News

Microsoft Updates Windows Media Player Patch

Microsoft published an update to a Windows Media Player patch on Tuesday, the same day as its January general security update release.

Microsoft published an update to a Windows Media Player patch on Tuesday, the same day as its January general security update release.

At issue is a glitch that results in an incomplete installation of December's MS08-076 Windows Media Component patch on Windows XP systems running Windows Media Format Runtime 9.5. The bulletin addendum, dated Jan. 13, is supposed to fix that glitch.

The revised bulletin also now lists Windows Media Player 6.4 and Windows Media Services 4.1 as affected for all editions of Microsoft Windows 2000 Service Pack 4 -- not just for Microsoft Windows 2000 Server SP4.

The update comes just weeks after Microsoft spokesperson Christopher Budd adamantly denied a report detailing a potential remote code execution hole in Windows Media Player. Security researcher Laurent Gaffi had described a vulnerability that could be used by hackers armed with malformed .wav, .snd, or .mid audio files to compromise a PC running Windows XP or Vista.

Budd negated that security claim, but he did confirm that Gaffi's proof-of-concept code could trigger a crash of the Windows-based app. Budd added that Windows Media Player can be restarted without harming the operating system. He suggested that the security update would fix the loose ends.

Researchers at Microsoft's Research and Defense group spelled out in mathematical and technological language how that the particular flaw mentioned by Gaffi is not a threat.

About the Author

James LaTour, MCSE, is a consultant for Trinity Consulting, a Microsoft Certified Gold Partner in Marlborough, Mass. He brings a wealth of health care experience to Trinity's HIPAA practice. In his spare time, he volunteers as webmaster and administrator for MARX7.org, the Massachusetts Area RX-7 and Rotary Powered Club, a non-profit automobile enthusiast club in the New England area. Reach him at [email protected].

comments powered by Disqus
Most   Popular