Operating System Upgrade Service Release 2000.4.6SR9 (win-OS-Upgrade-K9.2000-4-6-SR9.exe)
Release date: 21-April-2009
Document Revision 1
Microsoft provides monthly releases of security hotfixes on the 2nd Tuesday of each month. Cisco’s monthly OS Service Release is scheduled to post on the 3rd Tuesday of each month.
Cisco will continue to test and release Microsoft hotfixes that meet our criteria for Critical hotfixes in 1 business day. Any applicable critical hotfix released by Microsoft will be added to the Cisco IP Telephony Operating System, SQL Server, Security Updates document with and explanation about whether or not it is critical for Cisco IP Telephony servers and when it will be released by Cisco.
Caution: Do not apply this service release with OS version 2000.4.4a or previous OS release trains. This service release is only compatible with the OS 2000.4.6 release train. You should apply this service release to all servers in your cluster. This installation causes call-processing interruptions and requires a reboot. Close all programs before proceeding including Internet Explorer to avoid conflicts with the software being installed and/or upgraded.
General
Note: If the
following messages are displayed during the installation, please
click “OK” and continue. These will not affect this
upgrade. The causes for these messages are under
investigation:
* The Instruction at "0X0cda00dd8"
referenced memory at "0X0cda00dd8". The memory could not be
read. Click OK to terminate the program (CSCeb31088)
* The Instruction at "0X000000000" referenced memory at
"0X000000000". The memory could not be read. Click OK to
terminate the program (CSCed45218)
* AddAnonymousWebUserAccess
failure during CallManager
installations (CSCed27066)
Naming Convention Change
For operating system, SQL Server, and Cisco IP telephony application software updates, Cisco has replaced the term, support patch, with the term, service release. Service releases provide the same functionality as support patches; that is, they provide bug fixes, etc.
Review the file naming convention before you apply the software update.
<software_name>-<software version>_<sr(x)>
<software name> equals the name of the application; <software version> equals the maintenance release; <sr(x)> equals the version of the service release
For example, review the following file name:
win-OS-Upgrade-K9.2000-4-2sr2.exe
win-OS-Upgrade indicates that this file is an operating system upgrade file; K9 indicates that you download the file from the Cisco cryptographic website; 2000-4-2 indicates the operating system maintenance release version, and sr2 indicates that this file is the first version of the operating system upgrade service release.
Contents
This document contains information on the following topics. Click the hyperlink to go directly to the section.
This section provides information about how to receive email notifications when new updates post to Cisco Connection Online.
· Information about This Service Release
This section provides general information and specifies the affected Cisco IP telephony applications, supported servers, and hotfixes that are automatically installed with this software update.
· Installing the Service Release
This section provides procedures for installing this service release on supported servers.
· Verifying Hotfixes By Using Microsoft Baseline Security Analyzer
This section provides a list of hotfixes that Microsoft Baseline Security Analyzer and QFEcheck verify. See this section if you want to verify which hotfixes exist on your server.
This section provides information about how to uninstall the Microsoft hotfixes.
Cisco CallManager Notification Tool: Cisco has replaced the current Cisco CallManager notification tool with a new, more robust notification tool that is based on your Cisco.com profiles. This new tool delivers email notifications for individual Cisco voice products that you select. Follow the steps below to sign up for the Cisco Voice Technology Group Subscription Tool:
· Login with your Cisco.com account information at this link: http://www.cisco.com/cgi-bin/Software/Newsbuilder/Builder/VOICE.cgi
· Select "CallManager Cryptographic Software including OS updates" to receive notification when new operating system updates are posted.
· Select any other products updates that you wish to receive.
· Click update at the bottom of the page.
· Confirm your selections.
You may see this message at the bottom of the page: "Your Profile Currently Indicates that you do not wish to receive email from Cisco.”
To be able to receive information updates, you must update your email preferences. Click on the link to update your email preferences (located in the Other Information section). Click submit when you are done.
If you have enabled email notification, you may exit now. If you have not enabled email notification, then you will need to repeat the steps above.
This new software notification tool requires a valid Cisco.com login. If you do not currently have a Cisco.com password, please register with Cisco.com at: http://tools.cisco.com/RPF/register/register.do
Cisco PSIRT Advisory Notification Tool: This email service provides automatic notification of all Cisco Security Advisories that are released by the Cisco Product Security Incident Response Team (PSIRT). Security Advisories, which describe security issues that directly impact Cisco products, provide a set of required actions to repair these products. To subscribe, click the following URL and perform the tasks as directed on the web page: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html#SecurityInfo
Information about This Service Release
Review the following information before you install the service release:
· Cumulative Severity: Critical
· Description: OS Upgrade 2000.4.6 Service Release 9
· Minimum OS requirements: Any OS version upgraded with win-OS-Upgrade-K9.2000-4-6.exe or Fresh install of OS 2000.4.6
· Affected Cisco IP Telephony Applications: All versions of Cisco CallManager and all compatible versions of Cisco IP Interactive Voice Response (IP IVR), Cisco IP Call Center Express (IPCC Express), Cisco Personal Assistant (PA), Cisco Emergency Responder (CER), Cisco Conference Connection (CCC), Cisco Customer Voice Portal (CVP), Cisco IP Queue Manager and Cisco MeetingPlace.
· Supported Servers: All of the Cisco Media Convergence Servers (MCS) and Cisco-approved, customer-provided Compaq/HP and IBM server supported by 2000.4.6 fresh install and upgrades. For further information see the Hardware Compatibility Matrixes at the following location:
http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_device_support_tables_list.html
· Install time: < 15 Minutes per server
· Reboot required: Yes
· Replaces previously posted files: Previous 2000.4.6 Service Releases
· Log File Location: C:\Program Files\Common Files\Cisco\Logs\OS
· Known Caveats: Please refer to the ‘Known Caveats’ section below.
Note: Apply this service release to all servers in your cluster.
Caution: This installation causes call-processing interruptions and requires a reboot. Close all programs before proceeding including Internet Explorer.
This service release includes the following hotfixes:
Bulletin |
Knowledge Base Article or Cisco Defect |
Description |
1st Released in Support Patch/Service Release: |
MS04-003 |
Q832483 |
Buffer Overrun in MDAC Function Could Allow Code Execution |
2000-2-5sr6 |
MS05-009 |
KB885492 KB890261 KB887472 |
Vulnerability in PNG Processing Could Allow Remote Code Execution |
2000.2.7sr2 |
MS05-026 |
KB896358 |
Vulnerability in HTML Help Could allow Remote Code Execution |
2000.2.7sr5 |
MS05-027 |
KB896422 |
Vulnerability in Server Message Block Could Allow Remote Code Execution |
2000.2.7sr5 |
MS05-030 |
KB897715 |
Cumulative Security Update in Outlook Express |
2000.2.7sr5 |
MS05-032 |
KB890046 |
Vulnerability in Microsoft Agent Could Allow Spoofing |
2000.2.7sr5 |
MS05-036 |
KB901214 |
Vulnerability in Microsoft Color Management Module Could Allow Remote Code Execution |
2000.2.7sr6 |
MS05-040 |
KB893756 |
Vulnerability in Telephony Service Could Allow Remote Code Execution |
2000.2.7sr7 |
MS05-041 |
KB899591 |
Vulnerability in Remote Desktop Protocol Could Allow Denial of Service |
2000.2.7sr7 |
MS05-042 |
KB899587 |
Vulnerabilities in Kerberos Could Allow Denial of Service, Information Disclosure, and Spoofing |
2000.2.7sr7 |
MS05-043 |
KB896423 |
Vulnerability in Print Spooler Service Could Allow Remote Code Execution |
2000.2.7sr7 |
MS05-044 |
KB905495 |
Vulnerability in Windows FTP Client Could Allow File Transfer Location Tampering |
2000.2.7sr8 |
MS05-045 |
KB905414 |
Vulnerability in Network Connection Management Could Allow Denial of Service |
2000.2.7sr8 |
MS05-046 |
KB899589 |
Vulnerability in Client Services for Netware Could Allow Remote Code Execution |
2000.2.7sr8 |
MS05-047 |
KB905749 |
Vulnerability in Plug and Play Could Allow Remote Code Execution and Local Elevation of Privilege |
2000.2.7sr8 |
MS05-048 |
KB901017 |
Vulnerability in Microsoft Collaboration Objects Could Allow Remote Control Execution |
2000.2.7sr8 |
MS05-049 |
KB900725 |
Vulnerability in Windows Shell Could Allow Remote Control Execution |
2000.2.7sr8 |
MS05-050 |
KB904706 |
Vulnerability in DirectShow Could Allow Remote Code Execution |
2000.2.7sr8 |
MS05-053 |
KB896424 |
Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution |
2000.4.2sr1 |
MS05-054 |
KB905915 |
Cumulative Security Update for Internet Explorer |
2000.4.2sr2 |
MS05-055 |
KB908523 |
Vulnerability in Windows Kernel Could Allow Elevation of Privilege |
2000.4.2sr2 |
N/A |
KB831577 |
IIS Memory Leak when HTTP Compression Used |
2000.4.2sr2 |
N/A |
KB834010 |
DeadLock Occurs when Program Uses Certain WMI Calls |
2000.4.2sr2 |
MS06-001 |
KB912919 |
Vulnerabilities in Graphics Rendering Engine Could Allow Code Execution |
2000.4.2sr3 |
MS06-002 |
KB908519 |
Vulnerability in Embedded Web Fonts Could Allow Remote Code Execution |
2000.4.2sr3 |
N/A |
CSCsd14924 KB823818 |
MPWeb IIS stop responding due to ASP buffering leading to out of memory |
2000.4.2sr4 |
MS06-005 |
KB911565 |
Vulnerability in Windows Media Player Could Allow Remote Code Execution |
2000.4.2sr4 |
MS06-006 |
KB911564 |
Vulnerability in Windows Media Player Plug-in with Non-Microsoft Internet Browsers Could Allow Remote Code Execution |
2000.4.2sr4 |
N/A |
CSCsd18255 |
SQL remains in Starting State or CCM fails to start after OS2000.4.2 upg |
2000.4.2sr5a |
|
CSCsd45211 |
Need to uninstall CScsd11211 after end of CommonWealth Games |
2000.4.2sr6 |
MS06-013 |
KB912812 |
Cumulative Security Update for Internet Explorer (912812) (Replaces MS05-054) |
2000.4.2sr6 |
MS06-014 |
KB911562 |
Vulnerability in the Microsoft Data Access Components (MDAC) Function Could Allow Code Execution (911562) |
2000.4.2sr6 |
MS06-015 |
KB908531 |
Vulnerability in Windows Explorer Could Allow Remote Code Execution (908531) |
2000.4.2sr6 |
MS06-016 |
KB911567 |
Cumulative Security Update for Outlook Express (911567) (Replaces MS05-030) |
2000.4.2sr6 |
|
CSCsd96901 |
KB911562 not identified after installation |
2000.4.2sr6 |
MS06-018 |
KB913580 |
Vulnerability in Microsoft Distributed Transaction Coordinator Could Allow Denial of Service (replaces MS05-051 KB902400) |
2000.4.2sr7 |
|
KB822720 |
The computer stops responding (hangs) on boot in Windows 2000 Server, or you receive a "Stop 0x00000080" error message when you add or remove a hot swap drive |
2000.4.2sr7 |
|
CSCse04719 |
With 2 g RAM or more installed Memory.dmp file will be incomplete |
2000.4.2sr7 |
|
CSCsd53918 |
MCS server rebooted with bugcheck |
2000.4.2sr7 |
|
CSCsd95726 |
CD ROM icon missing after SR upgrade |
2000.4.2sr7 |
|
CSCse47327 |
high cpu utilization by ccm.exe after upgrade to 2000.4.2sr7 Reverses out CSCsc55016 added in 2000.4.2sr7. |
2000.4.2sr7a |
MS06-021 |
KB916281 |
Cumulative Security Update for Internet Explorer (replaces MS06-013 KB912812) |
2000.4.2sr8 |
MS06-023 |
KB917344 |
Vulnerability in Microsoft JScript Could Allow Remote Code Execution |
2000.4.2sr8 |
MS06-024 |
KB917344 |
Vulnerability in Windows Media Player Could Allow Remote Code Execution |
2000.4.2sr8 |
MS06-025 |
KB911280 |
Vulnerability in Routing and Remote Access Could Allow Remote Code Execution |
2000.4.2sr8 |
|
CSCse32811 |
RealVNC allows remote access to Win2k server console without password |
2000.4.2sr8 |
MS06-030 |
KB914389 |
Vulnerability in Server Message Block Could Allow Elevation of Privilege |
2000.4.2sr8 |
MS06-031 |
KB917736 |
Vulnerability in RPC Mutual Authentication Could Allow Spoofing |
2000.4.2sr8 |
MS06-032 |
KB917953 |
Vulnerability in TCP/IP Could Allow Remote Code Execution |
2000.4.2sr8 |
|
CSCse54942 |
Undefined device on 7815I2 with OS 2000.4.3
|
2000.4.3aSR1 |
MS06-025 |
KB911280 v2 |
Vulnerability in Routing and Remote Access Could Allow Remote Code Execution |
2000.4.3aSR2 |
|
CSCse61586 |
OS 2000.4.2 and 2000.4.3 missing drivers for USB DAT72 drive |
2000.4.3aSR2 |
MS06-034 |
KB917537 |
Vulnerability in Microsoft Internet Information Services using Active Server Pages Could Allow Remote Code Execution (917537) |
2000.4.3aSR2 |
MS06-035 |
KB917344 |
Vulnerability in Server Service Could Allow Remote Code Execution (917159) |
2000.4.3aSR2 |
MS06-036 |
KB917344 |
Vulnerability in DHCP Client Service Could Allow Remote Code Execution (914388) |
2000.4.3aSR2 |
|
CSCse79354 |
Remove fix for CSCsd62235 in 2000.4.3aSR2 |
2000.4.3aSR2 |
MS06-040 |
KB921883 |
Vulnerability in Server Service Could Allow Remote Code Execution (921883) |
2000.4.3aSR3 |
MS06-041 |
KB920683 |
Vulnerability in DNS Resolution Could Allow Remote Code Execution (920683) |
2000.4.3aSR3 |
MS06-042 |
KB918899 |
Cumulative Security Update for Internet Explorer (918899) |
2000.4.3aSR3 |
MS06-044 |
KB917008 |
Vulnerability in Microsoft Management Console Could Allow Remote Code Execution (917008) |
2000.4.3aSR3 |
MS06-046 |
KB922616 |
Vulnerability in HTML Help Could Allow Remote Code Execution (922616) |
2000.4.3aSR3 |
MS06-051 |
KB917422 |
Vulnerability in Windows Kernel Could Result in Remote Code Execution (917422) |
2000.4.3aSR3 |
MS06-045 |
KB921398 |
Vulnerability in Windows Explorer Could Allow Remote Code Execution (921398) |
2000.4.3aSR3 |
MS06-049 |
KB920958 |
Vulnerability in Windows Kernel Could Result in Elevation of Privilege (920958) |
2000.4.3aSR3 |
MS06-050 |
KB920670 |
Vulnerabilities in Microsoft Windows Hyperlink Object Library Could Allow Remote Code Execution (920670) |
2000.4.3aSR3 |
|
CSCse08287 |
MCS OS SR needs to check for and report back errors |
2000.4.3aSR3 |
|
CSCse45722 |
ES/SR Internal reboot function doesn't work when executed remotely |
2000.4.3aSR3 |
|
CSCse76137 |
Upgrade version registry key is missing on Fresh Installs |
2000.4.3aSR3 |
|
CSCsf26883 |
ES/SR Need additional debug for commands run during installation |
2000.4.3aSR4 |
|
CSCsf10966 |
OS 2000.4.3aSR Upgrades Show 110% On Stopping Services |
2000.4.3aSR4 |
|
CSCsf25340 |
ES/SR Stopservices logging to stopservices.txt instead of ES/SR logfile |
2000.4.3aSR4 |
|
CSCsg01904 |
MS Hotfixes install even when already present |
2000.4.3aSR4 |
|
CSCsg01902 |
ES/SR: Run QFE report for diagnostic purposes |
2000.4.3aSR4 |
|
CSCsg01899 |
ES/SR need Processes report at end of installation |
2000.4.3aSR4 |
|
CSCsg01895 |
ES/SR Support for Good, but Non-zero return values from commands run |
2000.4.3aSR4 |
|
CSCsg22151 |
Winmgmt logging causing higher CPU |
2000.4.3aSR4 |
MS06-042 |
KB918899v3 |
Cumulative Security Update for Internet Explorer (918899) |
2000.4.3aSR4 |
MS06-053 |
KB920685 |
Vulnerability in Indexing Service Could Allow Cross-Site Scripting (920685) |
2000.4.3aSR4 |
|
CSCsg07841 |
OS 2000.4.2sr11 installation package doesn't execute |
2000.4.3aSR4 |
MS06-049 |
KB920958v2 |
Vulnerability in Windows Kernel Could Result in Elevation of Privilege (920958) |
2000.4.3aSR5 |
MS06-055 |
KB925486 |
Vulnerability in Vector Markup Language Could Allow Remote Code Execution (925486) |
2000.4.3aSR5 |
|
CSCsf98903 |
Fresh install servers in 2000.4.3a have erroneous EventLog size 10240KB
|
2000.4.3aSR5 |
|
CSCsf98891 |
Fresh install servers in 2000.4.3a do not have NetBIOS over TCP/IP check
|
2000.4.3aSR5 |
MS06-057 |
KB923191 |
Vulnerability in Windows Explorer Could Allow Remote Execution (923191) |
2000.4.3aSR5 |
MS06-061 |
924191 |
Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (924191) |
2000.4.3aSR5 |
MS06-063 |
923414 |
Vulnerability in Server Service Could Allow Denial of Service (923414) |
2000.4.3aSR5 |
MS06-061 |
924191v2 |
Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (924191) |
2000.4.4sr1 |
MS06-067 |
922760 |
Cumulative Security Update for Internet Explorer (922760) |
2000.4.4sr1 |
MS06-068 |
920213 |
Vulnerability in Microsoft Agent Could Allow Remote Code Execution (920213) |
2000.4.4sr1 |
MS06-070 |
924270 |
Vulnerability in Workstation Service Could Allow Remote Code Execution (924270) |
2000.4.4sr1 |
|
CSCsg81424 |
Fail to uninstall VNC 3.3.7 |
2000.4.4sr2 |
|
CSCsf07541 |
MCS-OS Update needed for N America DST changes in 2007 |
2000.4.4sr2 |
|
CSCsd57985 |
DayLight savings working wrongly for 26-03-2006 without DayLight Patch. |
2000.4.4sr2 |
|
CSCse15694 |
Daylight savings incorrect for GMT+2 Cairo Time Zone |
2000.4.4sr2 |
MS06-072 |
925454 |
Cumulative Security Update for Internet Explorer (925454) |
2000.4.4sr2 |
MS06-076 |
923694 |
Cumulative Security Update for Outlook Express (923694) |
2000.4.4sr2 |
MS06-074 |
926247 |
Vulnerability in SNMP Could Allow Remote Code Execution (926247) |
2000.4.4sr2 |
MS06-078 |
923689 |
Vulnerability in Windows Media Format Could Allow Remote Code Execution (923689) |
2000.4.4sr2 |
MS07-004 |
929969 |
Vulnerability in Vector Markup Language Could Allow Remote Code Execution (929969) |
2000.4.4sr3 |
|
CSCsh58552 |
SR needs to support 2000.4.4a OS version string |
2000.4.4aSR3a |
MS07-008 |
928843 |
Vulnerability in HTML Help ActiveX Control Could Allow Remote Code Execution (928843) |
2000.4.4aSR4 |
MS07-009 |
927779 |
Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution (927779) |
2000.4.4aSR4 |
MS07-016 |
928090 |
Cumulative Security Update for Internet Explorer (928090) |
2000.4.4aSR4 |
MS07-006 |
928255 |
Vulnerability in Windows Shell Could Allow Elevation of Privilege (928255) |
2000.4.4aSR4 |
MS07-011 |
926436 |
Vulnerability in Microsoft OLE Dialog Could Allow Remote Code Execution (926436) |
2000.4.4aSR4 |
MS07-012 |
924667 |
Vulnerability in Microsoft MFC Could Allow Remote Code Execution (924667) |
2000.4.4aSR4 |
MS07-013 |
918118 |
Vulnerability in Microsoft RichEdit Could Allow Remote Code Execution (918118) |
2000.4.4aSR4 |
|
CSCsh20360 |
Looping in System Date & Time due to Daylight saving correction. |
2000.4.4aSR4 |
|
CSCsh79447 |
MS07-009 hotfix does not install on CCM 4.2.3 |
2000.4.4aSR4 |
|
CSCsh91439 |
MCS-OS - MBSA Upgrade to 2.0.1 required |
2000.4.4aSR5 |
|
CSCsi19073 |
MBSA 2.0.1 indicates missing packages |
2000.4.4aSR5 |
|
CSCsh91735 931836 |
February 2007 cumulative time zone update for Microsoft Windows operating systems |
2000.4.4aSR5 |
|
CSCsd81429 |
Third Party Director Software Not Reporting All Environment Variables on IBM Servers |
2000.4.4aSR5 |
|
CSCsh93237 |
Default Microsoft Video Driver Selected for MCS-7825-I2-IPC2 |
2000.4.4aSR5 |
MS07-017 |
925902 |
Vulnerabilities in GDI Could Allow Remote Code Execution (925902) |
2000.4.4aSR6 |
MS07-020 |
932168 |
Vulnerability in Microsoft Agent Could Allow Remote Code Execution (932168) |
2000.4.4aSR6 |
MS07-021 |
930178 |
Vulnerabilities in CSRSS Could Allow Remote Code Execution (930178) |
2000.4.4aSR6 |
MS07-022 |
931784 |
Vulnerability in Windows Kernel Could Allow Elevation of Privilege (931784) |
2000.4.4aSR6 |
|
CSCsi47502 |
Update Location of IBM related MIBs |
2000.4.4aSR6 |
|
CSCsi23088 |
PegasusProvider.exe crashes during installing 2000.4.4sr5 |
2000.4.4aSR6 |
|
CSCsh70353 |
Reinstall Hotfix- KB831877 and KB835732 error with 2000.4.4a OS Upgrade |
2000.4.4aSR6 |
MS07-027 |
931768 |
Cumulative Security Update for Internet Explorer (931768) |
2000.4.4aSR7 |
MS07-029 |
935966 |
Vulnerability in Windows DNS RPC Interface Could Allow Remote Code Execution (935966) |
2000.4.4aSR7 |
|
935843 |
Stop 0x0000007F error when you print from Windows XP or Windows 2000 with GDI security update 925902 installed |
2000.4.4aSR7 |
|
CSCsi79685 891071 |
A memory leak may occur in the Winmgmt process in Windows 2000 |
2000.4.4aSR7 |
|
CSCsi31474 |
Missing IBM Director 5.10.3 PF1 fix on Windows 2000 |
2000.4.4aSR7 |
MS07-031 |
935840 |
Vulnerability in the Windows Schannel Security Package Could Allow Remote Code Execution (935840): |
2000.4.4aSR8 |
MS07-033 |
933566 |
Cumulative Security Update for Internet Explorer (933566): |
2000.4.4aSR8 |
MS07-035 |
935839 |
Vulnerability in Win 32 API Could Allow Remote Code Execution (935839): |
2000.4.4aSR8 |
MS07-039 |
926122 |
Vulnerability in Windows Active Directory Could Allow Remote Code Execution (926122) |
2000.4.5aSR1 |
|
CSCsj51249 |
MDAC patch installation for KB92779 can abend when checking MDAC Version Version |
2000.4.5aSR1 |
|
CSCsj51259 |
MDAC installation can abend a command doesn't execute properly |
2000.4.5aSR1 |
MS07-042 |
936227 |
Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (936227) |
2000.4.5aSR2 |
MS07-043 |
921503 |
Vulnerability in OLE Automation Could Allow Remote Code Execution (921503) |
2000.4.5aSR2 |
MS07-045 |
937143 |
Cumulative Security Update for Internet Explorer (937143) |
2000.4.5aSR2 |
MS07-046 |
938829 |
Vulnerability in GDI Could Allow Remote Code Execution (938829) |
2000.4.5aSR2 |
MS07-047 |
936782 |
Vulnerabilities in Windows Media Player Could Allow Remote Code Execution (936782) |
2000.4.5aSR2 |
MS07-050 |
938127 |
Vulnerability in Vector Markup Language Could Allow Remote Code Execution (938127) |
2000.4.5aSR2 |
|
CSCsj56317 933360 |
MCS-OS Update needed for New Zealand DST changes in 2007
|
2000.4.5aSR2 |
|
CSCsj74454 |
HP DL380 G5 server System BIOS needs an update to version P56-2007.04.06 |
2000.4.5aSR2 |
|
CSCsg89492 |
HP DL320 G4 & G5 NIC driver doesn't have the Speed Duplex Option in 2000 |
2000.4.5aSR2 |
|
CSCsk30092 |
win-OS-Upgrade-K9.2000-4-5a-sr2 prompts 'Digital Signature Not Found' |
2000.4.5bSR3 |
|
CSCsk20071 |
Add Support of 2000.4.5a Service Release train on 2000.4.5b Installs |
2000.4.5bSR3 |
|
CSCsk38770 |
Updated System BIOS to accommodate G0 step of CPU |
2000.4.5bSR3 |
|
CSCsk45394 |
Update DAT Tape Drivers |
2000.4.5bSR3 |
MS07-051 |
938827 |
Vulnerability in Microsoft Agent Could Allow Remote Code Execution (938827) |
2000.4.5bSR4 |
|
CSCsk80526 |
ES/SR can abend during StopServices |
2000.4.5bSR4 |
MS07-055 |
923810 |
Vulnerability in Kodak Image Viewer Could Allow Remote Code Execution (923810) |
2000.4.5bSR4 |
MS07-056 |
941202 |
Security Update for Outlook Express and Windows Mail (941202) |
2000.4.5bSR4 |
MS07-057 |
939653 |
Cumulative Security Update for Internet Explorer (939653) |
2000.4.5bSR4 |
MS07-058 |
933729 |
Vulnerability in RPC Could Allow Denial of Service (933729) |
2000.4.5bSR4 |
|
CSCsl18866 943000 |
MCS-OS update needed for 2008 Brazil Summertime change |
2000.4.5bSR5 |
|
CSCsk81433 938977 |
MCS OS update needed for Venezuela TZ change |
2000.4.5bSR5 |
MS07-062 |
941672 |
Vulnerability in DNS Could Allow Spoofing (941672) |
2000.4.5bSR5 |
MS07-028 |
931906 |
Vulnerability in CAPICOM Could Allow Remote Code Execution (931906) |
2000.4.5bSR6 |
|
CSCsk35981 872765 |
MCS Server failed to handle L3 handover DHCP request |
2000.4.5bSR6 |
|
CSCsl06227 936227 |
Security Update for MSXML 4.0 Version Component |
2000.4.5bSR6 |
MS07-064 |
941568 |
Vulnerabilities in DirectX Could Allow Remote Code Execution (941568) |
2000.4.5bSR6 |
MS07-065 |
937894 |
Vulnerability in Message Queuing Could Allow Remote Code Execution (937894) |
2000.4.5bSR6 |
MS07-068 |
941569 |
Vulnerability in Windows Media File Format Could Allow Remote Code Execution (941569 and 944275) |
2000.4.5bSR6 |
MS07-069 |
942615 |
Cumulative Security Update for Internet Explorer (942615) |
2000.4.5bSR6 |
MS08-001 |
941644 |
Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (941644) |
2000.4.5bSR7 |
MS08-002 |
943485 |
Vulnerability in LSASS Could Allow Local Elevation of Privilege (943485) |
2000.4.5bSR7 |
MS08-008 |
947890 |
Vulnerability in OLE Automation Could Allow Remote Code Execution (947890) |
2000.4.5bSR8 |
MS08-010 |
944533 |
Cumulative Security Update for Internet Explorer (944533) |
2000.4.5bSR8 |
MS08-003 |
946538 |
Vulnerability in Active Directory Could Allow Denial of Service (946538) |
2000.4.5bSR8 |
MS08-005 |
942831 |
Vulnerability in Internet Information Services Could Allow Elevation of Privilege (942831) |
2000.4.5bSR8 |
|
CSCsm67223 |
OS Service Release needs update for BIOS on MCS 7825-I3 |
2000.4.5bSR8 |
|
CSCsm81326 |
DST: MCS-OS IBM Director Agent 2007k TZ Table update needed |
2000.4.5bSR9 |
|
CSCsm88262 |
DST: MCS-OS IBM Director upd needed for March 2008 Chile Summertime chg |
2000.4.5bSR9 |
|
CSCsl90908 |
DST: MCS-OS update needed for 2007-2008 Argentina Summertime change |
2000.4.5bSR9 |
|
CSCsl16516
|
DST: MCS-OS update needed for 2008 Australia Summertime change |
2000.4.5bSR9 |
MS08-020 |
945553 |
Vulnerability in DNS Client Could Allow Spoofing (945553) |
2000.4.5bSR10 |
MS08-021 |
948590 |
Vulnerabilities in GDI Could Allow Remote Code Execution (948590) |
2000.4.5bSR10 |
MS08-022 |
944338 |
Vulnerability in VBScript and JScript Scripting Engines Could Allow Remote Code Execution (944338) |
2000.4.5bSR10 |
MS08-023 |
948881 |
Security Update of ActiveX Kill Bits (948881) |
2000.4.5bSR10 |
MS08-024 |
947864 |
Cumulative Security Update for Internet Explorer (947864) |
2000.4.5bSR10 |
MS08-025 |
941693 |
Vulnerability in Windows Kernel Could Allow Elevation of Privilege (941693) |
2000.4.5bSR10 |
|
CSCso26082 |
Add tzupdate.exe to OS fresh installs and upgrades |
2000.4.5bSR10 |
|
CSCso56152 |
raiddp.log file keeps growing on the server |
2000.4.5bSR10 |
|
CSCso13134 |
DST: MCS OS update needed for 2008 Iraq Daylight Time removal (replaces CSCsl16516/KB942673) |
2000.4.5bSR10 |
MS08-028 |
950749 |
Vulnerability in Microsoft Jet Database Engine Could Allow Remote Code Execution (950749) |
2000.4.5bSR11 |
|
CSCso13145 |
DST: MCS IBM Director update needed for 2008 Iraq Daylight Time removal |
2000.4.5bSR11 |
MS08-031 |
950759 |
Cumulative Security Update for Internet Explorer (950759) |
2000.4.5bSR12 |
MS08-033 |
951698 |
Vulnerabilities in DirectX Could Allow Remote Code Execution (951698) |
2000.4.5bSR12 |
MS08-034 |
948745 |
Vulnerability in WINS Could Allow Elevation of Privilege (948745) |
2000.4.5bSR12 |
MS08-035 |
953235 |
Vulnerability in Active Directory Could Allow Denial of Service (953235) |
2000.4.5bSR12 |
MS08-032 |
950760 |
Cumulative Security Update of ActiveX Kill Bits (950760) |
2000.4.5bSR12 |
MS08-037 |
951746, 951748 |
Vulnerabilities in DNS Could Allow Spoofing (953230) |
2000.4.5bSR13 |
MS08-040 |
948110 |
Vulnerabilities in Microsoft SQL Server Could Allow Elevation of Privilege (948110) |
2000.4.5bSR13 |
|
CSCsr69663 |
SQL 2000 Hotfix KB948110 may halt upgrade on 2000.4.5b |
2000.4.6sr1 |
|
CSCsr61830 |
SQL 2000 Hotfix KB948110 may fail to install intermittently |
2000.4.6sr1 |
MS08-046 |
952954 |
Vulnerability in Microsoft Windows Image Color Management System Could Allow Remote Code Execution (952954) |
2000.4.6sr1 |
MS08-045 |
953838 |
Cumulative Security Update for Internet Explorer (953838) |
2000.4.6sr1 |
MS08-048 |
951066 |
Security Update for Outlook Express and Windows Mail (951066) |
2000.4.6sr1 |
MS08-049 |
950974 |
Vulnerabilities in Event System Could Allow Remote Code Execution (950974) |
2000.4.6sr1 |
|
953839 |
Cumulative Security Update of ActiveX Kill Bits |
2000.4.6sr2 |
|
CSCsu42231 |
MCS OS Upgrade from MCS OS 2003.1.2a SR13 to MCS OS 2003.1.3a failed |
2000.4.6sr2 |
|
CSCsu43255 |
2003.1.3a OS upgrade breaks UCCX SQL server in HA mode |
2000.4.6sr2 |
|
CSCsj36444 |
Cannot login to CER GUI after enabling OSS on WinOS 2000.4.5 box |
2000.4.6sr2 |
MS07-042 |
KB933579 (MSXML6) |
Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (936227) |
2000.4.6sr2 |
MS08-052 |
954593 |
Vulnerabilities in GDI+ Could Allow Remote Code Execution (954593) |
2000.4.6sr2 |
MS08-053 |
954156 |
Vulnerability in Windows Media Encoder 9 could allow remote code execution |
2000.4.6sr2 |
MS08-058 |
956390 |
Cumulative Security Update for Internet Explorer (956390) |
2000.4.6sr3 |
MS08-061 |
954211 |
Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (954211) |
2000.4.6sr3 |
MS08-062 |
953155 |
Vulnerability in Windows Internet Printing Service Could Allow Remote Code Execution (953155) |
2000.4.6sr3 |
MS08-063 |
957095 |
Vulnerability in SMB Could Allow Remote Code Execution (957095) |
2000.4.6sr3 |
MS08-065 |
951071 |
Vulnerability in Message Queuing Could Allow Remote Code Execution (951071) |
2000.4.6sr3 |
|
956391 |
956391 Cumulative Security Update of ActiveX Kill Bits |
2000.4.6sr3 |
MS08-067 |
958644 |
Vulnerability in Server Service Could Allow Remote Code Execution (958644) |
2000.4.6sr4 |
MS08-068 |
957097 |
Vulnerability in SMB Could Allow Remote Code Execution (957097) |
2000.4.6sr4 |
MS08-069 |
955218 |
Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution (955218) |
2000.4.6sr4 |
MS08-071 |
956802 |
Vulnerabilities in GDI Could Allow Remote Code Execution (956802) |
2000.4.6sr5 |
MS08-073 |
958215 |
Cumulative Security Update for Internet Explorer (958215) |
2000.4.6sr5 |
MS08-076 |
959807 |
Vulnerabilities in Windows Media Components Could Allow Remote Code Execution (959807) |
2000.4.6sr5 |
MS08-078 |
960714 |
Security Update for Internet Explorer (960714) |
2000.4.6sr6 |
MS09-001 |
958687 |
Vulnerabilities in SMB Could Allow Remote Code Execution (958687) |
2000.4.6sr6 |
CSCsw90778 |
TZ: Venezuelan time with Java 1.4.2 reflects GMT instead of GMT-04:30 |
2000.4.6sr6 |
|
MS09-004 |
959420 960082 960083 |
Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution (959420) |
2000.4.6sr7 |
|
960715 |
Update Rollup for ActiveX Kill Bits |
2000.4.6sr7 |
|
CSCsx44463 |
MS kB957097 causes CAD or CSD to display inactive or disply blank report |
2000.4.6sr7 |
|
CSCsx24324 |
Add check for CSCsv52867 applicable systems to OS SR |
2000.4.6sr7 |
MS09-006 |
958690 |
Vulnerabilities in Windows Kernel Could Allow Remote Code Execution (958690) |
2000.4.6sr8 |
MS09-007 |
960225 |
Vulnerability in SChannel Could Allow Spoofing (960225) |
2000.4.6sr8 |
MS09-008 |
962238 |
Vulnerabilities in DNS and WINS Server Could Allow Spoofing (962238) |
2000.4.6sr8 |
|
CSCsy40419 |
Previous installation errors reported in current installation |
2000.4.6sr8 |
MS09-011 |
960477 923561 |
Vulnerabilities in WordPad and Office Text Converters Could Allow Remote Code Execution (960477) |
2000.4.6sr9 |
MS09-013 |
960803 |
Vulnerabilities in Windows HTTP Services Could Allow Remote Code Execution (960803) |
2000.4.6sr9 |
MS09-014 |
963027 |
Cumulative Security Update for Internet Explorer (963027) |
2000.4.6sr9 |
MS09-010 |
960477 |
Vulnerabilities in WordPad and Office Text Converters Could Allow Remote Code Execution (960477) |
2000.4.6sr9 |
MS09-012 |
959454 952004 |
Vulnerabilities in Windows Could Allow Elevation of Privilege (959454) |
2000.4.6sr9 |
MS09-015 |
959426 |
Blended Threat Vulnerability in SearchPath Could Allow Elevation of Privilege (959426) |
2000.4.6sr9 |
Perform the following procedure to install the service release:
1. Disable all virus scanning software or Intrusion Detect Software prior to running this installation.
2. Download the file to a location that you will remember.
3. Double click the executable.
4. To acknowledge that the server runs OS upgrade version 2000.4.6 and that you are not installing the service release through Terminal Services, click Yes. If the server does not run OS upgrade version 2000.4.6, install it before you run this service release.
5. Files automatically extract and install on the server.
6. After the installation finishes, it will report the number of errors detected and ask if you want to view the logfile.
7. If there are no errors detected, you can select “No”; otherwise click yes to view the log. There is an ERRORS section at the very end of the logfile to assist in finding the errors.
8. Click OK to confirm the reboot
9. Perform this procedure on all supported servers in the cluster.
10. If you choose to do so, you can use the Baseline Security Analyzer to verify the hotfixes that are installed on each server. See the “Verifying HotFixes By Using Baseline Security Analyzer” section.
Verifying HotFixes By Using Microsoft Baseline Security Analyzer
If you want to do so, you can use the Microsoft Baseline Security Analyzer utility (run c:\utils\mbsa_scan.cmd) to verify which hotfixes are installed on the server.
Microsoft Baseline Security Analyzer (MBSA)
Make sure that you review the Reason column of the MBSA report to identify whether the hotfix should be installed. The following table shows expected results from MBSA on a fully patched system.
Scanned with MBSA version: 2.1.2104.0
Catalog synchronization date: 2009-04-13T22:28:16Z
Security update catalog: Microsoft Update (offline)
Security Updates Scan Results
Issue: SDK Components Security Updates
Score: Check passed
Result: No security updates are missing.
Current Update Compliance
| MS07-028 | Installed | Security Update for CAPICOM (KB931906) | Critical |
Issue: SQL Server Security Updates
Score: Check passed
Result: No security updates are missing.
Current Update Compliance
| MS09-004 | Installed | Security Update for SQL Server 2000 Service Pack 4 (KB960082) | Important |
Issue: Windows Security Updates
Score: Check failed (non-critical)
Result: 1 service packs or update rollups are missing.
Update Rollups and Service Packs
| 890830 | Missing | Windows Malicious Software Removal Tool - April 2009 (KB890830) | |
Current Update Compliance
| MS03-008 | Installed | 814078: Security Update (Microsoft Jscript version 5.5, Windows 2000) | |
| MS02-050 | Installed | Q329115: Security Update (Windows 2000) | |
| MS03-011 | Installed | 816093: Security Update Microsoft Virtual Machine (Microsoft VM) | Critical |
| MS04-016 | Installed | Security Update for DirectX 9.0 (KB839643) | Moderate |
| MS04-016 | Installed | Security Update for DirectX 8.0 (KB839643) | Moderate |
| MS04-016 | Installed | Security Update for DirectX 8.1 (KB839643) | Moderate |
| MS04-013 | Installed | Cumulative Security Update for Outlook Express 5.5 Service Pack 2 (KB837009) | Critical |
| MS04-008 | Installed | Security Update for Windows Media Services (KB832359) | Moderate |
| MS05-036 | Installed | Security Update for Windows 2000 (KB901214) | Critical |
| MS05-040 | Installed | Security Update for Windows 2000 (KB893756) | Important |
| MS05-041 | Installed | Security Update for Windows 2000 (KB899591) | Moderate |
| MS05-042 | Installed | Security Update for Windows 2000 (KB899587) | Moderate |
| MS05-043 | Installed | Security Update for Windows 2000 (KB896423) | Critical |
| MS04-016 | Installed | Security Update for DirectX 8.2 (KB839643) | Moderate |
| MS05-045 | Installed | Security Update for Windows 2000 (KB905414) | Moderate |
| MS05-046 | Installed | Security Update for Windows 2000 (KB899589) | Important |
| MS05-048 | Installed | Security Update for Windows 2000 (KB901017) | Important |
| MS05-050 | Installed | Security Update for DirectX 8 for Windows 2000 (KB904706) | Critical |
| MS05-027 | Installed | Security Update for Windows 2000 (KB896422) | Important |
| MS05-026 | Installed | Security Update for Windows 2000 (KB896358) | Important |
| MS05-049 | Installed | Security Update for Windows 2000 (KB900725) | Important |
| MS05-047 | Installed | Security Update for Windows 2000 (KB905749) | Important |
| MS05-044 | Installed | Security Update for Internet Explorer 6 Service Pack 1 for Windows 2000 (KB905495) | Moderate |
| MS05-050 | Installed | Security Update for Windows 2000 (KB904706) | Critical |
| MS06-002 | Installed | Security Update for Windows 2000 (KB908519) | Critical |
| MS06-006 | Installed | Security Update for Windows Media Player Plug-in (KB911564) | Important |
| MS06-005 | Installed | Security Update for Windows Media Player 7.1 for Windows 2000 (KB911565) | Important |
| MS06-015 | Installed | Security Update for Windows 2000 (KB908531) | Critical |
| MS06-022 | Installed | Security Update for Internet Explorer 6 Service Pack 1 (KB918439) | Critical |
| MS06-018 | Installed | Security Update for Windows 2000 (KB913580) | Moderate |
| MS06-025 | Installed | Security Update for Windows 2000 (KB911280) | Critical |
| MS06-036 | Installed | Security Update for Windows 2000 (KB914388) | Critical |
| MS06-044 | Installed | Security Update for Windows 2000 (KB917008) | Critical |
| MS06-050 | Installed | Security Update for Windows 2000 (KB920670) | Important |
| MS06-041 | Installed | Security Update for Windows 2000 (KB920683) | Critical |
| MS06-045 | Installed | Security Update for Windows 2000 (KB921398) | Moderate |
| MS06-034 | Installed | Security Update for Windows 2000 (KB917537) | Important |
| MS06-053 | Installed | Security Update for Windows 2000 (KB920685) | Moderate |
| MS06-057 | Installed | Security Update for Windows 2000 (KB923191) | Critical |
| MS06-066 | Installed | Security Update for Windows 2000 (KB923980) | Important |
| MS06-070 | Installed | Security Update for Windows 2000 (KB924270) | Critical |
| MS06-074 | Installed | Security Update for Windows 2000 (KB926247) | Important |
| MS07-008 | Installed | Security Update for Windows 2000 (KB928843) | Critical |
| MS07-012 | Installed | Security Update for Windows 2000 (KB924667) | Important |
| MS07-013 | Installed | Security Update for Windows 2000 (KB918118) | Important |
| MS07-011 | Installed | Security Update for Windows 2000 (KB926436) | Important |
| MS07-017 | Installed | Security Update for Windows 2000 (KB925902) | Critical |
| MS07-021 | Installed | Security Update for Windows 2000 (KB930178) | Critical |
| MS06-068 | Installed | Security Update for Windows 2000 (KB920213) | Critical |
| MS07-009 | Installed | Security Update for Microsoft Data Access Components 2.8 Service Pack 1 (KB927779) | Critical |
| MS07-035 | Installed | Security Update for Windows 2000 (KB935839) | Critical |
| MS07-022 | Installed | Security Update for Windows 2000 (KB931784) | Important |
| MS06-078 | Installed | Security Update for Windows Media Player 6.4 (KB925398) | Critical |
| MS07-039 | Installed | Security Update for Windows 2000 (KB926122) | Critical |
| MS07-047 | Installed | Security Update for Windows Media Player 9 (KB936782) | Important |
| MS07-051 | Installed | Security Update for Windows 2000 (KB938827) | Critical |
| 891861 | Installed | Update Rollup 1 for Windows 2000 Service Pack 4 (KB891861) | |
| MS07-058 | Installed | Security Update for Windows 2000 (KB933729) | Low |
| MS07-055 | Installed | Security Update for Windows 2000 (KB923810) | Critical |
| MS07-068 | Installed | Security Update for Windows 2000 (KB941569) | Critical |
| MS07-065 | Installed | Security Update for Windows 2000 (KB937894) | Important |
| MS08-002 | Installed | Security Update for Windows 2000 (KB943485) | Important |
| MS08-005 | Installed | Security Update for Windows 2000 (KB942831) | Important |
| MS08-008 | Installed | Security Update for Windows 2000 (KB943055) | Critical |
| MS08-020 | Installed | Security Update for Windows 2000 (KB945553) | Important |
| MS08-022 | Installed | Security Update for Windows 2000 (KB944338) | Critical |
| MS08-028 | Installed | Security Update for Windows 2000 (KB950749) | Critical |
| MS08-032 | Installed | Cumulative Security Update for ActiveX Killbits for Windows 2000 (KB950760) | Moderate |
| MS08-037 | Installed | Security Update for Windows 2000 (KB951748) | Important |
| MS08-048 | Installed | Security Update for Outlook Express 6 Service Pack 1 (KB951066) | Important |
| MS08-049 | Installed | Security Update for Windows 2000 (KB950974) | Important |
| MS08-046 | Installed | Security Update for Windows 2000 (KB952954) | Critical |
| MS08-052 | Installed | Security Update for Internet Explorer 6 for Windows 2000 (KB938464) | Critical |
| MS08-062 | Installed | Security Update for Windows 2000 (KB953155) | Important |
| MS08-067 | Installed | Security Update for Windows 2000 (KB958644) | Critical |
| MS08-069 | Installed | Security Update for Windows 2000 (KB955069) | Critical |
| MS08-069 | Installed | Security Update for Microsoft XML Core Services 4.0 Service Pack 2 (KB954430) | Important |
| MS08-068 | Installed | Security Update for Windows 2000 (KB957097) | Important |
| MS08-076 | Installed | Security Update for Windows 2000 (KB954600) | Important |
| MS08-071 | Installed | Security Update for Windows 2000 (KB956802) | Critical |
| MS08-076 | Installed | Security Update for Windows 2000 (KB952069) | Important |
| MS09-001 | Installed | Security Update for Windows 2000 (KB958687) | Critical |
| 960715 | Installed | Update Rollup for ActiveX Killbits for Windows 2000 (KB960715) | |
| MS09-008 | Installed | Security Update for Windows 2000 (KB961063) | Important |
| MS09-007 | Installed | Security Update for Windows 2000 (KB960225) | Important |
| MS09-006 | Installed | Security Update for Windows 2000 (KB958690) | Critical |
| MS09-010 | Installed | Security Update for Windows 2000 (KB923561) | Important |
| MS09-011 | Installed | Security Update for DirectX 9 for Windows 2000 (KB961373) | Critical |
| MS09-012 | Installed | Security Update for Windows 2000 (KB952004) | Important |
| MS09-013 | Installed | Security Update for Windows 2000 (KB960803) | Critical |
| MS09-015 | Installed | Security Update for Windows 2000 (KB959426) | Low |
| MS09-014 | Installed | Cumulative Security Update for Internet Explorer 6 Service Pack 1 (KB963027) | Critical |
Known Caveats
CSCsd18255 is only resolved if a product that contains MS SQL Server 2000/MSDE 2000 is already installed. If this SR is installed prior to installation of the product, it may generate an error in the installation log. This is normal. After the product containing SQL is installed, c:\utils\CSCsd18255.exe will need to be executed and the server rebooted.
CSCsx44463 is is only resolved if a product that contains MS SQL Server 2000/MSDE 2000 is already installed.
Several security updates, such as MS07-009, MS08-069 or MS09-004 are only resolved when executing this SR AFTER the application is installed. (ie CallManager or CRS)
Uninstalling
Hotfixes
If you need to uninstall this OS Service Release or one of its hotfixes, follow the uninstall procedures exactly as they appear in this section. Most hotfixes have an uninstall program provided by Microsoft, but there are caveats associated with uninstalling the hotfixes, This section provides procedures to uninstall a single hotfix and to uninstall the entire OS Service Release.
Perform the following procedure to uninstall a single hotfix:
1. Verify whether the hotfix can be uninstalled by checking the Uninstall Supported column of the Hotfixes That Are Included in the Service Release table. If No displays in that column, you cannot use this procedure to uninstall the hotfix. The only way to return the server to a state without the hotfix, is to fail back to a saved copy of the mirrored drive or rebuild the server, install the IP Telephony application, and restore the database. If Yes displays in the Uninstall Supported column, continue with Step 2.
2. Choose Start > Settings > Control Panel > Add/Remove Programs. Hotfixes appear near the bottom of the Add/Remove Programs window. Each hotfix begins with Windows 2000 Hotfix and is followed by the Microsoft Knowledge Base (KB or Q) article number. You can use the Hotfixes That Are Included in the Service Release table to convert the security bulletin number (MS05-053) to a KB or Q number (KB896424).
3. Select the hotfix you want to uninstall and click Change/Remove. The Windows 2000 <hotfix number> Removal Wizard displays.
4. Click Next. The steps may differ, depending on the uninstall program provided with the hotfix. If a window appears with a message asking whether you want to uninstall the hotfix, click Yes.
5. It’s very likely that the Inspecting Current Configuration step of the Removal Wizard will detect a list of hotfixes or programs that may be affected by removing this hotfix. Record this list. All the hotfixes listed will need to be re-installed and any applications listed should be checked to confirm they are still working properly. Removing this hotfix will replace the system files it backed up with it was originally installed. Other hotfixes or applications may be dependant on these same files. The Removal Wizard does not know whether or not the applications or hotfixes will be affected. It just has detected that they have been installed after the hotfix being removed was installed. After recording the list, click Yes.
6. Click Finish. The server will reboots, if needed. If you are prompted to reboot, click Yes.
7. If the Inspecting Current Configuration step of the Removal Wizard listed any other hotfixes, reinstall those hotfixes now. The last OS Service Release with the individual hotfix installations can be found in c:\Program Files\Cisco\Updates\2000.4.6SR#, where “#” equals the Service Release number (for example, 2000.4.6SR1). The files will be named by their KB or Q number and should match what you have written down. Double-click the first hotfix that is on your list of hotfixes that need to be reinstalled, and follow the prompts to install the hotfix. Repeat this step for each hotfix you need to reinstall. You do not need to reboot between hotfixes. Once you have reinstalled all the hotfixes on your list, reboot the server.
8. If the Inspecting Current Configuration step of the Removal Wizard listed any applications, confirm that they are still working properly.
Perform the following procedure to uninstall this entire OS Service Release:
1. In order to determine what hotfixes need to be uninstalled, you need to determine what the OS level was before you applied this Service Release. The minimum OS level for this Service Release is OS Upgrade 2000.4.5a, so that is the starting point. To determine what Service Releases where applied after OS Upgrade 2000.4.5a, use the History.log file. Click Start > Cisco Install Logs (C:\Program Files\Common Files\Cisco\Logs)
2. Double-click History.log (or just History if known file extensions are hidden)
3. Find OS Upgrade 2000.4.6 and search down the list for the last 2000.4.6SR# before the one you are trying to uninstall. Record this Service Release number.
4. Use the Hotfixes That Are Included in the Service Release table to find all the hotfixes installed after the Service Release recorded in the previous step.
5. Choose Start > Settings > Control Panel > Add/Remove Programs. Hotfixes appear near the bottom of the Add/Remove Programs window. Each hotfix begins with Windows 2000 Hotfix and is followed by the Microsoft Knowledge Base (KB or Q) article number. You can use the Hotfixes That Are Included in the Service ReleaseHotfixes That Are Included in the Service Release table to convert the security bulletin number (e.g. MS05-053) to a KB or Q number (e.g. KB896424).
6. Select the hotfix you want to uninstall and click Change/Remove. The Windows 2000 <hotfix number> Removal Wizard displays.
7. Click Next. The steps may differ, depending on the uninstall program provided with the hotfix. If a window appears with a message asking whether you want to uninstall the hotfix, click Yes.
8. It’s very likely that the Inspecting Current Configuration step of the Removal Wizard will detect a list of hotfixes or programs that may be affected by removing this hotfix. Record this list. All the hotfixes listed will need to be re-installed and any applications listed should be checked to confirm they are still working properly. Removing this hotfix will replace the system files it backed up with it was originally installed. Other hotfixes or applications may be dependant on these same files. The Removal Wizard does not know whether or not the applications or hotfixes will be affected. It just has detected that they have been installed after the hotfix being removed was installed. After recording the list, click Yes.
9. Click Finish. The server will reboots, if needed. If you are prompted to reboot, click Yes.
10. Follow steps 6 - 9 until all the hotfix you want to uninstall have been removed.
11. If the Inspecting Current Configuration step of the Removal Wizard listed any other hotfixes, reinstall those hotfixes now. The last OS Service Release with the individual hotfix installations can be found in c:\Program Files\Cisco\Updates\2000.4.6SR#, where “#” equals the Service Release number (for example, 2000.4.5aSR1). The files will be named by their KB or Q number and should match what you have written down. Double-click the first hotfix that is on your list of hotfixes that need to be reinstalled, and follow the prompts to install the hotfix. Repeat this step for each hotfix you need to reinstall. You do not need to reboot between hotfixes. Once you have reinstalled all the hotfixes on your list, reboot the server.
12. If the Removal Wizard listed any applications in the Inspecting Current Configuration step, confirm that they are still working properly.