Security Update Notification

Security Update Notification

6605 19 ½ Mile Road Sterling Heights, MI 48314-1408 USA Tel: +1-586-254-0020 | Fax: +1-586-254-0053 [email protected] | www.sisconet.com Security Update Notification Microsoft Common Controls ActiveX Control (MSCOMCTL.OCX) Vulnerability 12 December 2012 (Links Updated 21 April 2016) NOTE: This Security Update Notification supersedes the version previously posted by SISCO dated 7 August 2012. An additional vulnerability was found by Microsoft requiring a new update. If you did not apply the update described in the 7 August 2012 notice you only need to apply the update described here. If you did apply the update described in the 7 August 2012 notice you will also need to apply the update from this notice. Microsoft Security Bulletin MS12‐060 disclosed a Critical Vulnerability in the Windows Common Controls that could allow remote code execution http://technet.microsoft.com/en‐us/security/bulletin/ms12‐060 . This ActiveX control is bundled with the Visual Basic 6 redistributable run‐time package that SISCO includes with our products. There is a security patch available from Microsoft for this vulnerability that many systems will receive under normal Windows update processes. HOWEVER, unless your computer has a Microsoft product installed (i.e. Office, SQL Server, BizTalk, etc.) that is checked during the Microsoft Windows Update process you will not receive an update. Microsoft’s Windows Update process will not detect the presence of this vulnerable control if you have not installed one or more of these other Microsoft products. The presence of the VB6 redistributable run‐time package that SISCO installs will not be detected by the Windows Update process if you do not have these other Microsoft products installed. Therefore, SISCO expects that many of our customers may still have this vulnerable ActiveX control installed even after updating their operating system using Windows Update. ALL SISCO PRODUCTS COMPATIBLE WITH WINDOWS ARE AFFECTED. How to Determine If Your Computer Is Vulnerable and Manually Update To determine if the computer on which you have installed your SISCO product is vulnerable so that it can be manually patched, please follow the instructions below: Step 1: For Win7 and 2008R2 64 bit OS’s, locate the ‘C:\Windows\SysWOW64\MSCOMCTL.OCX’ file. For XP and 2003 32 bit OS’s, the path is ‘C:\WINDOWS\system32\MSCOMCTL.OCX’. Step 2: Right click on the MSCOMCTL.OCX file and select properties. For Win7 and 2008R2 64 bit OS’s, select the ‘Details’ tab. For XP and 2003 32 bit OS’s, select the ‘Version’ tab. Look at the file version (see figure to the right). If you are not running version 6.1.98.34 or later you will need to update. Step 3: To update: save the zip file named MSCOMCTL.zip obtained from SISCO at: http://www.sisconet.com/wp‐content/uploads/2016/04/OCX_Update.zip Step 4: Extract the MSCOMCTL.XCO file from the zip file. Step 5: Copy the MSCOMCTL.XCO file to its corresponding ‘WINDOWS’ location depending on your OS (See Step 1) Step 6: Rename the older file to something like MSCOMCTL.OCX.ORIG. Step 7: Change the extension on the unzipped MSCOMCTL.XCO file to MSCOMCTL.OCX. Step 8: Reboot the computer. .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    1 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us