Home
Products
Updates
Logs
Bugs
Files
Sign In Create an Account
Recent Search Results
No Search results are currently available to display.

Your last search results will be displayed here for the duration of your browser session.

Update ReportPrint
Name KB977165
Type Important
Average Threat Rating
Add Your Encounter Hide Encounters without Resolutions
tfenner
Posts: 66

3/2/2011
Revision 2
Threat Rating:

http://redmondmag.com/articles/2010/02/18/windows-kernel-patch-hobbled-by-malware.aspx

Microsoft confirmed on Wednesday that rootkit malware is causing "blue screens of death" boot problems for some users who applied a Windows kernel security patch.

The patch, MS10-015, was released last week as part of Microsoft's February security update. The problem wasn't with the patch. Instead, affected systems had Alureon malware that caused restart problems after the patch was applied, explained Microsoft Security Response Center Director Mike Reavey, in a blog post.

"We were able to reach this conclusion after the comprehensive analysis of memory dumps obtained from multiple customer machines and extensive testing against third party applications and software," Reavey wrote. "The restarts are the result of modifications the Alureon rootkit makes to Windows Kernel binaries, which places these systems in an unstable state."

The boot problem happens because the Alureon malware attempts to access a specific memory location rather than allowing Windows to determine it on loading an executable file, Reavey explained.

The malware doesn't affect 64-bit systems, according to Microsoft, but 32-bit systems can be vulnerable. Microsoft suspended the automatic release of security bulletin MS10-015 through Windows Update but expects to resume delivery after further work.

"Microsoft is striving to resolve the issue as quickly as possible, and as such, will continue to hold offering MS10-015 through Automatic Update for 32-bit Windows systems until a solution is available," said Microsoft spokesman Jerry Bryant in an e-mail statement.

At least one software security analyst praised Microsoft for its quick response.

"You have to give credit to Microsoft for quickly recognizing the issue and rushing to fix the issue versus waiting for their monthly cycle," said Chris Merritt, director of solution marketing at software security firm Lumension.



Peer Reviews (0)

No reviews have been post for this Encounter

Post a Peer Review:

tfenner
Posts: 66

3/2/2011
Revision 5
Threat Rating:

Contains Resolution:
This patch causes blue screens.  The solution steps are:

1. Boot from your Windows XP CD or DVD and start the recovery console - see this Microsoft article "http://support.microsoft.com/kb/307654/en-us"

Once you are in the Repair Screen..

2. Type this command: CHDIR $NtUninstallKB977165$\spuninst        

3. Type this command: BATCH spuninst.txt

4. When complete, type this command: exit


IMPORTANT:  If you are able to uninstall the patch and get back into Windows, in order to stay protected you can use the following automated solution which secures your PC against the vulnerabilities that are resolved with KB977165 until you can successfully get the update installed without the blue screens.

Please see the link below for the article describing the vulnerability that is fixed with KB977165 and how you can get protected without installing the actual KB update:

"http://support.microsoft.com/kb/979682"




Peer Reviews (0)

No reviews have been post for this Encounter

Post a Peer Review:

tfenner
Posts: 66

3/2/2011
Revision 6
Threat Rating:

Contains Resolution:
Go to the following website for known issues with this update: support.microsoft.com/kb/979682


Peer Reviews (0)

No reviews have been post for this Encounter

Post a Peer Review: