Linked by Thom Holwerda on Wed 9th May 2007 10:15 UTC, submitted by anonymous
Microsoft Microsoft has released patches for 19 vulnerabilities, 14 of which are critical, hitting at holes in Excel, Word, Office, Exchange, Internet Explorer, cryptographic technology and the whopper of them all, the zero-day vulnerability in the DNS Server's use of RPC. The DNS remote code execution vulnerability affects server-grade operating systems, including Windows 2000 and Windows Server 2003, and only those that have the DNS service enabled, such as Domain Controller, DNS Server or Microsoft Small Business Server configurations.
Thread beginning with comment 239290
To view parent comment, click here.
To read all comments associated with this story, please click here.
Member since:

Well that seems to have fixed it, more or less. I installed those two things as you said, then tried the update, and while it still resulted in svchost.exe taking over 99% of the CPU, I let it ride its course and it was done in about 20 minutes.

The strange thing is that despite the incredible number of posts I'm able to find via Google on this issue, my search doesn't seem to lead to a useful fix or MS Knowledge Base page (even when I search directly from the MS support site). I'm curious to know where you found out about this method.

Of course, even assuming a user manages to find the magic ingredients to get Windows into this "fixed" state, it still exhibits behavior that's incredibly inappropriate and intrusive for software that's supposed to be running in the background.... I feel sorry for all the many newbie users out there who probably think their computer is simply broken and have no idea how to fix it....

...but at least it worked for now, for me. Thanks for the tip!

Reply Parent Score: 2