Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: Another botched Windows patch

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Open Discussions

This thread has been marked as locked.
mogs Another botched Windows patch
Expert Contributor 13th Jul, 2013 16:46
Ranking: 2265
Posts: 6,266
User Since: 22nd Apr, 2009
System Score: 100%
Location: UK
JULY 12, 2013
Another botched Windows patch: MS13-057/KB 2803821/KB 2834904
Microsoft hasn't yet acknowledged Win7 patch KB 2803821 and WinXP patch KB 2834904, which have spawned complaints about top half of videos displaying in black

By Woody Leonhard | InfoWorld

Another botched Windows patch: MS13-057/KB 2803821/KB 2834904
It looks like this week's Black Tuesday patches include at least one real stinker: MS 13-057/KB 2803821 has been blamed for problems with recent editions of several products. Until Microsoft pulls the patch -- or acknowledges the problem -- I advise against installing it.

MS 13-057/KB 2803821 is billed as a "security update for Windows Media Format Runtime 9 and 9.5 (wmvdmod.dll), and for Windows Media Player 11 and 12." Microsoft rates the patch as "critical" with an exploitability ranking of 2. It's directed at the vulnerability reported in CVE-2013-3127.

The SANS Internet Storm Center describes the problem as "an input validation problem in Windows Media format (WMV -- Windows Media Player, not to be confused with the infamous WMF format) [that] allows random code execution." According to SANS, there are no publicly known exploits.

CVE gives more details: "The Microsoft WMV video codec in wmv9vcm.dll, wmvdmod.dll in Windows Media Format Runtime 9 and 9.5, and wmvdecod.dll in Windows Media Format Runtime 11 and Windows Media Player 11 and 12 allow remote attackers to execute arbitrary code via a crafted media file, aka WMV Video Decoder Remote Code Execution Vulnerability."

The patch targets just about every modern version of Windows: Windows XP SP3, Windows Server 2003, Windows Vista SP2, Windows Server 2008 SP2, Windows Server 2008 R2 SP1, Windows 7 SP1, Windows Server 2012, Windows 8, and Windows RT.

The problems, and the offending Microsoft patch, were identified as early as Wednesday, July 10. Microsoft has yet to publish any official acknowledgment of the problem or to pull the patch.

These are the problem reports I've been able to find:

In Adobe Premiere Pro CS6, the top half of high-quality videos gets chopped off. The problem is most readily visible in the top half of the editing pane, though it appears the file itself is being misinterpreted. Talbot McInnis on the Adobe Premiere Pro forum posted, "We have narrowed it down to Windows updates under MS bulletin MS13-057. Specifically, on XP KB 2834904 and on Windows 7 KB 2803821. For us, it occurs when decoding WMV9 files. Not all uses of WMV decoding are affected, but I confirmed that when connecting the WMV decode DLL to a sample grabber for RGB32 video, the frames arrive black on top, so that points directly to decoding internals of the WMV Decode DLL."
In TechSmith's Camtasia Studio, the top half of videos viewed in the playback window get chopped off. TechSmith has issued a detailed analysis and suggests that customers uninstall the patch as a workaround.
Serif's MoviePlus X6 has the same behavior.
Poster Carlos H describes a very similar situation when saving YouTube videos. It isn't clear if the problem is with saving or with playback.
At least one gamer, known as Theshockmaster, also has a similar problem while playing Rome: Total War and Barbarian Invasion.
It will be interesting to see when -- or if -- Microsoft acknowledges and/or fixes the problem.

Thanks to Susan Bradley for the heads-up.

http://www.infoworld.com/t/microsoft-windows/anoth...

--

mogs RE: Another botched Windows patch
Expert Contributor 18th Jul, 2013 18:03
Score: 2265
Posts: 6,266
User Since: 22nd Apr 2009
System Score: 100%
Location: UK
July 17th, 2013, 12:01 GMT · By Bogdan Popa
Microsoft’s KB2821895 Update Causes Trouble to Windows 8 Users

Microsoft has confirmed a problem with the MS13-057 Windows 7 Update earlier today, but it seems like this wasn’t the only buggy fix delivered on Patch Tuesday.

According to some posts on Microsoft’s support forums, the KB2821895 bulletin has broken down “sfc /scannow” on Windows 8 and the only way to deal with it is to completely remove the patch.

“After this update “sfc /scannow” gets stuck at 100% for about 6-7 minutes, and afterwards reports that there are corrupted files that it cannot fix and asks for reboot. The situation with “sfc/scannow” repeats after restart. I checked it with three different machines. There are a lot of errors in CBS.log file,” one user explained in a post.

A Microsoft support engineer has already replied to the bug report, saying that the company is now looking into the issue, suggesting that a fix could follow soon.

“We’re aware of an issue impacting some Windows 8 customers trying to run the sfc /scannow command after installing KB2821895, where customers using the System File Checker receive an error message that there are corrupt files and that the system requires a restart to repair the files,” he wrote.

In case you’re not willing to completely delete the update using either a System Restore point or the built-in manual removal option, Microsoft recommends users to launch a command prompt window with administrator privileges and input the following command:

CODE
dism /online /cleanup-image /restorehealth


Wait for this command to complete, the Microsoft engineer said, and then try to run sfc /scannow again.

“Run the sfc /scannow command again until the command completes and reports that there is no corruption. If you still get an error that there is corruption, you should contact technical support for further assistance as your system may have actual corruption,” he noted.

http://news.softpedia.com/news/Microsoft-s-KB28218...

--
Was this reply relevant?
+0
-0

This thread has been marked as locked.


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability