Mr N Manager Support Online Demo Site [359918]
Logout(Remember Me)
Support
RM Home
Support
Sections
My Support Calls
Search Library
Drivers and Downloads
Guide to Support Online
FAQs
Events
Technical Rating:�
Support Home PageSupport
Print This PagePrint This Page
Add to 'My Library' Add to 'My Library'

Microsoft Security Updates for Community Connect 3 - March, April 2006 [HFXCC3159]
Published Date : 28 Apr 2006�� Last Updated : 13 Feb 2020�� Content Ref: DWN641221��





Description

Any references to Community Connect 3™ in this document apply equally to RM Smart-Tools 3.

Microsoft has released significant security updates for Windows.  HFXCC3159 contains these updates in a format easily applied to Community Connect 3 networks.

We recommend that you apply this Security Update without delay.

Important: This Security Update can be installed on to Community Connect 3 networks with HFXCC3110B or equivalent, ie RM AppAgent version 1.37.3.0 or greater.
 

Before installing any software update, please refer to TEC90813 and DWN59018 in the Other Useful Articles section below. These articles detail RM's recommendations regarding software update installation and support.


Known issues

At the time of writing there are no known issues related to HFXCC3159.


Requirements
  • HFXCC3159 should be installed on Community Connect 3 networks with Service Release 4 (SR4) or above, and HFXCC3110B or equivalent.
  • This Security Update should be installed on to all Community Connect 3 servers.

Note:  All servers and workstations will need to be restarted in order to install this Security Update completely. You should therefore plan to install the Security Update out-of-hours to minimise disruption to your network.


What will the Security Update change?

HFXCC3159 contains the following Microsoft security updates:

1. MS 06-011: Permissive Windows Services DACLs Could Allow Elevation of Privilege (914798);
2. MS 06-013: Cumulative Security Update for Internet Explorer (912812);
3. MS 06-014: Vulnerability in the Microsoft Data Access Components (MDAC) Function Could Allow Code Execution (911562);
4. MS 06-016: Cumulative Security Update for Outlook Express (911567);

5. MS06-017: Vulnerability in Microsoft FrontPage Server Extensions Could Allow Cross-Site Scripting (917627).

 

More information on the issues resolved by these updates is available from Microsoft's website (http://www.microsoft.com).

 

Note: HFXCC3159 does not contain all the security updates released by Microsoft in March and April 2006. Please read the More Information section below for further details.

 

Note: The updates provided in HFXCC3159 supersede some previously-released Microsoft security updates; as such, the following Community Connect 3 workstation packages will be removed from networks (if they are present) during this Security Update's installation:

 

  • OE6 SP1 Cumulative Security Update KB897715
  • IE6 SP1 Cumulative Security Update KB905915
  • IE6 SP2 Cumulative Security Update KB905915

Who should install this Security Update?

If you are running a Community Connect 3 network, you should apply this Security Update without delay.

HFXCC3159 should be applied to all Community Connect 3 servers including all domain controllers and all Member Servers (such as DAMMS and MIS servers, or servers running MicrosoftExchange).  It does not need to be applied to Community Connect 3 workstations directly but all servers and workstations will need to be restarted for the Microsoft� security updates to be applied fully.



Download Instructions

1.      Click the HFXCC3159.exe file link to download the Security Update.

2.      Choose to Save the file, browse to the temporary location you wish to save it to (for example D:\temp) and click Save.

3.      When it has downloaded, follow the installation instructions below to install the Security Update.



Download

FilenameFile SizeDownload
HFXCC3159.exe39.42 Mb Download


Installation Instructions

Important: During the installation of HFXCC3159, the Station Manager HealthCheck and the allocation of new Microsoft security update packages must be done manually. Please ensure that you fully complete all steps in the Installation Instructions.

 

If you previously started to install the Security Update but cancelled the operation, follow the installation instructions in the 'Installing after cancelling a previous install' section below.

 

1.      Download HFXCC3159.

2.      Log on to your first Community Connect 3 domain controller as Administrator (not SystemAdmin) and copy the Security Update to a temporary location (for example D:\temp).

3.      Run the Security Update by double-clicking the self-extracting executable file (HFXCC3159.exe).  The Security Update will extract files automatically and run the RM Installation Assistant to begin the installation.

4.      When prompted, click Continue.

5.      The installation will proceed automatically.  When prompted that the RM Installation Assistant has finished, click Finish.

 

Note: After installation at a server, the server will need to be rebooted for the Microsoftsecurity updates to be applied fully. Ensure the server has rebooted successfully before continuing.

 

6.      Repeat Steps 2-5 at all your other Community Connect 3 domain controllers.

7.      Also repeat steps 2-5 at any member servers (eg DAMMS or MIS servers) on the network.

 

Note: After installation at a server, the server will need to be rebooted for the Microsoft security updates to be applied fully. It is recommended that you ensure each domain controller has rebooted successfully before applying the software update to the next server.

 

8.      When all Community Connect 3 domain controllers have had HFXCC3159 applied, log in to the first Community Connect 3 domain controller server in each site as the administrator user (not SystemAdmin). Run Windows Explorer and browse to D:\RMNetwork\RMManage\Station Manager. Double-click on the file Healthcheck.exe, and select OK to start the Healthcheck, and OK again when it has completed.

9.      HFXCC3159 provides new workstation packages but does not automatically allocate them. You should allocate these new packages to all your workstations at your earliest convenience. Note: If you choose to allocate the packages at a later time, you must still complete all of steps 1 to 8 above now, including running the Station Manager health check.  

The new security packages are listed as available packages as follows in the RM Management Console:

 

SYSTEM PACKAGES

        Windows XP Security Update KB911562

        Windows XP SP2 Security Update KB912812

        Windows XP SP2 Security Update KB911567

        Windows XP SP1 Security Update KB914798

        Windows XP SP1 Security Update KB912812

        Windows XP SP1 Security Update KB911567

 

Note: You can safely allocate all packages to all workstations. These can be allocated at Main Site. Only those security updates required by each workstation will be installed, depending on whether it is running Windows� XP SP1 or SP2. Any packages that are not required by a given workstation will be listed as NOT_INSTALLED (OS VERSION) in that workstation's station INI file.

10.  Once you have allocated the packages to workstations, restart the workstations for the Microsoft security update to be installed.


Installing after cancelling a previous install

1.      Browse to D:\RMNetwork\RMManage\RM Hotfixes\HFXCC3159_extracted and double-click the file RM Installation Assistant.exe. (If this folder or its contents does not exist, re-run the HFXCC3159.exe file downloaded from the RM Support Web site).

2.      Follow the procedures from step 4 in the Installation section above.


Important - interaction with RM Service Releases

The components of HFXCC3159 will be included in a future Community Connect 3 Service Release or Microsoft Service Packs validated by RM.

The Security Update can be installed on to networks running Community Connect 3 with Service Release 4 or above, and HFXCC3110B or equivalent.

HFXCC3159 is not included in Service Release 4 or 5. It will not need to be re-applied if originally installed before Service Release 5 is installed.



Download File Contents

See the Description section for full list.  HFXCC3159 contains new relevant workstation and server Microsoft security updates. 



More Information

HFXCC3159 does not contain the following security bulletins released by Microsoft in March/April 2006:

1. MS06-012: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (905413). RM is investigating the issues relating to this security update and will provide Office updates in a future security update or service pack if required.

2. MS 06-015: Vulnerability in Windows Explorer Could Allow Remote Code Execution (908531).  This was not included in this software update due to issues posted by Microsoft relating to reported issues with HP software. This will be evaluated as a potential future software update.



FEEDBACK
Did the information in this article help answer your question?
�Yes
�No
Please add any comments about this article in the box below. If you answered No then it is important you tell us why so that we can change the article if required. We can only respond if you log in to the RM Support website or provide your contact details. Note: If you need help with a technical query, please log a call online or telephone our support team.
Thank you for your feedback, which is sent directly to the RM Knowledge team. We address every message received with the intention of improving our Knowledge Library articles. If you have an unresolved technical issue, please contact RM Support.


If this article has not helped provide a solution then it is also possible to log a call...



Document Keywords:�159, windows, 2000, sr4, service release 4, hotfix, windows server 2003, w2k3, w2ksp3, w2ksp4, xpsp1, xpsp1a, xpsp2, critical, security bulletin, security update, update , hotfix 159, update 159, ms06-016, ms06-015, ms06-014, ms06-013, ms06-017, ms06-011, ms06-012, 911567, kb911567, 908531, kb908531, 911562, kb911562, 912812, kb912812, 914798, kb914798


Please read - important disclaimer information.
http://www.rm.com/_RMVirtual/Includes/csredirect.asp?cref=&title=Standard Content Disclaimer


Top Of PageTop of page