Microsoft Security Updates for Community Connect 3 - June 2006 [HFXCC3164]
Published Date : 12 Jul 2006��
Last Updated : 13 Feb 2020��
Content Ref: DWN684580��
Operating System
Community Connect 3 SR4, Community Connect 3 SR5, RM Smart-Tools 3 SR4, RM Smart-Tools 3 SR5
Part No
(none)
Summary
Community Connect 3 Security Update to apply critical Microsoft security updates to servers and workstations.
Description
Any references to Community Connect 3™ in this document apply equally to RM Smart-Tools 3.
Microsoft� has released significant security updates for Windows�. HFXCC3160 contains these updates in a format easily applied to Community Connect 3 networks.
We recommend that you apply this Security Update without delay.
Important: This Security Update can be installed on to Community Connect 3 networks with HFXCC3110B or equivalent, ie RM AppAgent version 1.37.3.0 or greater.
Before installing any software update, please refer to TEC90813 and DWN59018 in the Other Useful Articles section below. These articles detail RM's recommendations regarding software update installation and support.
Known issues
At the time of writing there are no known issues related to HFXCC3164.
Requirements
HFXCC3164 should be installed on Community Connect 3 networks with Service Release 4 (SR4) or above, and HFXCC3110B or equivalent.
This Security Update should be installed on to all Community Connect 3 servers.
Note: All servers and workstations will need to be restarted in order to install this Security Update completely. You should therefore plan to install the Security Update out-of-hours to minimise disruption to your network.
What will the Security Update change?
HFXCC3164 contains the following Microsoft� security updates:
1. MS 06-021: Cumulative Security Update for Internet Explorer (916281);
2. MS 06-022: Vulnerability in ART Image Rendering Could Allow Remote Code Execution (918439);
3. MS 06-023: Vulnerability in Microsoft JScript Could Allow Remote Code Execution (917344);
4. MS 06-024: Vulnerability in Windows Media Player Could Allow Remote Code Execution (917734);
5. MS 06-025: Vulnerability in Routing and Remote Access Could Allow Remote Code Execution (911280);
6. MS 06-030: Vulnerability in Server Message Block Could Allow Elevation of Privilege (914389);
7. MS 06-031: Vulnerability in RPC Mutual Authentication Could Allow Spoofing (917736);
8. MS 06-032: Vulnerability in TCP/IP Could Allow Remote Code Execution (917953).
More information on the issues resolved by these updates is available from the Microsoft� Web site (http://www.microsoft.com/).
Note: HFXCC3164 does not contain all the security updates released by Microsoft� in June 2006. Please read the More Information section below for further details.
Note: MS 06-029: Vulnerability in Microsoft� Exchange�™ Server Running Outlook Web Access Could Allow Script Injection (912442) is available in a separate download (DWN686610), a link is available in the Other Useful Articles section below.
Note: The updates provided in HFXCC3164 supersede some previously-released Microsoft� security updates; as such, the following Community Connect 3 workstation packages will be removed from networks (if they are present) during this Security Update's installation:
System Packages
Windows XP Security Update KB913446
Windows XP Security Update KB893066
Windows XP Security Update KB885250
Windows Script Engine Hotfix 814078 (client)
Windows XP SP1 Security Update KB912812
Application Packages
Windows XP Security Update KB913446
Windows Media Player 10 Security Update KB911565
Who should install this Security Update?
If you are running a Community Connect 3 network, you should apply this Security Update without delay.
HFXCC3164 should be applied to all Community Connect 3 servers including all domain controllers and all Member Servers (such as DAMMS and MIS servers, or servers running Microsoft� Exchange - please see the Other Useful Articles section below for an additional critical update for Exchange servers). It does not need to be applied to Community Connect 3 workstations directly but all servers and workstations will need to be restarted for the Microsoft� security updates to be applied fully.
Download Instructions
1.Click the HFXCC3164.exe file link below to download the Security Update.
2.Choose to Save the file, browse to the temporary location you wish to save it to (for example D:\temp) and click Save.
3.When it has downloaded, follow the installation instructions below to install the Security Update.
Download
Filename
File Size
Download
HFXCC3164.exe
39.52 Mb
Installation Instructions
Important: During the installation of HFXCC3164, the Station Manager Health Check and the allocation of new Microsoft� security update packages must be done manually. Please ensure that you fully complete all steps in the Installation Instructions.
If you previously started to install the Security Update but cancelled the operation, follow the installation instructions in the 'Installing after cancelling a previous install' section below.
1.Download HFXCC3164.
2.Log on to your first Community Connect 3 domain controller as Administrator (not SystemAdmin) and copy the Security Update to a temporary location (for example D:\temp).
3.Run the Security Update by double-clicking the self-extracting executable file (HFXCC3164.exe).The Security Update will extract files automatically and run the RM Installation Assistant to begin the installation.
4.When prompted, click Continue.
5.The installation will proceed automatically.When prompted that the RM Installation Assistant has finished, click Finish.
Note: After installation at a server, the server will need to be rebooted for the Microsoft� security updates to be applied fully. Ensure the server has rebooted successfully before continuing.
6.Repeat steps 2-5 at all your other Community Connect 3 domain controllers.
7.Repeat steps 2-5 at any member servers (eg DAMMS or MIS servers) on the network.
Note: After installation at a server, the server will need to be rebooted for the Microsoft� security updates to be applied fully. It is recommended that you ensure each domain controller has rebooted successfully before applying the software update to the next server.
8.When all Community Connect 3 domain controllers have had HFXCC3164 applied, log in to the first Community Connect 3 domain controller server in each site as the administrator user (not SystemAdmin). Run Windows� Explorer� and browse to D:\RMNetwork\RMManage\Station Manager. Double-click on the file Healthcheck.exe, and select OK to start the Health Check, and OK again when it has completed.
9.HFXCC3164 provides new workstation packages but does not automatically allocate them. You should allocate these new packages to all your workstations at your earliest convenience. Note: If you choose to allocate the packages at a later time, you must still complete all of steps 1 to 8 above now, including running the Station Manager Health Check.
The new security packages are listed as available packages as follows in the RM Management Console:
SYSTEM PACKAGES
Windows XP SP2 Security Update KB918439
Windows XP SP2 Security Update KB916281
Windows XP SP1 Security Update KB918439
Windows XP SP1 Security Update KB916281
Windows XP Security Update KB917953
Windows XP Security Update KB917344
Windows XP Security Update KB914389
Windows XP Security Update KB911280
Application Packages
Windows Media Player 9 Security Update KB917734
Windows Media Player 10 - Security Update KB917734
NOTE: You may have more than one version of Windows� Media Player available on your Community Connect 3 network. Media Player 9 first shipped with Windows� XP Service Pack 2 but is available as a separate package. Media Player 10 may also be available as a separate package. You can allocate both Security Updates listed above for Windows� Media Player to all workstations, but only the appropriate package will be installed. If you allocate the Windows� Media Player 10 package to a workstation where it is not installed, the workstation's PackageControl INI file will report the package as NOT_INSTALLED (DEPENDENCY).
10.Once you have allocated the packages to workstations, restart the workstations for the Microsoft� security update to be installed.
Installing after cancelling a previous install
1.Browse to D:\RMNetwork\RMManage\RM Hotfixes\HFXCC3164_extracted and double-click the file RM Installation Assistant.exe. Note: If this folder or its contents does not exist, re-run the HFXCC3164.exe file downloaded from the RM Support Web site as in step 1 of the Installation Instructions section above.
2.Follow the procedures from step 4 in the Installation Instructions section above.
Important - interaction with RM Service Releases
Some of the components of HFXCC3164 are included in Service Release 6 for Community Connect 3.
The Security Update can be installed on to networks running Community Connect 3 with Service Release 4 or above, and HFXCC3110B or equivalent.
HFXCC3164 is not included in Service Release 4 or 5. It will not need to be re-applied if originally installed before Service Release 5 is installed.
Download File Contents
See the Description section for full list. HFXCC3164 contains new relevant workstation and server Microsoft� security updates.
More Information
HFXCC3164 does not contain the following security bulletins released by Microsoft� in June 2006:
1. MS 06-029: Vulnerability in Microsoft Exchange Server Running Outlook Web Access Could Allow Script Injection (912442) - This is packaged separately and is available in DWN686610 (a link is in the Other Useful Articles section below)
2. MS 06-026: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution (918547). This update is not for supported CC3 platforms.
3. MS 06-028: Vulnerability in Microsoft PowerPoint Could Allow Remote Code Execution (916768) RM is investigating the issues relating to this security update and will provide Office updates in a future security update or service pack if required. However, an attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
4. MS 06-027: Vulnerability in Microsoft Word Could Allow Remote Code Execution (917336) RM is investigating the issues relating to this security update and will provide Office updates in a future security update or service pack if required. However, an attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights