One ofis that several of the updates in the last group, released on Tuesday September 10, had a detection error: For many users, even after apparently accepting and installing the update, several would keep offering for install in Windows Update, Windows Server Update Services (WSUS) or System Center Configuration Manager (SCCM).
The company has reissued the following patches to address the problem:
- MS13-067 (Critical) — Vulnerabilities in Microsoft SharePoint Server Could Allow Remote Code Execution (2834052)
- MS13-072 (Important) — Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2845537)
- MS13-073 (Important) — Vulnerabilities in Microsoft Excel Could Allow Remote Code Execution (2858300)
- MS13-074 (Important) — Vulnerabilities in Microsoft Access Could Allow Remote Code Execution (2848637)
Microsoft says that there are no changes in the actual updates, just in the detection of the update on the system. Customers who have already successfully installed the update need not take any action.
Many users hid the update in order to avoid the notifications. These users should unhide the update and install.