I have all recored conver sations 2 to 3 hours ofrm India To the Phillopines same in each office and there not really even trying
 

My Computer

It really puzzles me that all the updates that we get seem to have the same reason
"it could allow an attacker to remotely execute code on a targeted system."
I would really like to question if its its more serious than what they are saying
I'v yet to see an update patch that really means some sort of real fix that we want, ok yes security is important but we don't seem to see fixes for those annoying bugs that we have to put up with on a daily basis :confused:
 

My Computer

System One

  • Manufacturer/Model
    Me :P
    CPU
    Core 2 Quad Q6600
    Motherboard
    Abit IN9 32X MAX
    Memory
    8 GB OCZ PC2-6400 nVIDIA SLI-Ready Edition (4X2GB)
    Graphics card(s)
    AMP! GeForce GTX 260² 896MB 448-bit GDDR3 (650MHz/2100MHz
    Sound Card
    Realtek 7.1 CH HD Audio
    Monitor(s) Displays
    17" Fujitsu siemens TFT + 32" LG HD LCD TV
    Screen Resolution
    1280x1024 + 1360x768
    Hard Drives
    150GB Raptor HDD 500GB Caviar HDD
    PSU
    Thermaltake W0133RB 1200W PSU
    Case
    Antec 900
    Cooling
    Stock + Antec 900 case fans
    Mouse
    Logitech MX Revolution
    Keyboard
    Logitech G15 (full layout)
It really puzzles me that all the updates that we get seem to have the same reason
"it could allow an attacker to remotely execute code on a targeted system."
I would really like to question if its its more serious than what they are saying
I'v yet to see an update patch that really means some sort of real fix that we want, ok yes security is important but we don't seem to see fixes for those annoying bugs that we have to put up with on a daily basis :confused:
Ditto!
 

My Computer

System One

  • CPU
    E8400
    Motherboard
    750i FTW
    Memory
    4Gb corsiar 2 x 2Gb @ 1066Hhz
    Graphics card(s)
    GTX 260 SLI
    Sound Card
    on board realtek HD
    Monitor(s) Displays
    Samsung 226BW
    Screen Resolution
    1680 x 1050
    Hard Drives
    2 x WD320 RAID 0
    PSU
    Corsair 1000
    Case
    Antec P180 B
    Cooling
    Zalman 8700NT
    Mouse
    MS Habu Razor
    Keyboard
    Logitech Wave
    Internet Speed
    ADSL 8Mb
Back
Top