Engineers at Microsoft are working on a fix for a vulnerability in patching software that is preventing the deployment of the June security updates.
The issue only affects System Center Configuration Manager (ConfigMgr) 2007, a Microsoft solution to distribute patches across across the corporate environment, said Christopher Budd, a security program manager with the software giant.
And the problem only impacts System Management Server (SMS) 2003 clients of ConfigMgr 2007, Budd wrote on the Microsoft Security Response Center blog.
"This means that to be affected by this issue, you must be running a mixed ConfigMgr 207 and SMS 2003 environment," he said. "If you are not running this specific configuration, this issue does not affect you."
Eric Schultze, chief technology officer of patch management firm Shavlik Technologies, told SCMagazineUS.com on Monday in a statement that he does not consider the glitch a sign of any major, inherent issue.
"This appears to be a one-time event that can be easily corrected by Microsoft and one that impacts a very small percentage of Microsoft users who happen to be running a very specific configuration," he said. "This is a non-event."
Budd said engineers are working to develop a fix. As a workaround, the advisory recommends affected customers use the software distribution feature in ConfigMgr 2007 or other deployment technologies, such as Windows Server Update Services.
Seven patches, including three rated "critical," were issued in the June release.
See original article on scmagazineus.com
Microsoft advises admins on June patch problem
By
Dan Kaplan
on
Jun 17, 2008 9:55AM

Microsoft is working on a fix for a vulnerability in patching software that is preventing the deployment of the June security updates.
Got a news tip for our journalists? Share it with us anonymously here.
Sponsored Whitepapers
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see