Razor said:
Hi,
Lately, I have started getting the following error message
more and more frequently:
"This action will reset the current code in break mode.
Do you want to stop running the code?
*To halt the execution of the program so the module window
can be closed, sleect Yes.
*To leave the code in the current state, select No.
YesButton NoButton"
Any ideas as to why this happens?
Clicking Yes reissues the same error message.
Clicking No makes hte msg go away but when I try to close
the report/query the message re-appears.
I invariably have to End Task Access from the Task Manager
to resume working.
Hi Razor,
I mostly work at home, but when I go into
work I use a Win2KPro/Office2KPro machine
that has been very stable over the years.
A week ago I came in and the same thing happened
to me as you describe above. I was changing some
things in a mdb that we had used w/out problems for
years.
Our main interface to our SQL Server 2000 db is
through a VB runtime prog.
My first thought was this reminded me of the db
problems you could run into if you had vbe6.dll on
your system (in our case I believe from the VB runtime,
but I did not verify this).....
(Office 2000 SP3 corrected that behavior).
http://support.microsoft.com/default.aspx?scid=kb;en-us;Q304548
Our company is very aggressive in keeping up with
MS security updates. Then the security bulletin below
came in talking about
"corrects the Debug Programs (SeDebugPrivilege)
user right issue that some customers experienced with the
original patch"
from October 15th.
I could be completely wrong in my assumptions,
but I have to wonder if the October 15 patches
did not cause this stable system to all-of-the-sudden
blow chunks.
In your patch history, do you show any of the updates
below? If so, have you tried applying October 29 revisions?
Just one man's observations...rightly or wrongly.
Gary Walter
**** QUOTE *********
- --------------------------------------------------------------------
Title: Microsoft Windows Security Bulletin Summary for
October 2003
Issued: October 15, 2003
Updated: October 29, 2003
Version Number: 3.0
Bulletin:
http://www.microsoft.com/technet/security/bulletin/winoct03.asp
- --------------------------------------------------------------------
Reason for Major Revision
=========================
Subsequent to the release of the Windows Security Bulletin Summary
for October, the following bulletins have undergone a major revision
increment. Please see the appropriate bulletin section of this
email for more details.
- - MS03-042
- - MS03-043
- - MS03-045
Summary:
========
Included in this advisory are updates for five newly discovered
vulnerabilities in Microsoft Windows. These vulnerabilities,
broken down by severity are:
** Critical Security Bulletins
MS03-041 - Vulnerability in Authenticode Could Allow Remote
Code Execution (823182)
- Affected Software:
- Windows NT Workstation 4.0, Service Pack 6a
- Windows NT Server 4.0, Service Pack 6a
- Windows NT Server 4.0, Terminal Server Edition,
Service Pack 6
- Windows 2000, Service Pack 2
- Windows 2000, Service Pack 3, Service Pack 4
- Windows XP Gold, Service Pack 1
- Windows XP 64-bit Edition
- Windows XP 64-bit Edition Version 2003
- Windows Server 2003
- Windows Server 2003 64-bit Edition
- Impact: Remote Code Execution
- Version Number: 1.1
MS03-042 - Buffer Overflow in the Windows Troubleshooter
ActiveX Control Could Allow Code Execution (826232)
- Affected Software:
- Windows 2000, Service Pack 2
- Windows 2000, Service Pack 3, Service Pack 4
- Impact: Remote Code Execution
- Version Number: V2.0
Reason for Major Revision, V2.0 October 29, 2003:
=================================================
Microsoft re-issued this bulletin on October 29, 2003 to
advise on the availability of an updated Windows 2000 patch.
This revised patch corrects the Debug Programs
(SeDebugPrivilege)
user right issue that some customers experienced with the
original patch that is discussed in Knowledge Base Article
830846.
This problem is unrelated to the security vulnerability
discussed in this bulletin. Customers who have already applied
the patch are protected against the vulnerability discussed in
this bulletin.
MS03-043 - Buffer Overrun in Messenger Service Could Allow
Code Execution (828035)
- Affected Software:
- Windows NT Workstation 4.0, Service Pack 6a
- Windows NT Server 4.0, Service Pack 6a
- Windows NT Server 4.0, Terminal Server Edition,
Service Pack 6
- Windows 2000, Service Pack 2
- Windows 2000, Service Pack 3, Service Pack 4
- Windows XP Gold, Service Pack 1
- Windows XP 64-bit Edition
- Windows XP 64-bit Edition Version 2003
- Windows Server 2003
- Windows Server 2003 64-bit Edition
- Impact: Remote Code Execution
- Version Number: 2.0
Reason for Major Revision, V2.0 October 29, 2003:
=================================================
Microsoft re-issued this bulletin on October 29, 2003 to
advise on the availability of an updated Windows 2000,
Windows XP, and Windows Server 2003 patch.
This revised patch corrects the Debug Programs
(SeDebugPrivilege)
user right issue that some customers experienced with the
original patch that is discussed in Knowledge Base Article
830846.
This problem is unrelated to the security vulnerability
discussed in this bulletin. Customers who have already applied
the patch are protected against the vulnerability discussed in
this bulletin.
MS03-044 - Buffer Overflow in Windows Help and Support Center
Could lead to System Compromise (825119)
- Affected Software:
- Windows Millennium Edition
- Windows NT Workstation 4.0, Service Pack 6a
- Windows NT Server 4.0, Service Pack 6a
- Windows NT Server 4.0, Terminal Server Edition,
Service Pack 6
- Windows 2000, Service Pack 2
- Windows 2000, Service Pack 3, Service Pack 4
- Windows XP Gold, Service Pack 1
- Windows XP 64-bit Edition
- Windows XP 64-bit Edition Version 2003
- Windows Server 2003
- Windows Server 2003 64-bit Edition
- Impact: Remote Code Execution
- Version Number: 1.1
** Important Security Bulletins
MS03-045 - Buffer Overrun in the ListBox and in the ComboBox
Control Could Allow Code Execution (824141)
- Affected Software:
- Windows NT Workstation 4.0, Service Pack 6a
- Windows NT Server 4.0, Service Pack 6a
- Windows NT Server 4.0, Terminal Server Edition,
Service Pack 6
- Windows 2000, Service Pack 2
- Windows 2000, Service Pack 3, Service Pack 4
- Windows XP Gold, Service Pack 1
- Windows XP 64-bit Edition
- Windows XP 64-bit Edition Version 2003
- Windows Server 2003
- Windows Server 2003 64-bit Edition
- Impact: Remote Code Execution
- Version Number: 3.0
Reason for Major Revision, V3.0 October 29, 2003:
=================================================
Microsoft re-issued this bulletin on October 29, 2003 to
advise on the availability of an updated Windows XP
patch.
This revised patch corrects the Debug Programs
(SeDebugPrivilege)
user right issue that some customers experienced with the
original patch that is discussed in Knowledge Base Article
830846.
This problem is unrelated to the security vulnerability
discussed in this bulletin. Customers who have already applied
the patch are protected against the vulnerability discussed in
this bulletin.
Patch Availability:
===================
Patches are available to fix these vulnerabilities.
For additional information, including Technical Details,
Workarounds, answers to Frequently Asked Questions, and Patch
Deployment Information please read the Microsoft Windows
Security Bulletin Summary for October at:
http://www.microsoft.com/technet/security/bulletin/winoct03.asp
Acknowledgments:
================
Microsoft thanks the following for working with us to protect
customers:
- - Greg Jones of KPMG UK (
http://www.kpmg.co.uk) and
Cesar Cerrudo (
[email protected])
for reporting the issue described in MS03-042.
- - The Last Stage of Delirium Research Group (
http://lsd-pl.net)
for reporting the issue in MS03-043.
- - David Litchfield of Next Generation Security Software Ltd.
(
http://www.nextgenss.com)
for reporting the issue in MS03-044.
- - Brett Moore of Security-Assessment.com
(
http://www.security-assessment.com)
for reporting the issue in MS03-045.
Support:
========
Technical support is available from Microsoft Product Support
Services at 1-866-PC SAFETY (1-866-727-2338). There is no
charge for support calls associated with security patches.
Revisions:
==========
* V1.0 October 15, 2003: Bulletin Created.
* V2.0 October 22, 2003: Updated to include details of the
major revisions in MS03-045.
* V3.0 October 29, 2003: Updated to include details of the
major revisions in MS03-042, MS03-043, MS03-045.
********************************************************************
**** UNQUOTE ******