Microsoft refuses to patch infected Windows XP machines
By Stuart Turton
Posted on 15 Apr 2010 at 09:04
Microsoft has revealed that its latest round of patches won't install on XP machines if they're infected with a rootkit.
Back in February, a security patch left some XP users complaining of endless reboots and Blue Screens of Death. An investigation followed and Microsoft discovered the problems occurred on machines infected with the Alureon rootkit, which interacted badly with patch KB977165 for the Windows kernel.
Microsoft's latest patches also contain kernel updates, and in an effort to avoid a repeat performance, the company has prevented the patches from installing on infected machines.
This security update includes package detection logic that prevents the installation of the security update if certain abnormal conditions exist
"This security update includes package-detection logic that prevents the installation of the security update if certain abnormal conditions exist on 32-bit systems," Microsoft cautions in the patch notes.
"These abnormal conditions on a system could be the result of an infection with a computer virus that modifies some operating system files, which renders the infected computer incompatible with the kernel update," it concludes.
As Microsoft has noted, while the solution prevents users from suffering the misery of Blue Screens of Death, it does leave them unprotected and the company has urged users to download its Malicious Software Removal Tool to clean up their machines and run the patch as soon as possible.
How to identify machines that have not fully updated?
Can you tell how to identify if a machine has not fully updated?
Does it warn you it has not done a full update?
My real interest is if someone asks me to look at their machine and they say they have done all the updates.
I am the "token" administrator in the office and look after a few friends machines when they have problems.
Invariably they do not read or save notification messages or even recall what they may have done in the last 24hours!
By petermalins on 15 Apr 2010
if the machine is running Windows XP. If there are updates available install them. If it is Vista or Windows 7 use Windows Update from the Start menu. Again if updates are available, install them.
Alternatively, go to
and download the free Belarc Advisor. The report it generates will tell you if all Microsoft security updates have been installed.
It might be no harm to run the Malicious Software Removal tool available from
and then run Windows Update or go to (if applicable)
as mentioned above just to be double sure all updates are being displayed to you.
I hope this helps.
By Jimbo762 on 15 Apr 2010
By petermalins on 15 Apr 2010
perhaps the editor should file this advice
Good advice, perhaps Tim could create a bit of web space for good advice like this (or is it already there!)
By gfmoore on 15 Apr 2010
- Flickr redesign: is it enough to tempt photographers back?
- Hands on with the new Google Maps
- Nokia Lumia 925 review: first look
- Why I won't subscribe to Creative Cloud
- GoPro camera strapped to a remote-control helicopter: the ultimate boy's toy
- Acer Iconia A1 review: first look
- Acer Aspire P3 review: first look
- Acer Aspire R7 review: first look
- How we produce the PC Pro podcast
- Google Now draining iPhone battery
- Yes, I write down my passwords
- How to deal with a ransomware attack
- How secure is your Wi-Fi network?
- How QR codes caught out the security pros
- Why I do not trust Do Not Track... yet
- The hard disks you can "secure" with a single-digit password
- Why I've started using a password manager
- Time to kill off CAPTCHA
- Are today's young people Generation I (for insecure)?
- Ransomware that's better made than antivirus software