Download our in-depth report: The Ultimate Guide to IT Security VendorsMicrosoft's monthly patch day was a little rougher than usual today, as the company's patch servers hiccupped, leaving Microsoft (Quote) scrambling for a fix.
This affects all Microsoft servers, such as Microsoft Update and Windows Update, which are user-initiated, and Automatic Updates, which performs the download without user prompting.
"Technical teams are engaged and have been working around the clock to resolve this problem and we anticipate that updates will be made available via the Microsoft Update platform by end of day," Microsoft said in a statement.
"We will post an update when the situation has been resolved and the updates are again available via this distribution channel."https://o1.qnsr.com/log/p.gif?;n=203;c=204650394;s=9477;x=7936;f=201801171506010;u=j;z=TIMESTAMP;a=20392931;e=i The problems are detailed on the MSRC Blog, which is where Microsoft will also post notice that the patches are available for download.
With this security update cycle, Microsoft released 10 security bulletins covering 26 fixes.
It includes four "critical" fixes for Microsoft Office and one "critical" fix for Windows. Critical fixes are considered the most severe and highest risk. Other fixes are rated low to moderate in severity.
Microsoft is once again urging customers to migrate to Windows XP Service Pack 2 with Advanced Security Technologies if they have not done so already. Aside from the new security enhancements in the service pack, Windows XP Service Pack 1 support will end next week.
In addition to the security fixes, Microsoft has updated its Malicious Software Removal Tool to add support for three new nasty bits of malware, Win32/Tibs, Win32/Harnig and Win32/Passalert.