{"id":940,"date":"2009-02-12T00:54:43","date_gmt":"2009-02-12T05:54:43","guid":{"rendered":"http:\/\/alsplace.aldenbaker.com\/alsplace\/tech-hints\/940\/xp-service-pack-3-blocks-net-security-patches\/"},"modified":"2009-02-12T00:54:43","modified_gmt":"2009-02-12T05:54:43","slug":"xp-service-pack-3-blocks-net-security-patches","status":"publish","type":"post","link":"http:\/\/alsplace.info\/?p=940","title":{"rendered":"XP Service Pack 3 blocks .NET security patches"},"content":{"rendered":"\n<!-- ALL ADSENSE ADS DISABLED -->\n<p><font color=\"#000000\"> <\/p>\n<p align=\"justify\"> <\/p>\n<p> <\/font> <\/p>\n<div align=\"justify\">\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" summary=\"Patch Watch summary\" bgcolor=\"#ffffff\">\n<tr>\n<td width=\"110\" align=\"left\" valign=\"top\"><strong><font><img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/windowssecrets.com\/images\/wsn\/Susan-Bradley-1.jpg\" border=\"0\" alt=\"Susan Bradley\" title=\"Susan Bradley\" width=\"110\" height=\"100\" align=\"left\" \/><\/font><\/strong><\/td>\n<td width=\"510\" align=\"left\" valign=\"top\"><font color=\"#000000\">By Susan Bradley<\/p>\n<p> <strong>Installing SP3 on Windows XP eliminates the operating system&#39;s ability to install important security patches for Microsoft&#39;s .NET technology and possibly other software.<\/strong><\/p>\n<p> This problem forces XP SP3 users to apply patches manually to complete vital updates.<br \/> <\/font><\/td>\n<\/tr>\n<\/table><\/div>\n<p> <font color=\"#000000\"> <\/p>\n<p align=\"justify\"> The new error is the latest in a long series of glitches relating to XP&#39;s SP3, which Scott Dunn described in his Sept. 11 <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/014b9eh\/?url=www.windowssecrets.com%2F2008%2F09%2F11%2F02-Dont-let-XP-Service-Pack-3-hose-your-system\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/014b9eh\/?url=www.windowssecrets.com%2F2008%2F09%2F11%2F02-Dont-let-XP-Service-Pack-3-hose-your-system\"><font color=\"#000099\">Top Story<\/font><\/a>. The issues include spontaneous rebooting of systems based on AMD chipsets, as documented by Jesper Johansson in a <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/494fbfh\/?url=msinfluentials.com%2Fblogs%2Fjesper%2Farchive%2F2008%2F05%2F07%2Fdoes-your-amd-based-computer-boot-after-installing-xp-sp3.aspx\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/494fbfh\/?url=msinfluentials.com%2Fblogs%2Fjesper%2Farchive%2F2008%2F05%2F07%2Fdoes-your-amd-based-computer-boot-after-installing-xp-sp3.aspx\"><font color=\"#000099\">blog post<\/font><\/a> from last May.<\/p>\n<p> To determine whether your XP SP3 system has a version &mdash; or multiple versions &mdash; of the .NET Framework installed, open Control Panel&#39;s Add or Remove Programs applet and look for it among the list of currently installed programs. If you don&#39;t see any .NET entries, you don&#39;t have the framework installed on your system and needn&#39;t be concerned about the update problem.<\/p>\n<p> If you <strong><em>do<\/em><\/strong> see a listing for Microsoft .NET Framework, you need to use a third-party update service such as Secunia&#39;s Software Inspector (described below) to patch the program.<\/p>\n<p> A Sept. 16 <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/187d96h\/?url=blogs.technet.com%2Fsus%2Farchive%2F2008%2F09%2F16%2Fnet-framework-updates-not-being-offered-to-windows-xp-sp3-computers.aspx\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/187d96h\/?url=blogs.technet.com%2Fsus%2Farchive%2F2008%2F09%2F16%2Fnet-framework-updates-not-being-offered-to-windows-xp-sp3-computers.aspx\"><font color=\"#000099\">post<\/font><\/a> on the Windows Server Update Services (WSUS) blog disclosed that .NET 3.0 would not be offered to XP SP3 users. On Sept. 23, Microsoft Knowledge Base article <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/269cf3h\/?url=support.microsoft.com%2Fdefault.aspx%3Fscid%3Dkb%3Ben-us%3B894199\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/269cf3h\/?url=support.microsoft.com%2Fdefault.aspx%3Fscid%3Dkb%3Ben-us%3B894199\"><font color=\"#000099\">894199<\/font><\/a>, which tracks changes in the company&#39;s patches, indicated that .NET 3.0 and .NET 3.0 Service Pack 1 should be offered to XP SP3 workstations as optional patches.<\/p>\n<p> However, when I tested this on various Windows XP SP3 configurations, I wasn&#39;t offered .NET 3.0 as an optional patch. Things got really dicey on my first attempt to install .NET on a Windows XP SP3 machine. During that test, updates for .NET 1.1 and .NET 2.0 failed midstream. I had to use the Windows Installer CleanUp Utility (which is described in KB article <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/129a92h\/?url=support.microsoft.com%2Fdefault.aspx%3Fscid%3Dkb%3Ben-us%3B290301\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/129a92h\/?url=support.microsoft.com%2Fdefault.aspx%3Fscid%3Dkb%3Ben-us%3B290301\"><font color=\"#000099\">290301<\/font><\/a>) and Aaron Stebner&#39;s .NET Framework cleanup tool (<a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/e4070dh\/?url=blogs.msdn.com%2Fastebner%2Farchive%2F2006%2F05%2F30%2F611355.aspx\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/e4070dh\/?url=blogs.msdn.com%2Fastebner%2Farchive%2F2006%2F05%2F30%2F611355.aspx\"><font color=\"#000099\">download page<\/font><\/a>) to uninstall the partially installed .NET frameworks.<\/p>\n<p> Ultimately, I had to install .NET 3.5 SP1 in order to get <strong><em>any<\/em><\/strong> .NET framework loaded onto the test XP workstation. While the latest version of .NET 3.5 is a cumulative patch and thus could be installed in place of prior versions of .NET, what invariably occurs is that line-of-business applications require and install earlier versions of .NET.<\/p>\n<p> For example, one of the programs I use regularly is QuickBooks, which includes .NET 1.1 in some versions and 2.0 in the 2008 and 2009 releases. I recommend against removing various versions of .NET if the frameworks were installed by your applications.<\/p>\n<p> On my second and third tests of Windows XP SP3 machines, Windows Update did not detect .NET 3.0 as an optional update, but the frameworks were installed without error just the same. However, to manually update the XP systems, I first had to install Microsoft&#39;s Windows Genuine Advantage tool, which is described in KB article <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/63d5ech\/?url=support.microsoft.com%2Fdefault.aspx%3Fscid%3Dkb%3Ben-us%3B892130\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/63d5ech\/?url=support.microsoft.com%2Fdefault.aspx%3Fscid%3Dkb%3Ben-us%3B892130\"><font color=\"#000099\">892130<\/font><\/a>.<\/p>\n<p> Next, I had to upgrade the installer program, as described in KB article <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/f4c08dh\/?url=support.microsoft.com%2Fdefault.aspx%3Fscid%3Dkb%3Ben-us%3B898461\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/f4c08dh\/?url=support.microsoft.com%2Fdefault.aspx%3Fscid%3Dkb%3Ben-us%3B898461\"><font color=\"#000099\">898461<\/font><\/a>. After installing these two programs and returning to the Windows Update service, the XP SP3 machine was offered .NET 1.1 and .NET 2.0 as optional updates but not .NET 3.0 as a patchable item.<\/p>\n<p> <img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/download.windowssecrets.com\/images\/wsn\/W081204-Windows-Update-1.gif\" border=\"0\" alt=\"Windows Update skips .NET 3.0 for XP SP3\" title=\"Windows Update skips .NET 3.0 for XP SP3\" vspace=\"3\" width=\"425\" height=\"182\" align=\"left\" \/><br \/> <strong>Figure 1. Windows Update fails to offer Windows XP SP3 the most recent .NET 3.0 framework.<\/strong><\/p>\n<p> When I attempted to update a system running Windows XP SP2, I <strong><em>was<\/em><\/strong> offered .NET 3.0 as an optional update, as shown in Figure 2 below.<\/p>\n<p> <img decoding=\"async\" loading=\"lazy\" src=\"http:\/\/download.windowssecrets.com\/images\/wsn\/W081204-Windows-Update-2.gif\" border=\"0\" alt=\"On a PC running XP SP2, Windows Update does offer .NET 3.0\" title=\"On a PC running XP SP2, Windows Update does offer .NET 3.0\" vspace=\"3\" width=\"425\" height=\"156\" align=\"left\" \/><br \/> <strong>Figure 2. On a PC running XP SP2, Windows Update <strong><em>does<\/em><\/strong> offer .NET 3.0.<\/strong><\/p>\n<p> I recommend that you install any version of the .NET framework only when your applications need it. However, Microsoft security bulletins dated as recently as Nov. 25 indicate that XP SP3 machines should be offered .NET 3.0. Clearly, XP SP2 PCs are prompted to install .NET 1.1, 2.0, <strong><em>and<\/em><\/strong> 3.0, while XP SP3 users are offered only .NET 1.1 and 2.0.<\/p>\n<p> A full three months after Microsoft&#39;s WSUS support blog disclosed that PCs using XP SP3 aren&#39;t offered .NET 3.0 as an optional patch, the problem still has not been fixed. If you rely on Windows Update or Microsoft Update for your patching needs, use Secunia&#39;s online <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/ce95b0h\/?url=secunia.com%2Fvulnerability_scanning%2Fonline%2F\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/ce95b0h\/?url=secunia.com%2Fvulnerability_scanning%2Fonline%2F\"><font color=\"#000099\">Software Inspector<\/font><\/a> service to ensure that you&#39;re getting all the updates you need.<\/p>\n<p> Even better than the online detection tool is Secunia&#39;s Personal Software Inspector (<a href=\"http:\/\/secunia.com\/vulnerability_scanning\/personal\/\" title=\"http:\/\/secunia.com\/vulnerability_scanning\/personal\/\"><font color=\"#000099\">download page)<\/font><\/a>, which you download and install onto your PC to constantly monitor the update status of the software on your system. The free program will alert you to older versions of Java, Flash, and other common applications, including Microsoft&#39;s .NET Framework. You&#39;ll be walked through the process of removing older &mdash; and possibly vulnerable &mdash; versions.<\/p>\n<p> Based on the numbers from Secunia for the first week following the removal of the program&#39;s &quot;beta&quot; tag, you need to scan your PC for out-of-date apps right away. Secunia PSI Partner Manager Mikkel Locke Winther reports that of the 20,000 new system scans conducted in the first seven days of PSI&#39;s official release, only 1.91% had <strong><em>no<\/em><\/strong> insecure programs, and a whopping 45.76% had 11 or more insecure programs installed.<\/p>\n<p> For a complete rundown of the early PSI scan results, check out Jakob Balle&#39;s Dec. 3 <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/1484c4h\/?url=secunia.com%2Fblog%2F37%2F\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/1484c4h\/?url=secunia.com%2Fblog%2F37%2F\"><font color=\"#000099\">blog post<\/font><\/a>.<br \/> <a name=\"story2\"><\/a><br \/> <font color=\"#666666\">MS08-067 (958644)<br \/> <\/font><font color=\"#000000\"><strong>Malware targets recent Windows worm threat <\/strong><\/p>\n<p> The Microsoft Security Resource Center reports an increase in malware attempting to take advantage of the security breach described in Security Bulletin <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/d08559h\/?url=www.microsoft.com%2Ftechnet%2Fsecurity%2FBulletin%2FMS08-067.mspx\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/d08559h\/?url=www.microsoft.com%2Ftechnet%2Fsecurity%2FBulletin%2FMS08-067.mspx\"><font color=\"#000099\">MS08-067<\/font><\/a>. If you have not already done so, <strong><em>please<\/em><\/strong> ensure that you have installed this patch.<\/p>\n<p> There are few reports of problems resulting from this fix, and most of those glitches concern wireless connectivity. In those rare cases, uninstalling and reinstalling the patch, or deactivating your antivirus and firewall programs, appears to remedy the problems.<\/p>\n<p> Support desks are seeing an increased number of calls from people infected by this malware. Quite honestly, there&#39;s no excuse for not patching this hole. After an easy install and a quick reboot, you&#39;re protected.<br \/> <a name=\"story3\"><\/a><br \/> <strong>Vista Service Pack 2 beta goes public <\/strong><\/p>\n<p> If you&#39;re the type who enjoys paper cuts, tight-fitting shoes, and tax planning, you&#39;ll want to know about the public beta of Service Pack 2 for Windows Vista and Windows Server 2008. You can now visit <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/bba8a8h\/?url=technet.microsoft.com%2Fen-us%2Fwindows%2Fdd262148.aspx\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/bba8a8h\/?url=technet.microsoft.com%2Fen-us%2Fwindows%2Fdd262148.aspx\"><font color=\"#000099\">this page<\/font><\/a> to sign up for Microsoft&#39;s Customer Preview Program (CPP) and volunteer as a Vista SP2 tester.<\/p>\n<p> According to a <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/0a32b5h\/?url=windowsteamblog.com%2Fblogs%2Fwindowsvista%2Farchive%2F2008%2F12%2F02%2Fannouncing-the-windows-vista-and-windows-server-2008-service-pack-2-customer-preview-program-cpp.aspx\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/0a32b5h\/?url=windowsteamblog.com%2Fblogs%2Fwindowsvista%2Farchive%2F2008%2F12%2F02%2Fannouncing-the-windows-vista-and-windows-server-2008-service-pack-2-customer-preview-program-cpp.aspx\"><font color=\"#000099\">post<\/font><\/a> on the Windows Vista blog by Windows Product Management VP Mike Nash, the CPP is intended for &quot;technology enthusiasts, developers, and IT pros&quot; who want to test the service pack on their networks. Nash recommends that &quot;most customers&quot; wait to install the final release of the service pack.<\/p>\n<p> I&#39;ll go even further: most Vista users should wait until several weeks <strong><em>after<\/em><\/strong> the service pack&#39;s final release to install it. That way, you can let the early adopters work through all the service pack&#39;s inevitable glitches and incompatibilities.<\/p>\n<p> You know what they say: you can tell the pioneers because they&#39;re the ones with the arrows sticking out of their backs.<\/font><\/p>\n<p> <\/font><font color=\"#666666\">MS08-067 (958644)<br \/> <\/font><font color=\"#000000\"><strong>Malware targets recent Windows worm threat <\/strong><\/p>\n<p> The Microsoft Security Resource Center reports an increase in malware attempting to take advantage of the security breach described in Security Bulletin <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/d08559h\/?url=www.microsoft.com%2Ftechnet%2Fsecurity%2FBulletin%2FMS08-067.mspx\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/d08559h\/?url=www.microsoft.com%2Ftechnet%2Fsecurity%2FBulletin%2FMS08-067.mspx\"><font color=\"#000099\">MS08-067<\/font><\/a>. If you have not already done so, <strong><em>please<\/em><\/strong> ensure that you have installed this patch.<\/p>\n<p> There are few reports of problems resulting from this fix, and most of those glitches concern wireless connectivity. In those rare cases, uninstalling and reinstalling the patch, or deactivating your antivirus and firewall programs, appears to remedy the problems.<\/p>\n<p> Support desks are seeing an increased number of calls from people infected by this malware. Quite honestly, there&#39;s no excuse for not patching this hole. After an easy install and a quick reboot, you&#39;re protected.<br \/> <a name=\"story3\"><\/a><br \/> <strong>Vista Service Pack 2 beta goes public <\/strong><\/p>\n<p> If you&#39;re the type who enjoys paper cuts, tight-fitting shoes, and tax planning, you&#39;ll want to know about the public beta of Service Pack 2 for Windows Vista and Windows Server 2008. You can now visit <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/bba8a8h\/?url=technet.microsoft.com%2Fen-us%2Fwindows%2Fdd262148.aspx\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/bba8a8h\/?url=technet.microsoft.com%2Fen-us%2Fwindows%2Fdd262148.aspx\"><font color=\"#000099\">this page<\/font><\/a> to sign up for Microsoft&#39;s Customer Preview Program (CPP) and volunteer as a Vista SP2 tester.<\/p>\n<p> According to a <a href=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/0a32b5h\/?url=windowsteamblog.com%2Fblogs%2Fwindowsvista%2Farchive%2F2008%2F12%2F02%2Fannouncing-the-windows-vista-and-windows-server-2008-service-pack-2-customer-preview-program-cpp.aspx\" title=\"http:\/\/windowssecrets.com\/links\/casamqr63t9zd\/0a32b5h\/?url=windowsteamblog.com%2Fblogs%2Fwindowsvista%2Farchive%2F2008%2F12%2F02%2Fannouncing-the-windows-vista-and-windows-server-2008-service-pack-2-customer-preview-program-cpp.aspx\"><font <a href=\"http:\/\/www.coastalrock.com\/\">cialis generic price<\/a>  color=&#8221;#000099&#8243;>post<\/font><\/a> on the Windows Vista blog by Windows Product Management VP Mike Nash, the CPP is intended for &quot;technology enthusiasts, developers, and IT pros&quot; who want to test the service pack on their networks. Nash recommends that &quot;most customers&quot; wait to install the final release of the service pack.<\/p>\n<p> I&#39;ll go even further: most Vista users should wait until several weeks <strong><em>after<\/em><\/strong> the service pack&#39;s final release to install it. That way, you can let the early adopters work through all the service pack&#39;s inevitable glitches and incompatibilities.<\/p>\n<p> You know what they say: you can tell the pioneers because they&#39;re the ones with the arrows sticking out of their backs.<\/font><\/p>\n<!-- Social Bookmarks BEGIN -->\n<div class=\"social_bookmark\">\n<a title=\"Click me to see the sites.\" href=\"#\" onclick=\"$$('div.d940').each( function(e) { e.visualEffect('slide_down',{duration:2.5}) }); return false;\"><strong><em>Bookmark to:<\/em><\/strong><\/a>\n<br \/>\n<div class=\"d940\" style=\"overflow:hidden\">\n<br \/>\n<br \/>\n<a style=\"font-size:90%;text-align: right; \" title=\"Click me to hide the sites.\" href=\"#\" onclick=\"$$('div.d940').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); return false;\">Hide Sites<\/a>\n<\/div>\n<\/div>\n<!-- Social Bookmarks END -->\n<script type=\"text\/javascript\">$$('div.d940').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); <\/script>","protected":false},"excerpt":{"rendered":"<p>By Susan Bradley Installing SP3 on Windows XP eliminates the operating system&#39;s ability to install important security patches for Microsoft&#39;s .NET technology and possibly other software. This problem forces XP SP3 users to apply patches manually to complete vital updates. The new error is the latest in a long series of glitches relating to XP&#39;s [&hellip;]<\/p>\n<!-- Social Bookmarks BEGIN -->\n<div class=\"social_bookmark\">\n<a title=\"Click me to see the sites.\" href=\"#\" onclick=\"$$('div.d940').each( function(e) { e.visualEffect('slide_down',{duration:2.5}) }); return false;\"><strong><em>Bookmark to:<\/em><\/strong><\/a>\n<br \/>\n<div class=\"d940\" style=\"overflow:hidden\">\n<br \/>\n<br \/>\n<a style=\"font-size:90%;text-align: right; \" title=\"Click me to hide the sites.\" href=\"#\" onclick=\"$$('div.d940').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); return false;\">Hide Sites<\/a>\n<\/div>\n<\/div>\n<!-- Social Bookmarks END -->\n<script type=\"text\/javascript\">$$('div.d940').each( function(e) { e.visualEffect('slide_up',{duration:0.5}) }); <\/script>","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[9,5],"tags":[],"_links":{"self":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/posts\/940"}],"collection":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=940"}],"version-history":[{"count":0,"href":"http:\/\/alsplace.info\/index.php?rest_route=\/wp\/v2\/posts\/940\/revisions"}],"wp:attachment":[{"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=940"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/alsplace.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}