Operating System Upgrade Service Release 2000.4.6SR9 (win-OS-Upgrade-K9.2000-4-6-SR9.exe)

Release date: 21-April-2009

Document Revision 1

Microsoft provides monthly releases of security hotfixes on the 2nd Tuesday of each month.  Cisco’s monthly OS Service Release is scheduled to post on the 3rd Tuesday of each month.

Cisco will continue to test and release Microsoft hotfixes that meet our criteria for Critical hotfixes in 1 business day.  Any applicable critical hotfix released by Microsoft will be added to the Cisco IP Telephony Operating System, SQL Server, Security Updates document with and explanation about whether or not it is critical for Cisco IP Telephony servers and when it will be released by Cisco.

Caution:  Do not apply this service release with OS version 2000.4.4a or previous OS release trains.  This service release is only compatible with the OS 2000.4.6 release train.  You should apply this service release to all servers in your cluster.  This installation causes call-processing interruptions and requires a reboot.  Close all programs before proceeding including Internet Explorer to avoid conflicts with the software being installed and/or upgraded.

General Note: If the following messages are displayed during the installation, please click “OK” and continue. These will not affect this upgrade. The causes for these messages are under investigation:
            * The Instruction at "0X0cda00dd8" referenced memory at "0X0cda00dd8". The memory could not be read. Click OK to terminate the program (CSCeb31088)
            * The Instruction at "0X000000000" referenced memory at "0X000000000". The memory could not be read. Click OK to terminate the program (CSCed45218)
            * AddAnonymousWebUserAccess failure during CallManager installations (CSCed27066)

Naming Convention Change

 For operating system, SQL Server, and Cisco IP telephony application software updates, Cisco has replaced the term, support patch, with the term, service release.  Service releases provide the same functionality as support patches; that is, they provide bug fixes, etc.  

 Review the file naming convention before you apply the software update.

 <software_name>-<software version>_<sr(x)>

 <software name> equals the name of the application; <software version> equals the maintenance release; <sr(x)> equals the version of the service release

 For example, review the following file name:

 win-OS-Upgrade-K9.2000-4-2sr2.exe

 win-OS-Upgrade indicates that this file is an operating system upgrade file; K9 indicates that you download the file from the Cisco cryptographic website; 2000-4-2 indicates the operating system maintenance release version, and sr2 indicates that this file is the first version of the operating system upgrade service release.

Contents

This document contains information on the following topics.  Click the hyperlink to go directly to the section.

·         Cisco Notification Tools

This section provides information about how to receive email notifications when new updates post to Cisco Connection Online.

·         Information about This Service Release

This section provides general information and specifies the affected Cisco IP telephony applications, supported servers, and hotfixes that are automatically installed with this software update.

·         Installing the Service Release

This section provides procedures for installing this service release on supported servers.

·         Verifying Hotfixes By Using Microsoft Baseline Security Analyzer

This section provides a list of hotfixes that Microsoft Baseline Security Analyzer and QFEcheck verify.  See this section if you want to verify which hotfixes exist on your server.

·         Uninstalling Hotfixes

This section provides information about how to uninstall the Microsoft hotfixes.

 

Cisco Notification Tools

 

Cisco CallManager Notification Tool: Cisco has replaced the current Cisco CallManager notification tool with a new, more robust notification tool that is based on your Cisco.com profiles.  This new tool delivers email notifications for individual Cisco voice products that you select.  Follow the steps below to sign up for the Cisco Voice Technology Group Subscription Tool:

 

·         Login with your Cisco.com account information at this link: http://www.cisco.com/cgi-bin/Software/Newsbuilder/Builder/VOICE.cgi

·         Select "CallManager Cryptographic Software including OS updates" to receive notification when new operating system updates are posted.

·         Select any other products updates that you wish to receive.

·         Click update at the bottom of the page.

·         Confirm your selections.

 

You may see this message at the bottom of the page: "Your Profile Currently Indicates that you do not wish to receive email from Cisco.”

 

To be able to receive information updates, you must update your email preferences.  Click on the link to update your email preferences (located in the Other Information section).  Click submit when you are done.  

 

If you have enabled email notification, you may exit now.  If you have not enabled email notification, then you will need to repeat the steps above.

 

This new software notification tool requires a valid Cisco.com login. If you do not currently have a Cisco.com password, please register with Cisco.com at: http://tools.cisco.com/RPF/register/register.do

 

Cisco PSIRT Advisory Notification Tool: This email service provides automatic notification of all Cisco Security Advisories that are released by the Cisco Product Security Incident Response Team (PSIRT).  Security Advisories, which describe security issues that directly impact Cisco products, provide a set of required actions to repair these products. To subscribe, click the following URL and perform the tasks as directed on the web page: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html#SecurityInfo

 

Information about This Service Release

 

Review the following information before you install the service release:

 ·         Cumulative Severity:  Critical

 ·         Description: OS Upgrade 2000.4.6 Service Release 9

 ·       Minimum OS requirements: Any OS version upgraded with win-OS-Upgrade-K9.2000-4-6.exe or Fresh install of OS 2000.4.6

 ·       Affected Cisco IP Telephony Applications:  All versions of Cisco CallManager and all compatible versions of Cisco IP Interactive Voice Response (IP IVR), Cisco IP Call Center Express (IPCC Express), Cisco Personal Assistant (PA), Cisco Emergency Responder (CER), Cisco Conference Connection (CCC), Cisco Customer Voice Portal (CVP), Cisco IP Queue Manager and Cisco MeetingPlace.

 ·           Supported Servers:  All of the Cisco Media Convergence Servers (MCS) and Cisco-approved, customer-provided Compaq/HP and IBM server supported by 2000.4.6 fresh install and upgrades.  For further information see the Hardware Compatibility Matrixes at the following location:

http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_device_support_tables_list.html

 ·         Install time: < 15 Minutes per server

 ·         Reboot required: Yes

 ·         Replaces previously posted files: Previous 2000.4.6 Service Releases

 ·         Log File Location: C:\Program Files\Common Files\Cisco\Logs\OS

 ·         Known Caveats: Please refer to the ‘Known Caveats’ section below.

 

Note:  Apply this service release to all servers in your cluster.

Caution:  This installation causes call-processing interruptions and requires a reboot.  Close all programs before proceeding including Internet Explorer.

 

This service release includes the following hotfixes: 

 

Table:  Hotfixes That Are Included in the Service Release

Bulletin

Knowledge Base Article

or Cisco Defect

Description

1st Released in Support Patch/Service Release:

MS04-003

Q832483

Buffer Overrun in MDAC Function Could Allow Code Execution

2000-2-5sr6 

MS05-009

KB885492

KB890261

KB887472

Vulnerability in PNG Processing Could Allow Remote Code Execution

2000.2.7sr2

MS05-026

KB896358

Vulnerability in HTML Help Could allow Remote Code Execution

2000.2.7sr5

MS05-027

KB896422

Vulnerability in Server Message Block Could Allow Remote Code Execution

2000.2.7sr5

MS05-030

KB897715

Cumulative Security Update in Outlook Express

2000.2.7sr5

MS05-032

KB890046

Vulnerability in Microsoft Agent Could Allow Spoofing

2000.2.7sr5

MS05-036

KB901214

Vulnerability in Microsoft Color Management Module Could Allow Remote Code Execution

2000.2.7sr6

MS05-040

KB893756

Vulnerability in Telephony Service Could Allow Remote Code Execution

2000.2.7sr7

MS05-041

KB899591

Vulnerability in Remote Desktop Protocol Could Allow Denial of Service

2000.2.7sr7

MS05-042

KB899587

Vulnerabilities in Kerberos Could Allow Denial of Service, Information Disclosure, and Spoofing

2000.2.7sr7

MS05-043

KB896423

Vulnerability in Print Spooler Service Could Allow Remote Code Execution

2000.2.7sr7

MS05-044

KB905495

Vulnerability in Windows FTP Client Could Allow File Transfer Location Tampering

2000.2.7sr8

MS05-045

KB905414

Vulnerability in Network Connection Management Could Allow Denial of Service

2000.2.7sr8

MS05-046

KB899589

Vulnerability in Client Services for Netware Could Allow Remote Code Execution

2000.2.7sr8

MS05-047

KB905749

Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege

2000.2.7sr8

MS05-048

KB901017

Vulnerability in Microsoft Collaboration Objects Could Allow Remote Control Execution

2000.2.7sr8

MS05-049

KB900725

Vulnerability in Windows Shell Could Allow Remote Control Execution

2000.2.7sr8

MS05-050

KB904706

Vulnerability in DirectShow Could Allow Remote Code Execution

2000.2.7sr8

MS05-053

KB896424

Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution

2000.4.2sr1

MS05-054

KB905915

Cumulative Security Update for Internet Explorer

2000.4.2sr2

MS05-055

KB908523

Vulnerability in Windows Kernel Could Allow Elevation of Privilege

2000.4.2sr2

N/A

KB831577

IIS Memory Leak when HTTP Compression Used

2000.4.2sr2

N/A

KB834010

DeadLock Occurs when Program Uses Certain WMI Calls

2000.4.2sr2

MS06-001

KB912919

Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution

2000.4.2sr3

MS06-002

KB908519

Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution 

2000.4.2sr3

N/A

CSCsd14924

KB823818

MPWeb IIS stop responding due to ASP buffering leading to out of memory

2000.4.2sr4

MS06-005

KB911565

Vulnerability in Windows Media Player Could Allow Remote Code Execution

2000.4.2sr4

MS06-006

KB911564

Vulnerability in Windows Media Player Plug-in with Non-Microsoft Internet Browsers Could Allow Remote Code Execution

2000.4.2sr4

N/A

CSCsd18255

SQL remains in Starting State or CCM fails to start after OS2000.4.2 upg

2000.4.2sr5a

 

CSCsd45211

Need to uninstall CScsd11211 after end of CommonWealth Games

2000.4.2sr6

MS06-013

KB912812

Cumulative Security Update for Internet Explorer (912812)  (Replaces MS05-054)

2000.4.2sr6

MS06-014

KB911562

Vulnerability in the Microsoft Data Access Components (MDAC) Function Could Allow Code Execution (911562)

2000.4.2sr6

MS06-015

KB908531

Vulnerability in Windows Explorer Could Allow Remote Code Execution (908531)

2000.4.2sr6

MS06-016

KB911567

Cumulative Security Update for Outlook Express (911567) (Replaces MS05-030)

2000.4.2sr6

 

CSCsd96901

KB911562 not identified after installation

2000.4.2sr6

MS06-018

KB913580

Vulnerability in Microsoft Distributed Transaction Coordinator Could Allow Denial of Service (replaces MS05-051 KB902400)

2000.4.2sr7

 

KB822720

The computer stops responding (hangs) on boot in Windows 2000 Server, or you receive a "Stop 0x00000080" error message when you add or remove a hot swap drive

2000.4.2sr7

 

CSCse04719

With 2 g RAM or more installed Memory.dmp file will be incomplete

2000.4.2sr7

 

CSCsd53918

MCS server rebooted with bugcheck

2000.4.2sr7

 

CSCsd95726

CD ROM icon missing after SR upgrade

2000.4.2sr7

 

CSCse47327

high cpu utilization by ccm.exe after upgrade to 2000.4.2sr7

Reverses out CSCsc55016 added in 2000.4.2sr7.

2000.4.2sr7a

MS06-021

KB916281

Cumulative Security Update for Internet Explorer (replaces MS06-013 KB912812)

2000.4.2sr8

MS06-023

KB917344

Vulnerability in Microsoft JScript Could Allow Remote Code Execution

2000.4.2sr8

MS06-024

KB917344

Vulnerability in Windows Media Player Could Allow Remote Code Execution

2000.4.2sr8

MS06-025

KB911280

Vulnerability in Routing and Remote Access Could Allow Remote Code Execution

2000.4.2sr8

 

CSCse32811

RealVNC allows remote access to Win2k server console without password

2000.4.2sr8

MS06-030

KB914389

Vulnerability in Server Message Block Could Allow Elevation of Privilege

2000.4.2sr8

MS06-031

KB917736

Vulnerability in RPC Mutual Authentication Could Allow Spoofing

2000.4.2sr8

MS06-032

KB917953

Vulnerability in TCP/IP Could Allow Remote Code Execution

2000.4.2sr8

 

CSCse54942

Undefined device on 7815I2 with OS 2000.4.3

 

2000.4.3aSR1

MS06-025

KB911280 v2

Vulnerability in Routing and Remote Access Could Allow Remote Code Execution

2000.4.3aSR2

 

CSCse61586

OS 2000.4.2 and 2000.4.3 missing drivers for USB DAT72 drive

2000.4.3aSR2

MS06-034

KB917537

Vulnerability in Microsoft Internet Information Services using Active Server Pages Could Allow Remote Code Execution (917537)

2000.4.3aSR2

MS06-035

KB917344

Vulnerability in Server Service Could Allow Remote Code Execution (917159)

2000.4.3aSR2

MS06-036

KB917344

Vulnerability in DHCP Client Service Could Allow Remote Code Execution (914388)

2000.4.3aSR2

 

CSCse79354

Remove fix for CSCsd62235 in 2000.4.3aSR2

2000.4.3aSR2

MS06-040

KB921883

Vulnerability in Server Service Could Allow Remote Code Execution (921883)

2000.4.3aSR3

MS06-041

KB920683

Vulnerability in DNS Resolution Could Allow Remote Code Execution (920683)

2000.4.3aSR3

MS06-042

KB918899

Cumulative Security Update for Internet Explorer (918899)

2000.4.3aSR3

MS06-044

KB917008

Vulnerability in Microsoft Management Console Could Allow Remote Code Execution (917008)

2000.4.3aSR3

MS06-046

KB922616

Vulnerability in HTML Help Could Allow Remote Code Execution (922616)

2000.4.3aSR3

MS06-051

KB917422

Vulnerability in Windows Kernel Could Result in Remote Code Execution (917422)

2000.4.3aSR3

MS06-045

KB921398

Vulnerability in Windows Explorer Could Allow Remote Code Execution (921398)

2000.4.3aSR3

MS06-049

KB920958

Vulnerability in Windows Kernel Could Result in Elevation of Privilege (920958)

2000.4.3aSR3

MS06-050

KB920670

Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution (920670)

2000.4.3aSR3

 

CSCse08287

MCS OS SR needs to check for and report back errors

2000.4.3aSR3

 

CSCse45722

ES/SR Internal reboot function doesn't work when executed remotely

2000.4.3aSR3

 

CSCse76137

Upgrade version registry key is missing on Fresh Installs

2000.4.3aSR3

 

CSCsf26883

ES/SR Need additional debug for commands run during installation

2000.4.3aSR4

 

CSCsf10966

OS 2000.4.3aSR Upgrades Show 110% On Stopping Services

2000.4.3aSR4

 

CSCsf25340

ES/SR Stopservices logging to stopservices.txt instead of ES/SR logfile

2000.4.3aSR4

 

CSCsg01904

MS Hotfixes install even when already present

2000.4.3aSR4

 

CSCsg01902

ES/SR: Run QFE report for diagnostic purposes

2000.4.3aSR4

 

CSCsg01899

ES/SR need Processes report at end of installation

2000.4.3aSR4

 

CSCsg01895

ES/SR Support for Good, but Non-zero return values from commands run

2000.4.3aSR4

 

CSCsg22151

Winmgmt logging causing higher CPU

2000.4.3aSR4

MS06-042

KB918899v3

Cumulative Security Update for Internet Explorer (918899)

2000.4.3aSR4

MS06-053

KB920685

Vulnerability in Indexing Service Could Allow Cross-Site Scripting (920685)

2000.4.3aSR4

 

CSCsg07841

OS 2000.4.2sr11 installation package doesn't execute

2000.4.3aSR4

MS06-049

KB920958v2

Vulnerability in Windows Kernel Could Result in Elevation of Privilege (920958)

2000.4.3aSR5

MS06-055

KB925486

Vulnerability in Vector Markup Language Could Allow Remote Code Execution (925486)

2000.4.3aSR5

 

CSCsf98903

Fresh install servers in 2000.4.3a have erroneous EventLog size 10240KB

 

2000.4.3aSR5

 

CSCsf98891

Fresh install servers in 2000.4.3a do not have NetBIOS over TCP/IP check

 

2000.4.3aSR5

MS06-057

KB923191

Vulnerability in Windows Explorer Could Allow Remote Execution (923191)

2000.4.3aSR5

MS06-061

924191

Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (924191)

2000.4.3aSR5

MS06-063

923414

Vulnerability in Server Service Could Allow Denial of Service (923414)

2000.4.3aSR5

MS06-061

924191v2

Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (924191)

2000.4.4sr1

MS06-067

922760

Cumulative Security Update for Internet Explorer (922760)

2000.4.4sr1

MS06-068

920213

Vulnerability in Microsoft Agent Could Allow Remote Code Execution (920213)

2000.4.4sr1

MS06-070

924270

Vulnerability in Workstation Service Could Allow Remote Code Execution (924270)

2000.4.4sr1

 

CSCsg81424

Fail to uninstall VNC 3.3.7

2000.4.4sr2

 

CSCsf07541

MCS-OS Update needed for N America DST changes in 2007

2000.4.4sr2

 

CSCsd57985

DayLight savings working wrongly for 26-03-2006 without DayLight Patch.

2000.4.4sr2

 

CSCse15694

Daylight savings incorrect for GMT+2 Cairo Time Zone

2000.4.4sr2

MS06-072

925454

Cumulative Security Update for Internet Explorer (925454)

2000.4.4sr2

MS06-076

923694

Cumulative Security Update for Outlook Express (923694)

2000.4.4sr2

MS06-074

926247

Vulnerability in SNMP Could Allow Remote Code Execution (926247)

2000.4.4sr2

MS06-078

923689

Vulnerability in Windows Media Format Could Allow Remote Code Execution (923689)

2000.4.4sr2

MS07-004

929969

Vulnerability in Vector Markup Language Could Allow Remote Code Execution (929969)

2000.4.4sr3

 

CSCsh58552

SR needs to support 2000.4.4a OS version string

2000.4.4aSR3a

MS07-008

928843

Vulnerability in HTML Help ActiveX Control Could Allow Remote Code Execution (928843)

2000.4.4aSR4

MS07-009

927779

Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution (927779)

2000.4.4aSR4

MS07-016

928090

Cumulative Security Update for Internet Explorer (928090)

2000.4.4aSR4

MS07-006

928255

Vulnerability in Windows Shell Could Allow Elevation of Privilege (928255)

2000.4.4aSR4

MS07-011

926436

Vulnerability in Microsoft OLE Dialog Could Allow Remote Code Execution (926436)

2000.4.4aSR4

MS07-012

924667

Vulnerability in Microsoft MFC Could Allow Remote Code Execution (924667)

2000.4.4aSR4

MS07-013

918118

Vulnerability in Microsoft RichEdit Could Allow Remote Code Execution (918118)

2000.4.4aSR4

 

CSCsh20360

Looping in System Date & Time due to Daylight saving correction.

2000.4.4aSR4

 

CSCsh79447

MS07-009 hotfix does not install on CCM 4.2.3

2000.4.4aSR4

 

CSCsh91439

MCS-OS - MBSA Upgrade to 2.0.1 required

2000.4.4aSR5

 

CSCsi19073

MBSA 2.0.1 indicates missing packages

2000.4.4aSR5

 

CSCsh91735

931836

February 2007 cumulative time zone update for Microsoft Windows operating systems

2000.4.4aSR5

 

CSCsd81429

Third Party Director Software Not Reporting All Environment Variables on IBM Servers

2000.4.4aSR5

 

CSCsh93237

Default Microsoft Video Driver Selected for MCS-7825-I2-IPC2

2000.4.4aSR5

MS07-017

925902

Vulnerabilities in GDI Could Allow Remote Code Execution (925902)

2000.4.4aSR6

MS07-020

932168

Vulnerability in Microsoft Agent Could Allow Remote Code Execution (932168)

2000.4.4aSR6

MS07-021

930178

Vulnerabilities in CSRSS Could Allow Remote Code Execution (930178)

2000.4.4aSR6

MS07-022

931784

Vulnerability in Windows Kernel Could Allow Elevation of Privilege (931784)

2000.4.4aSR6

 

CSCsi47502

Update Location of IBM related MIBs

2000.4.4aSR6

 

CSCsi23088

PegasusProvider.exe crashes during installing 2000.4.4sr5

2000.4.4aSR6

 

CSCsh70353

Reinstall Hotfix- KB831877 and KB835732 error with 2000.4.4a OS Upgrade

2000.4.4aSR6

MS07-027

931768

Cumulative Security Update for Internet Explorer (931768)

2000.4.4aSR7

MS07-029

935966

Vulnerability in Windows DNS RPC Interface Could Allow Remote Code Execution (935966)

2000.4.4aSR7

 

935843

Stop 0x0000007F error when you print from Windows XP or Windows 2000 with GDI security update 925902 installed

2000.4.4aSR7

 

CSCsi79685

891071

A memory leak may occur in the Winmgmt process in Windows 2000

2000.4.4aSR7

 

CSCsi31474

Missing IBM Director 5.10.3 PF1 fix on Windows 2000

2000.4.4aSR7

MS07-031

935840

Vulnerability in the Windows Schannel Security Package Could Allow Remote Code Execution (935840):

2000.4.4aSR8

MS07-033

933566

Cumulative Security Update for Internet Explorer (933566):

2000.4.4aSR8

MS07-035

935839

Vulnerability in Win 32 API Could Allow Remote Code Execution (935839):

2000.4.4aSR8

MS07-039

926122

Vulnerability in Windows Active Directory Could Allow Remote Code Execution (926122)

2000.4.5aSR1

 

CSCsj51249

MDAC patch installation for KB92779 can abend when checking MDAC Version Version

2000.4.5aSR1

 

CSCsj51259

MDAC installation can abend a command doesn't execute properly

2000.4.5aSR1

MS07-042

936227

Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (936227)

2000.4.5aSR2

MS07-043

921503

Vulnerability in OLE Automation Could Allow Remote Code Execution (921503)

2000.4.5aSR2

MS07-045

937143

Cumulative Security Update for Internet Explorer (937143)

2000.4.5aSR2

MS07-046

938829

Vulnerability in GDI Could Allow Remote Code Execution (938829)

2000.4.5aSR2

MS07-047

936782

Vulnerabilities in Windows Media Player Could Allow Remote Code Execution (936782)

2000.4.5aSR2

MS07-050

938127

Vulnerability in Vector Markup Language Could Allow Remote Code Execution (938127)

2000.4.5aSR2

 

CSCsj56317

933360

MCS-OS Update needed for New Zealand DST changes in 2007

 

2000.4.5aSR2

 

CSCsj74454

HP DL380 G5 server System BIOS needs an update to version P56-2007.04.06

2000.4.5aSR2

 

CSCsg89492

HP DL320 G4 & G5 NIC driver doesn't have the Speed Duplex Option in 2000

2000.4.5aSR2

 

CSCsk30092

win-OS-Upgrade-K9.2000-4-5a-sr2 prompts 'Digital Signature Not Found'

2000.4.5bSR3

 

CSCsk20071

Add Support of 2000.4.5a Service Release train on 2000.4.5b Installs

2000.4.5bSR3

 

CSCsk38770

Updated System BIOS to accommodate G0 step of CPU

2000.4.5bSR3

 

CSCsk45394

Update DAT Tape Drivers

2000.4.5bSR3

MS07-051

938827

Vulnerability in Microsoft Agent Could Allow Remote Code Execution (938827)

2000.4.5bSR4

 

CSCsk80526

ES/SR can abend during StopServices

2000.4.5bSR4

MS07-055

923810

Vulnerability in Kodak Image Viewer Could Allow Remote Code Execution (923810)

2000.4.5bSR4

MS07-056

941202

Security Update for Outlook Express and Windows Mail (941202)

2000.4.5bSR4

MS07-057

939653

Cumulative Security Update for Internet Explorer (939653)

2000.4.5bSR4

MS07-058

933729

Vulnerability in RPC Could Allow Denial of Service (933729)

2000.4.5bSR4

 

CSCsl18866

943000

MCS-OS update needed for 2008 Brazil Summertime change

2000.4.5bSR5

 

CSCsk81433

938977

MCS OS update needed for Venezuela TZ change

2000.4.5bSR5

MS07-062

941672

Vulnerability in DNS Could Allow Spoofing (941672)

2000.4.5bSR5

MS07-028

931906

Vulnerability in CAPICOM Could Allow Remote Code Execution (931906)

2000.4.5bSR6

 

CSCsk35981

872765

MCS Server failed to handle L3 handover DHCP request

2000.4.5bSR6

 

CSCsl06227

936227

Security Update for MSXML 4.0 Version Component

2000.4.5bSR6

MS07-064

941568

Vulnerabilities in DirectX Could Allow Remote Code Execution (941568)

2000.4.5bSR6

MS07-065

937894

Vulnerability in Message Queuing Could Allow Remote Code Execution (937894)

2000.4.5bSR6

MS07-068

941569

Vulnerability in Windows Media File Format Could Allow Remote Code Execution (941569 and 944275)

2000.4.5bSR6

MS07-069

942615

Cumulative Security Update for Internet Explorer (942615)

2000.4.5bSR6

MS08-001

941644

Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (941644)

2000.4.5bSR7

MS08-002

943485

Vulnerability in LSASS Could Allow Local Elevation of Privilege (943485)

2000.4.5bSR7

MS08-008

947890

Vulnerability in OLE Automation Could Allow Remote Code Execution (947890)

2000.4.5bSR8

MS08-010

944533

Cumulative Security Update for Internet Explorer (944533)

2000.4.5bSR8

MS08-003

946538

Vulnerability in Active Directory Could Allow Denial of Service (946538)

2000.4.5bSR8

MS08-005

942831

Vulnerability in Internet Information Services Could Allow Elevation of Privilege (942831)

2000.4.5bSR8

 

CSCsm67223

OS Service Release needs update for BIOS on MCS 7825-I3

2000.4.5bSR8

 

CSCsm81326

DST: MCS-OS IBM Director Agent 2007k TZ Table update needed

2000.4.5bSR9

 

CSCsm88262

DST: MCS-OS IBM Director upd needed for March 2008 Chile Summertime chg

2000.4.5bSR9

 

CSCsl90908

DST: MCS-OS update needed for 2007-2008 Argentina Summertime change

2000.4.5bSR9

 

CSCsl16516

 

DST: MCS-OS update needed for 2008 Australia Summertime change

2000.4.5bSR9

MS08-020

945553

Vulnerability in DNS Client Could Allow Spoofing (945553)

2000.4.5bSR10

MS08-021

948590

Vulnerabilities in GDI Could Allow Remote Code Execution (948590)

2000.4.5bSR10

MS08-022

944338

Vulnerability in VBScript and JScript Scripting Engines Could Allow Remote Code Execution (944338)

2000.4.5bSR10

MS08-023

948881

Security Update of ActiveX Kill Bits (948881)

2000.4.5bSR10

MS08-024

947864

Cumulative Security Update for Internet Explorer (947864)

2000.4.5bSR10

MS08-025

941693

Vulnerability in Windows Kernel Could Allow Elevation of Privilege (941693)

2000.4.5bSR10

 

CSCso26082

Add tzupdate.exe to OS fresh installs and upgrades

2000.4.5bSR10

 

CSCso56152

raiddp.log file keeps growing on the server

2000.4.5bSR10

 

CSCso13134

DST: MCS OS update needed for 2008 Iraq Daylight Time removal

(replaces CSCsl16516/KB942673)

2000.4.5bSR10

MS08-028

950749

Vulnerability in Microsoft Jet Database Engine Could Allow Remote Code Execution (950749)

2000.4.5bSR11

 

CSCso13145

DST: MCS IBM Director update needed for 2008 Iraq Daylight Time removal

2000.4.5bSR11

MS08-031

950759

Cumulative Security Update for Internet Explorer (950759)

2000.4.5bSR12

MS08-033

951698

Vulnerabilities in DirectX Could Allow Remote Code Execution (951698)

2000.4.5bSR12

MS08-034

948745

Vulnerability in WINS Could Allow Elevation of Privilege (948745)

2000.4.5bSR12

MS08-035

953235

Vulnerability in Active Directory Could Allow Denial of Service (953235)

2000.4.5bSR12

MS08-032

950760

Cumulative Security Update of ActiveX Kill Bits (950760)

2000.4.5bSR12

MS08-037

951746, 951748

Vulnerabilities in DNS Could Allow Spoofing (953230)

2000.4.5bSR13

MS08-040

948110

Vulnerabilities in Microsoft SQL Server Could Allow Elevation of Privilege (948110)

2000.4.5bSR13

 

CSCsr69663

SQL 2000 Hotfix KB948110 may halt upgrade on  2000.4.5b

2000.4.6sr1

 

CSCsr61830

SQL 2000 Hotfix KB948110 may fail to install intermittently

2000.4.6sr1

MS08-046

952954

Vulnerability in Microsoft Windows Image Color Management System Could Allow Remote Code Execution (952954)

2000.4.6sr1

MS08-045

953838

Cumulative Security Update for Internet Explorer (953838)

2000.4.6sr1

MS08-048

951066

Security Update for Outlook Express and Windows Mail (951066)

2000.4.6sr1

MS08-049

950974

Vulnerabilities in Event System Could Allow Remote Code Execution (950974)

2000.4.6sr1

 

953839

Cumulative Security Update of ActiveX Kill Bits

2000.4.6sr2

 

CSCsu42231

MCS OS Upgrade from MCS OS 2003.1.2a SR13 to MCS OS 2003.1.3a failed

2000.4.6sr2

 

CSCsu43255

2003.1.3a OS upgrade breaks UCCX SQL server in HA mode

2000.4.6sr2

 

CSCsj36444

Cannot login to CER GUI after enabling OSS on WinOS 2000.4.5 box

2000.4.6sr2

MS07-042

KB933579 (MSXML6)

Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (936227)

2000.4.6sr2

MS08-052

954593

Vulnerabilities in GDI+ Could Allow Remote Code Execution (954593)

2000.4.6sr2

MS08-053

954156

Vulnerability in Windows Media Encoder 9 could allow remote code execution

2000.4.6sr2

MS08-058

956390

Cumulative Security Update for Internet Explorer (956390)

2000.4.6sr3

MS08-061

954211

Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (954211)

2000.4.6sr3

MS08-062

953155

Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution (953155)

2000.4.6sr3

MS08-063

957095

Vulnerability in SMB Could Allow Remote Code Execution (957095)

2000.4.6sr3

MS08-065

951071

Vulnerability in Message Queuing Could Allow Remote Code Execution (951071)

2000.4.6sr3

 

956391

956391 Cumulative Security Update of ActiveX Kill Bits

2000.4.6sr3

MS08-067

958644

Vulnerability in Server Service Could Allow Remote Code Execution (958644)

2000.4.6sr4

MS08-068

957097

Vulnerability in SMB Could Allow Remote Code Execution (957097)

2000.4.6sr4

MS08-069

955218

Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (955218)

2000.4.6sr4

MS08-071

956802

Vulnerabilities in GDI Could Allow Remote Code Execution (956802)

2000.4.6sr5

MS08-073

958215

Cumulative Security Update for Internet Explorer (958215)

2000.4.6sr5

MS08-076

959807

Vulnerabilities in Windows Media Components Could Allow Remote Code Execution (959807)

2000.4.6sr5

MS08-078

960714

Security Update for Internet Explorer (960714)

2000.4.6sr6

MS09-001

958687

Vulnerabilities in SMB Could Allow Remote Code Execution (958687)

2000.4.6sr6

CSCsw90778

TZ: Venezuelan time with Java 1.4.2 reflects GMT instead of GMT-04:30

2000.4.6sr6

MS09-004

959420

960082

960083

Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution (959420)

2000.4.6sr7


960715

Update Rollup for ActiveX Kill Bits

2000.4.6sr7


CSCsx44463

MS kB957097 causes CAD or CSD to display inactive or disply blank report

2000.4.6sr7


CSCsx24324

Add check for CSCsv52867 applicable systems to OS SR

2000.4.6sr7

MS09-006

958690

Vulnerabilities in Windows Kernel Could Allow Remote Code Execution (958690)

2000.4.6sr8

MS09-007

960225

Vulnerability in SChannel Could Allow Spoofing (960225)

2000.4.6sr8

MS09-008

962238

Vulnerabilities in DNS and WINS Server Could Allow Spoofing (962238)

2000.4.6sr8


CSCsy40419

Previous installation errors reported in current installation

2000.4.6sr8

MS09-011

960477

923561

Vulnerabilities in WordPad and Office Text Converters Could Allow Remote Code Execution (960477)

2000.4.6sr9

MS09-013

960803

Vulnerabilities in Windows HTTP Services Could Allow Remote Code Execution (960803)

2000.4.6sr9

MS09-014

963027

Cumulative Security Update for Internet Explorer (963027)

2000.4.6sr9

MS09-010

960477

Vulnerabilities in WordPad and Office Text Converters Could Allow Remote Code Execution (960477)

2000.4.6sr9

MS09-012

959454

952004

Vulnerabilities in Windows Could Allow Elevation of Privilege (959454)

2000.4.6sr9

MS09-015

959426

Blended Threat Vulnerability in SearchPath Could Allow Elevation of Privilege (959426)

2000.4.6sr9

Installing the Service Release

Perform the following procedure to install the service release:

1.      Disable all virus scanning software or Intrusion Detect Software prior to running this installation.

2.      Download the file to a location that you will remember.

3.      Double click the executable.

4.      To acknowledge that the server runs OS upgrade version 2000.4.6 and that you are not installing the service release through Terminal Services, click Yes.  If the server does not run OS upgrade version 2000.4.6, install it before you run this service release.

5.      Files automatically extract and install on the server.

6.      After the installation finishes, it will report the number of errors detected and ask if you want to view the logfile.

7.      If there are no errors detected, you can select “No”; otherwise click yes to view the log.  There is an ERRORS section at the very end of the logfile to assist in finding the errors.

8.      Click OK to confirm the reboot

9.      Perform this procedure on all supported servers in the cluster.

10.  If you choose to do so, you can use the Baseline Security Analyzer to verify the hotfixes that are installed on each server.  See the “Verifying HotFixes By Using Baseline Security Analyzersection.

 

Verifying HotFixes By Using Microsoft Baseline Security Analyzer

If you want to do so, you can use the Microsoft Baseline Security Analyzer utility (run c:\utils\mbsa_scan.cmd) to verify which hotfixes are installed on the server.

Microsoft Baseline Security Analyzer (MBSA)

Make sure that you review the Reason column of the MBSA report to identify whether the hotfix should be installed.  The following table shows expected results from MBSA on a fully patched system.   


Scanned with MBSA version: 2.1.2104.0

Catalog synchronization date: 2009-04-13T22:28:16Z

Security update catalog: Microsoft Update (offline)


Security Updates Scan Results

Issue: SDK Components Security Updates

Score: Check passed

Result: No security updates are missing.


Current Update Compliance

| MS07-028 | Installed | Security Update for CAPICOM (KB931906) | Critical |


Issue: SQL Server Security Updates

Score: Check passed

Result: No security updates are missing.


Current Update Compliance

| MS09-004 | Installed | Security Update for SQL Server 2000 Service Pack 4 (KB960082) | Important |


Issue: Windows Security Updates

Score: Check failed (non-critical)

Result: 1 service packs or update rollups are missing.


Update Rollups and Service Packs

| 890830 | Missing | Windows Malicious Software Removal Tool - April 2009 (KB890830) | |


Current Update Compliance

| MS03-008 | Installed | 814078: Security Update (Microsoft Jscript version 5.5, Windows 2000) | |

| MS02-050 | Installed | Q329115: Security Update (Windows 2000) | |

| MS03-011 | Installed | 816093: Security Update Microsoft Virtual Machine (Microsoft VM) | Critical |

| MS04-016 | Installed | Security Update for DirectX 9.0 (KB839643) | Moderate |

| MS04-016 | Installed | Security Update for DirectX 8.0 (KB839643) | Moderate |

| MS04-016 | Installed | Security Update for DirectX 8.1 (KB839643) | Moderate |

| MS04-013 | Installed | Cumulative Security Update for Outlook Express 5.5 Service Pack 2 (KB837009) | Critical |

| MS04-008 | Installed | Security Update for Windows Media Services (KB832359) | Moderate |

| MS05-036 | Installed | Security Update for Windows 2000 (KB901214) | Critical |

| MS05-040 | Installed | Security Update for Windows 2000 (KB893756) | Important |

| MS05-041 | Installed | Security Update for Windows 2000 (KB899591) | Moderate |

| MS05-042 | Installed | Security Update for Windows 2000 (KB899587) | Moderate |

| MS05-043 | Installed | Security Update for Windows 2000 (KB896423) | Critical |

| MS04-016 | Installed | Security Update for DirectX 8.2 (KB839643) | Moderate |

| MS05-045 | Installed | Security Update for Windows 2000 (KB905414) | Moderate |

| MS05-046 | Installed | Security Update for Windows 2000 (KB899589) | Important |

| MS05-048 | Installed | Security Update for Windows 2000 (KB901017) | Important |

| MS05-050 | Installed | Security Update for DirectX 8 for Windows 2000 (KB904706) | Critical |

| MS05-027 | Installed | Security Update for Windows 2000 (KB896422) | Important |

| MS05-026 | Installed | Security Update for Windows 2000 (KB896358) | Important |

| MS05-049 | Installed | Security Update for Windows 2000 (KB900725) | Important |

| MS05-047 | Installed | Security Update for Windows 2000 (KB905749) | Important |

| MS05-044 | Installed | Security Update for Internet Explorer 6 Service Pack 1 for Windows 2000 (KB905495) | Moderate |

| MS05-050 | Installed | Security Update for Windows 2000 (KB904706) | Critical |

| MS06-002 | Installed | Security Update for Windows 2000 (KB908519) | Critical |

| MS06-006 | Installed | Security Update for Windows Media Player Plug-in (KB911564) | Important |

| MS06-005 | Installed | Security Update for Windows Media Player 7.1 for Windows 2000 (KB911565) | Important |

| MS06-015 | Installed | Security Update for Windows 2000 (KB908531) | Critical |

| MS06-022 | Installed | Security Update for Internet Explorer 6 Service Pack 1 (KB918439) | Critical |

| MS06-018 | Installed | Security Update for Windows 2000 (KB913580) | Moderate |

| MS06-025 | Installed | Security Update for Windows 2000 (KB911280) | Critical |

| MS06-036 | Installed | Security Update for Windows 2000 (KB914388) | Critical |

| MS06-044 | Installed | Security Update for Windows 2000 (KB917008) | Critical |

| MS06-050 | Installed | Security Update for Windows 2000 (KB920670) | Important |

| MS06-041 | Installed | Security Update for Windows 2000 (KB920683) | Critical |

| MS06-045 | Installed | Security Update for Windows 2000 (KB921398) | Moderate |

| MS06-034 | Installed | Security Update for Windows 2000 (KB917537) | Important |

| MS06-053 | Installed | Security Update for Windows 2000 (KB920685) | Moderate |

| MS06-057 | Installed | Security Update for Windows 2000 (KB923191) | Critical |

| MS06-066 | Installed | Security Update for Windows 2000 (KB923980) | Important |

| MS06-070 | Installed | Security Update for Windows 2000 (KB924270) | Critical |

| MS06-074 | Installed | Security Update for Windows 2000 (KB926247) | Important |

| MS07-008 | Installed | Security Update for Windows 2000 (KB928843) | Critical |

| MS07-012 | Installed | Security Update for Windows 2000 (KB924667) | Important |

| MS07-013 | Installed | Security Update for Windows 2000 (KB918118) | Important |

| MS07-011 | Installed | Security Update for Windows 2000 (KB926436) | Important |

| MS07-017 | Installed | Security Update for Windows 2000 (KB925902) | Critical |

| MS07-021 | Installed | Security Update for Windows 2000 (KB930178) | Critical |

| MS06-068 | Installed | Security Update for Windows 2000 (KB920213) | Critical |

| MS07-009 | Installed | Security Update for Microsoft Data Access Components 2.8 Service Pack 1 (KB927779) | Critical |

| MS07-035 | Installed | Security Update for Windows 2000 (KB935839) | Critical |

| MS07-022 | Installed | Security Update for Windows 2000 (KB931784) | Important |

| MS06-078 | Installed | Security Update for Windows Media Player 6.4 (KB925398) | Critical |

| MS07-039 | Installed | Security Update for Windows 2000 (KB926122) | Critical |

| MS07-047 | Installed | Security Update for Windows Media Player 9 (KB936782) | Important |

| MS07-051 | Installed | Security Update for Windows 2000 (KB938827) | Critical |

| 891861 | Installed | Update Rollup 1 for Windows 2000 Service Pack 4 (KB891861) | |

| MS07-058 | Installed | Security Update for Windows 2000 (KB933729) | Low |

| MS07-055 | Installed | Security Update for Windows 2000 (KB923810) | Critical |

| MS07-068 | Installed | Security Update for Windows 2000 (KB941569) | Critical |

| MS07-065 | Installed | Security Update for Windows 2000 (KB937894) | Important |

| MS08-002 | Installed | Security Update for Windows 2000 (KB943485) | Important |

| MS08-005 | Installed | Security Update for Windows 2000 (KB942831) | Important |

| MS08-008 | Installed | Security Update for Windows 2000 (KB943055) | Critical |

| MS08-020 | Installed | Security Update for Windows 2000 (KB945553) | Important |

| MS08-022 | Installed | Security Update for Windows 2000 (KB944338) | Critical |

| MS08-028 | Installed | Security Update for Windows 2000 (KB950749) | Critical |

| MS08-032 | Installed | Cumulative Security Update for ActiveX Killbits for Windows 2000 (KB950760) | Moderate |

| MS08-037 | Installed | Security Update for Windows 2000 (KB951748) | Important |

| MS08-048 | Installed | Security Update for Outlook Express 6 Service Pack 1 (KB951066) | Important |

| MS08-049 | Installed | Security Update for Windows 2000 (KB950974) | Important |

| MS08-046 | Installed | Security Update for Windows 2000 (KB952954) | Critical |

| MS08-052 | Installed | Security Update for Internet Explorer 6 for Windows 2000 (KB938464) | Critical |

| MS08-062 | Installed | Security Update for Windows 2000 (KB953155) | Important |

| MS08-067 | Installed | Security Update for Windows 2000 (KB958644) | Critical |

| MS08-069 | Installed | Security Update for Windows 2000 (KB955069) | Critical |

| MS08-069 | Installed | Security Update for Microsoft XML Core Services 4.0 Service Pack 2 (KB954430) | Important |

| MS08-068 | Installed | Security Update for Windows 2000 (KB957097) | Important |

| MS08-076 | Installed | Security Update for Windows 2000 (KB954600) | Important |

| MS08-071 | Installed | Security Update for Windows 2000 (KB956802) | Critical |

| MS08-076 | Installed | Security Update for Windows 2000 (KB952069) | Important |

| MS09-001 | Installed | Security Update for Windows 2000 (KB958687) | Critical |

| 960715 | Installed | Update Rollup for ActiveX Killbits for Windows 2000 (KB960715) | |

| MS09-008 | Installed | Security Update for Windows 2000 (KB961063) | Important |

| MS09-007 | Installed | Security Update for Windows 2000 (KB960225) | Important |

| MS09-006 | Installed | Security Update for Windows 2000 (KB958690) | Critical |

| MS09-010 | Installed | Security Update for Windows 2000 (KB923561) | Important |

| MS09-011 | Installed | Security Update for DirectX 9 for Windows 2000 (KB961373) | Critical |

| MS09-012 | Installed | Security Update for Windows 2000 (KB952004) | Important |

| MS09-013 | Installed | Security Update for Windows 2000 (KB960803) | Critical |

| MS09-015 | Installed | Security Update for Windows 2000 (KB959426) | Low |

| MS09-014 | Installed | Cumulative Security Update for Internet Explorer 6 Service Pack 1 (KB963027) | Critical |


Known Caveats



Uninstalling Hotfixes

 If you need to uninstall this OS Service Release or one of its hotfixes, follow the uninstall procedures exactly as they appear in this section.  Most hotfixes have an uninstall program provided by Microsoft, but there are caveats associated with uninstalling the hotfixes, This section provides procedures to uninstall a single hotfix and to uninstall the entire OS Service Release.

 

Perform the following procedure to uninstall a single hotfix:

1.      Verify whether the hotfix can be uninstalled by checking the Uninstall Supported column of the Hotfixes That Are Included in the Service Release table.  If No displays in that column, you cannot use this procedure to uninstall the hotfix.  The only way to return the server to a state without the hotfix, is to fail back to a saved copy of the mirrored drive or rebuild the server, install the IP Telephony application, and restore the database.  If Yes displays in the Uninstall Supported column, continue with Step 2.

2.      Choose Start > Settings > Control Panel > Add/Remove Programs.  Hotfixes appear near the bottom of the Add/Remove Programs window.  Each hotfix begins with Windows 2000 Hotfix and is followed by the Microsoft Knowledge Base (KB or Q) article number.  You can use the Hotfixes That Are Included in the Service Release table to convert the security bulletin number (MS05-053) to a KB or Q number (KB896424).

3.      Select the hotfix you want to uninstall and click Change/Remove.  The Windows 2000 <hotfix number> Removal Wizard displays. 

4.      Click Next.  The steps may differ, depending on the uninstall program provided with the hotfix.  If a window appears with a message asking whether you want to uninstall the hotfix, click Yes.

5.      It’s very likely that the Inspecting Current Configuration step of the Removal Wizard will detect a list of hotfixes or programs that may be affected by removing this hotfix.  Record this list.  All the hotfixes listed will need to be re-installed and any applications listed should be checked to confirm they are still working properly.  Removing this hotfix will replace the system files it backed up with it was originally installed.  Other hotfixes or applications may be dependant on these same files.  The Removal Wizard does not know whether or not the applications or hotfixes will be affected.  It just has detected that they have been installed after the hotfix being removed was installed.  After recording the list, click Yes.

6.      Click Finish.  The server will reboots, if needed.  If you are prompted to reboot, click Yes.

7.      If the Inspecting Current Configuration step of the Removal Wizard listed any other hotfixes, reinstall those hotfixes now.  The last OS Service Release with the individual hotfix installations can be found in c:\Program Files\Cisco\Updates\2000.4.6SR#, where “#” equals the Service Release number (for example, 2000.4.6SR1).  The files will be named by their KB or Q number and should match what you have written down.  Double-click the first hotfix that is on your list of hotfixes that need to be reinstalled, and follow the prompts to install the hotfix.  Repeat this step for each hotfix you need to reinstall.  You do not need to reboot between hotfixes.  Once you have reinstalled all the hotfixes on your list, reboot the server.

8.      If the Inspecting Current Configuration step of the Removal Wizard listed any applications, confirm that they are still working properly.

 

Perform the following procedure to uninstall this entire OS Service Release:

1.      In order to determine what hotfixes need to be uninstalled, you need to determine what the OS level was before you applied this Service Release.  The minimum OS level for this Service Release is OS Upgrade 2000.4.5a, so that is the starting point.  To determine what Service Releases where applied after OS Upgrade 2000.4.5a, use the History.log file.  Click Start > Cisco Install Logs  (C:\Program Files\Common Files\Cisco\Logs)

2.      Double-click History.log (or just History if known file extensions are hidden)

3.      Find OS Upgrade 2000.4.6 and search down the list for the last 2000.4.6SR# before the one you are trying to uninstall.  Record this Service Release number.

4.      Use the Hotfixes That Are Included in the Service Release table to find all the hotfixes installed after the Service Release recorded in the previous step.

5.      Choose Start > Settings > Control Panel > Add/Remove Programs.  Hotfixes appear near the bottom of the Add/Remove Programs window.  Each hotfix begins with Windows 2000 Hotfix and is followed by the Microsoft Knowledge Base (KB or Q) article number.  You can use the Hotfixes That Are Included in the Service ReleaseHotfixes That Are Included in the Service Release table to convert the security bulletin number (e.g. MS05-053) to a KB or Q number (e.g. KB896424).

6.      Select the hotfix you want to uninstall and click Change/Remove.  The Windows 2000 <hotfix number> Removal Wizard displays. 

7.      Click Next.  The steps may differ, depending on the uninstall program provided with the hotfix.  If a window appears with a message asking whether you want to uninstall the hotfix, click Yes.

8.      It’s very likely that the Inspecting Current Configuration step of the Removal Wizard will detect a list of hotfixes or programs that may be affected by removing this hotfix.  Record this list.  All the hotfixes listed will need to be re-installed and any applications listed should be checked to confirm they are still working properly.  Removing this hotfix will replace the system files it backed up with it was originally installed.  Other hotfixes or applications may be dependant on these same files.  The Removal Wizard does not know whether or not the applications or hotfixes will be affected.  It just has detected that they have been installed after the hotfix being removed was installed.  After recording the list, click Yes.

9.      Click Finish.  The server will reboots, if needed.  If you are prompted to reboot, click Yes.

10.  Follow steps 6 - 9 until all the hotfix you want to uninstall have been removed.

11.  If the Inspecting Current Configuration step of the Removal Wizard listed any other hotfixes, reinstall those hotfixes now.  The last OS Service Release with the individual hotfix installations can be found in c:\Program Files\Cisco\Updates\2000.4.6SR#, where “#” equals the Service Release number (for example, 2000.4.5aSR1).  The files will be named by their KB or Q number and should match what you have written down.  Double-click the first hotfix that is on your list of hotfixes that need to be reinstalled, and follow the prompts to install the hotfix.  Repeat this step for each hotfix you need to reinstall.  You do not need to reboot between hotfixes.  Once you have reinstalled all the hotfixes on your list, reboot the server.

12.  If the Removal Wizard listed any applications in the Inspecting Current Configuration step, confirm that they are still working properly.