Microsoft refuses to patch infected Windows XP machines
By Stuart Turton
Posted on 15 Apr 2010 at 09:04
Microsoft has revealed that its latest round of patches won't install on XP machines if they're infected with a rootkit.
Back in February, a security patch left some XP users complaining of endless reboots and Blue Screens of Death. An investigation followed and Microsoft discovered the problems occurred on machines infected with the Alureon rootkit, which interacted badly with patch KB977165 for the Windows kernel.
Microsoft's latest patches also contain kernel updates, and in an effort to avoid a repeat performance, the company has prevented the patches from installing on infected machines.
This security update includes package detection logic that prevents the installation of the security update if certain abnormal conditions exist
"This security update includes package-detection logic that prevents the installation of the security update if certain abnormal conditions exist on 32-bit systems," Microsoft cautions in the patch notes.
"These abnormal conditions on a system could be the result of an infection with a computer virus that modifies some operating system files, which renders the infected computer incompatible with the kernel update," it concludes.
As Microsoft has noted, while the solution prevents users from suffering the misery of Blue Screens of Death, it does leave them unprotected and the company has urged users to download its Malicious Software Removal Tool to clean up their machines and run the patch as soon as possible.
How to identify machines that have not fully updated?
Can you tell how to identify if a machine has not fully updated?
Does it warn you it has not done a full update?
My real interest is if someone asks me to look at their machine and they say they have done all the updates.
I am the "token" administrator in the office and look after a few friends machines when they have problems.
Invariably they do not read or save notification messages or even recall what they may have done in the last 24hours!
By petermalins on 15 Apr 2010
if the machine is running Windows XP. If there are updates available install them. If it is Vista or Windows 7 use Windows Update from the Start menu. Again if updates are available, install them.
Alternatively, go to
and download the free Belarc Advisor. The report it generates will tell you if all Microsoft security updates have been installed.
It might be no harm to run the Malicious Software Removal tool available from
and then run Windows Update or go to (if applicable)
as mentioned above just to be double sure all updates are being displayed to you.
I hope this helps.
By Jimbo762 on 15 Apr 2010
By petermalins on 15 Apr 2010
perhaps the editor should file this advice
Good advice, perhaps Tim could create a bit of web space for good advice like this (or is it already there!)
By gfmoore on 15 Apr 2010
- Google Glass: mugger bait, pub problem and other lessons learned from two dangerous weeks
- Twitter, please don't fiddle with my feed
- How Satya Nadella can get some pay-raise karma
- Windows 10: a step back to go forward
- Michael Dell: Cloud infrastructure is the roads, bridges and highways of the 21st century
- How to check your identity hasn’t been sold to the hackers
- Tim Cook: this is how much TV has changed since the 70s
- Westminster wins the .London battle
- 20 years of PC Pro: from deep pan pizza to virtualisation
- Five reasons why the Apple Watch leaves me cold
- How to write your company's IT security policy
- The key to choosing a secure password
- Please stop reposting fake Facebook messages
- Is Facebook safe for business?
- Don't rely on Chrome's password vault
- Facebook Graph Search: don't panic
- Gmail drafts and Pastebin: could they evade the email snoops?
- Applying for a job at GCHQ? Here's your plain-text password
- Google two-step verification: a must for business email
- Yes, I write down my passwords