Gemini version available ♊︎

More Victims Attest to Windows Bricking and Microsoft Halts Patches

Posted in Microsoft, Security, Windows at 7:05 pm by Dr. Roy Schestowitz

Summary: Patch Tuesday is met with a major glitch that leaves many people without access to their computer/s and Microsoft finally acknowledges this by suspending some patches

LAST NIGHT we showed that Windows security is a lost cause. Far too many machines that run Windows are infected; in fact, almost the majority are, even though they run so-called ‘anti-viral’ software. According to this new report, Windows Trojans hit people almost literally in the pocket:

A researcher at SecureWorks has uncovered a new Trojan swiping credentials of customers of roughly 15 large and medium-sized banks in the United States.

SecureWorks has dubbed the malware the Bugat Trojan. The malware has similar functionality to other banking Trojans such as Clampi and Zeus, and was seen being distributed by a Zeus botnet.

On Tuesday came a very large number of security patches for Windows [1, 2], some of which were bricking Windows XP boxes. Awareness of he problem is now being spread as more people become vocal victims who speak out:

Tuesday’s security updates from Microsoft have crippled Windows XP PCs with the notorious Blue Screen of Death (BSOD), users have reported on the company’s support forum.

Complaints began early yesterday, and gained momentum throughout the day.

The solutions are far from simple and this is so bad that Microsoft hits the “panic!” button and halts updates:

Microsoft has removed one group of patches it released as part of this week’s Patch Tuesday — MS10-015 (KB977165) – from its Windows Update service until it can investigate reports by some users that it is causing havoc with their PCs.

To make matters worse, those who did manage to install the patches and actually reboot their machine successfully would be saddened to know that their machine is still not secure. “Another Windows security flaw is discovered,” says the headline from The Inquirer.

ANOTHER DAY, another Windows security flaw, it seems.

This time Microsoft has posted Security Advisory 977377, which reports a vulnerability in the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols.

That was fast. It’s back to the usual cycle of endless vulnerability. No wonder one in two Windows PCs is a zombie PC.

“Gates may be gone, but the walls and bars of proprietary software he helped create remain, for now. Dismantling them is up to us.”

Richard Stallman

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Reddit
  • email

Decor ᶃ Gemini Space

Below is a Web proxy. We recommend getting a Gemini client/browser.

Black/white/grey bullet button This post is also available in Gemini over at this address (requires a Gemini client/browser to open).

Decor ✐ Cross-references

Black/white/grey bullet button Pages that cross-reference this one, if any exist, are listed below or will be listed below over time.

Decor ▢ Respond and Discuss

Black/white/grey bullet button If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.


  1. Yuhong Bao said,

    February 12, 2010 at 9:44 pm


    See the comments to this article:

    your_friend Reply:

    These comments seek, implausibly, to shift XP bricking blame from Microsoft. How do you explain Microsoft’s halted update? Please don’t tell me that Microsoft has halted the upgrade out of an abundance of caution or that they want to redo the “patch” so it does not trigger some mysterious malware problem.

    The more straight forward scenario is usually the right one. The patch bricks XP and Microsoft knows it but had to slow down for perception management purposes.

    Yuhong Bao Reply:

    “The patch bricks XP and Microsoft knows it but had to slow down for perception management purposes.”
    “Please don’t tell me that Microsoft has halted the upgrade out of an abundance of caution or that they want to redo the “patch” so it does not trigger some mysterious malware problem.”
    Indeed, none of these are the truth. I think the truth is that back when the patch was first pulled, MS didn’t know what was causing the problem, and MS never tested their security patches with ATAPI.SYS files that was patched by a third party (nor that they should have).

    Roy Schestowitz Reply:

    The important thing is that people will be even MORE afraid of patching their Windows machines from now on.

    Robotron 2084 Reply:

    Roy seems like an “ends justify the means” kind of guy. Yuhong and myself both point out the missing references to the root of the problem being an infected driver. Roy ignores it, stating “The important thing is that people will be even MORE afraid of patching their Windows machines from now on.”

    Making sure people are afraid of Microsoft, no matter how accurate that fear is, is more important that factual reporting.

    your_friend Reply:

    Ick, what spin! On many occasions Microsoft has been convicted of breaking software for financial gain. In all cases, Microsoft blamed their victims or otherwise shifted blame from themselves. XP is an impediment to Microsoft sales of Vista and Windows 7, so it dies. How could that possibly be poor Microsoft’s fault?

    I don’t have to prove any details to prove the benefits to users of moving to free software. All of the lame excuses and finger pointing only apply to non free software. The very concept of “third party” as suspect is laughable in the free software world and free software systems do not suffer these kinds of mysterious failures. Amazingly enough, systems like Debian upgrade without a hitch and a new stable release never causes problems with older stable releases. Users rightly dread their non free software and know that it will fail them sooner or later.

    Yuhong Bao Reply:

    Yea, I read AskWoody.com, and Woody dislike automatic updating in Windows already. In fact, he has a MS-DEFCON rating for patching.

    Yuhong Bao Reply:

    BTW, it was an independent third-party researcher who first found this, not MS itself.

    Roy Schestowitz Reply:

    Very few patches in the core of GNU/Linux (X or Linux for example) are “critical” and remotely exploitable.

    Robotron 2084 Reply:

    your_friend: “I don’t have to prove any details to prove the benefits to users of moving to free software.”

    That statement is perfectly true… provided you are having a 1-on-1 argument with yourself. I stand corrected.

    your_friend Reply:

    My point was that Microsoft’s excuses for their failures are exclusive to non free software and don’t justify continued investment of time and money in non free software. The details of those excuses don’t matter because they never apply to free software.

    Yuhong Bao Reply:

    “Very few patches in the core of GNU/Linux (X or Linux for example) are “critical” and remotely exploitable.”
    Of course not, after all, software is not directly network-facing can never be directly remotely exploitable. Now both X and Linux has parts that are network-facing, and indeed Linux’s TCP/IP stack once had a few common attacks (like nuke, land, ping of death…), but most of them was just DoS attacks, and most of them has been fixed long ago.

    Roy Schestowitz Reply:

    Many affect machines that are shared among multiple users.

  2. williami said,

    February 13, 2010 at 1:15 am


    And the real kicker here is that the same SSL spoofing flaw was arleady fixed a couple of months ago by the release of OpenSSL 0.9.8l. Facepalm for Micro$oft.

    williami Reply:

    If you still don’t get the picture, maybe you should see this:

    The release date of OpenSSL 0.9.8l: 11-05-09.

    When M$ found out about the SSL issue: 02-12-10

    Do you see now? Let me spell that out for you: Micro$oft found out that issue 4 MONTHS after OpenSSL 0.9.8l was released, which fixed the very same flaw. Seriously, Micro$oft deserves a facepalm.

    Roy Schestowitz Reply:

    Microsoft also knew about the Internet Explorer flaw which China exploited rather massively. Microsoft sat on in for almost half a year without bothering to do anything.

    your_friend Reply:

    Their excuse, ultimately, is that they don’t have the manpower to fix everything, but this is a flaw in their business model. Free software does not operate under the same constraints.

    Roy Schestowitz Reply:

    In Free software, upgrades are typically free/gratis, so it’s easier to manage patches of the new version/s while migrating all users to the latest version/s. Take WordPress for example.

    Yuhong Bao Reply:

    Though sometimes there is significant codebase changes that require a old version to be maintained. Take the recently discontinued Apache 1.3 for example.

    Roy Schestowitz Reply:

    Upgrades are free.

DecorWhat Else is New

  1. Links 30/05/2023: LibreOffice 7.6 in Review and More Digital Restrictions (DRM) From HP

    Links for the day

  2. Gemini Links 30/05/2023: Curl Still Missing the Point?

    Links for the day

  3. IRC Proceedings: Monday, May 29, 2023

    IRC logs for Monday, May 29, 2023

  4. MS (Mark Shuttleworth) as a Microsoft Salesperson

    Canonical isn’t working for GNU/Linux or for Ubuntu; it’s working for “business partners” (WSL was all along about promoting Windows)

  5. First Speaker in Event for GNU at 40 Called for Resignation/Removal of GNU's Founder

    It’s good that the FSF prepares an event to celebrate GNU’s 40th anniversary, but readers told us that the speakers list is unsavoury, especially the first one (a key participant in the relentless campaign of defamation against the person who started both GNU and the FSF; the "FSFE" isn't even permitted to use that name)

  6. When Jokes Became 'Rude' (or Disingenuously Misinterpreted by the 'Cancel Mob')

    A new and more detailed explanation of what the wordplay around "pleasure card" actually meant

  7. Site Updates and Plans Ahead

    A quick look at or a roundup of what we've been up to, what we plan to publish in the future, what topics we shall focus on very soon, and progress moving to Alpine Linux

  8. Links 29/05/2023: Snap and PipeWire Plans as Vendor Lock-in

    Links for the day

  9. Gemini Links 29/05/2023: GNU/Linux Pains and More

    Links for the day

  10. Links 29/05/2023: Election in Fedora, Unifont 15.0.04

    Links for the day

  11. Gemini Links 29/05/2023: Rosy Crow 1.1.1 and Smolver 1.2.1 Released

    Links for the day

  12. IRC Proceedings: Sunday, May 28, 2023

    IRC logs for Sunday, May 28, 2023

  13. Daniel Stenberg Knows Almost Nothing About Gemini and He's Likely Just Protecting His Turf (HTTP/S)

    The man behind Curl, Daniel Stenberg, criticises Gemini; but it's not clear if he even bothered trying it (except very briefly) or just read some inaccurate, one-sided blurbs about it

  14. Links 29/05/2023: Videos Catchup and Gemini FUD

    Links for the day

  15. Links 28/05/2023: Linux 6.4 RC4 and MX Linux 23 Beta

    Links for the day

  16. Gemini Links 28/05/2023: Itanium Day, GNUnet DHT, and More

    Links for the day

  17. Links 28/05/2023: eGates System Collapses, More High TCO Stories (Microsoft Windows)

    Links for the day

  18. IRC Proceedings: Saturday, May 27, 2023

    IRC logs for Saturday, May 27, 2023

  19. No More Twitter, Mastodon, and Diaspora for Tux Machines (Goodbye to Social Control Media)

    People would benefit from mass abandonment of such pseudo-social pseudo-media.

  20. Links 28/05/2023: New Wine and More

    Links for the day

  21. Links 27/05/2023: Plans Made for GNU's 40th Anniversary

    Links for the day

  22. Social Control Media Needs to be Purged and We Need to Convince Others to Quit It Too (to Protect Ourselves as Individuals and as a Society)

    With the Tux Machines anniversary (19 years) just days away we seriously consider abandoning all social control media accounts of that site, including Mastodon and Diaspora; social control networks do far more harm than good and they’ve gotten a lot worse over time

  23. Anonymously Travelling: Still Feasible?

    The short story is that in the UK it's still possible to travel anonymously by bus, tram, and train (even with shades, hat and mask/s on), but how long for? Or how much longer have we got before this too gets banned under the false guise of "protecting us" (or "smart"/"modern")?

  24. With EUIPO in Focus, and Even an EU Kangaroo Tribunal, EPO Corruption (and Cross-Pollination With This EU Agency) Becomes a Major Liability/Risk to the EU

    With the UPC days away (an illegal and unconstitutional kangaroo court system, tied to the European Union in spite of critical deficiencies) it’s curious to see EPO scandals of corruption spilling over to the European Union already

  25. European Patent Office (EPO) Management Not Supported by the EPO's Applicants, So Why Is It Still There?

    This third translation in the batch is an article similar to the prior one, but the text is a bit different (“Patente ohne Wert”)

  26. EPO Applicants Complain That Patent Quality Sank and EPO Management Isn't Listening (Nor Caring)

    SUEPO has just released 3 translations of new articles in German (here is the first of the batch); the following is the second of the three (“Kritik am Europäischen Patentamt – Patente ohne Wert?”)

  27. German Media About Industry Patent Quality Charter (IPQC) and the European Patent Office (EPO)

    SUEPO has just released 3 translations of new articles in German; this is the first of the three (“Industrie kritisiert Europäisches Patentamt”)

  28. Geminispace Continues to Grow Even If (or When) Stéphane Bortzmeyer Stops Measuring Its Growth

    A Gemini crawler called Lupa (Free/libre software) has been used for years by Stéphane Bortzmeyer to study Gemini and report on how the community was evolving, especially from a technical perspective; but his own instance of Lupa has produced no up-to-date results for several weeks

  29. Links 27/05/2023: Goodbyes to Tina Turner

    Links for the day

  30. HMRC: You Can Click and Type to Report Crime, But No Feedback or Reference Number Given

    The crimes of Sirius ‘Open Source’ were reported 7 days ago to HMRC (equivalent to the IRS in the US, more or less); but there has been no visible progress and no tracking reference is given to identify the report

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts