Daniel Petri is a world-known IT professional, technical trainer and creator of one of the world's largest IT knowledge bases – www.petri.com. Daniel consults to leading global Fortune 1000 companies in Microsoft IT Infrastructure and Engineering strategies. For his contribution to the IT Pro community Daniel has received the Microsoft Most Valuable Professional (MVP) award for the 14th time. Daniel's professional certifications include Microsoft Certified Technology Specialist, Microsoft Certified Systems Engineer, Microsoft Certified System Administrator and Microsoft Certified Trainer. While working for Microsoft, Daniel serves as a Senior Premier Field Engineer (PFE) specializing in Windows Server OS and Active Directory. Daniel now works for ObserveIT, makers of the Insider Threat Detection software, where he holds the role of Senior Solutions Architect, where he manages large deployment projects and partner and customer training programs. In his spare time, Daniel rides a 1200cc 2015 model Ducati Multistrada 1200S bike and manages the Israeli Bikers forum. You can contact Daniel at daniel-at-petri-dot-co-dot-il.

Windows 98 Second Edition (SE) Patches

Windows 98 Second Edition (SE) Patches

Note: Microsoft has stopped supporting Windows 98 and Windows NT 4.0 Workstation as of June 30, 2003.

Required Patches

Windows 98 SE requires the following security-related patches:

Make sure you read Internet Explorer 5.X and 6.0 Patches and Internet Explorer 6.0 SP1 Patches before you go on.

August 2005

MS05-040 : Vulnerability in Telephony Service Could Allow Remote Code Execution (893756)

July 2005

MS05-036 : Vulnerability in Microsoft Color Management Module Could Allow Remote Code Execution (901214)

June 2005

MS05-032 : Vulnerability in Microsoft Agent Could Allow Spoofing (890046)

MS05-030 : Cumulative Security Update in Outlook Express (897715)

MS05-026 : Vulnerability in HTML Help Could Allow Remote Code Execution (896358)

May 2005

MS05-024 : Vulnerability in Web View Could Allow Remote Code Execution (894320)

April 2005

MS05-019 : Vulnerabilities in TCP/IP Could Allow Remote Code Execution and Denial of Service (893066)

MS05-018 : Vulnerability in Windows Kernel Could Allow Elevation of Privilege and Denial of Service (890859)

MS05-017 : Vulnerability in Message Queuing Could Allow Code Execution (892944)

MS05-016 : Vulnerability in Windows Shell that Could Allow Remote Code Execution (893086)

February 2005

MS05-015 : Vulnerability in Hyperlink Object Library Could Allow Remote Code Execution (888113)

MS05-013 : Vulnerability in the DHTML Editing ActiveX Control could allow code execution (891781)

MS05-012 : Vulnerability in OLE and COM Could Allow Remote Code Execution (873333)

MS05-009 : Vulnerability in PNG Processing Could Lead to Buffer Overrun (890261)

January 2005

MS05-002 : Vulnerability in Cursor and Icon Format Handling Could Allow Remote Code Execution (891711)

MS05-001 : Vulnerability in HTML Help Could Allow Code Execution (890175)

December 2004

MS04-041 : Vulnerability in WordPad Could Allow Code Execution (885836)

October 2004

MS04-037 : Vulnerability in Windows Shell Could Allow Remote Code Execution (841356)

MS04-032 : Security Update for Microsoft Windows (840987)

MS04-031 : Vulnerability in NetDDE Could Allow Remote Code Execution (841533)

July 2004

MS04-024 : Vulnerability in Windows Shell Could Allow Remote Code Execution (839645)

MS04-023 : Vulnerability in HTML Help Could Allow Code Execution (840315)

July 2003

MS03-030 : Unchecked Buffer in DirectX Could Enable System Compromise (819696)

MS03-023 : Buffer Overrun In HTML Converter Could Allow Code Execution (823559)

June 2003

MS03-020 : Cumulative Patch for Internet Explorer (818529)

April 2003

MS03-011 : Flaw in Microsoft VM Could Enable System Compromise (816093)

March 2003

MS03-008 : Flaw in Windows Script Engine could allow code execution (814078)

November 2002

MS02-065 : Buffer Overrun in Microsoft Data Access Components Could Lead to Code Execution (329414)

MS02-050 : Certificate Validation Flaw Could Enable Identity Spoofing (328115) (Reposted)

October 2002

MS02-055 : Unchecked Buffer in Windows Help Facility Could Enable Code Execution (323255)

MS02-054 : Unchecked Buffer in File Decompression Functions Could Lead to Code Execution (329048)

September 2002

MS02-053 : Buffer Overrun in SmartHTML Interpreter Could Allow Code Execution (324096)

August 2002

MS02-048 : Flaw in Certificate Enrollment Control Could Allow Deletion of Digital Certificates (323172)

March 2002

MS02-014 : Unchecked Buffer in Windows Shell Could Lead to Code Execution

MS02-013 : 04 March 2002 Cumulative VM Update

February 2002

MS02-006 : Unchecked Buffer in SNMP Service Could Enable Arbitrary Code to be Run

December 2001

MS01-059 : Unchecked Buffer in Universal Plug and Play Can Lead to System Compromise

November 2001

MS01-054 : Invalid Universal Plug and Play Request Can Disrupt System Operation

April 2001

MS01-022 : WebDAV Service Provider Can Allow Scripts to Levy Requests as User

March 2001

MS01-019 : Passwords for Compressed Folders are Recoverable

MS01-017 : Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard

November 2000

MS00-091 : Incomplete TCP/IP Packet Vulnerability

October 2000

MS00-079 : HyperTerminal Buffer Overflow Vulnerability

MS00-074 : WebTV for Windows Denial of Service Vulnerability

MS00-073 : Malformed IPX NMPI Packet Vulnerability

MS00-072 : Share Level Password Vulnerability

August 2000

MS00-059 : Java VM Applet Vulnerability

MS00-054 : Malformed IPX Ping Packet Vulnerability

May 2000

MS00-029 : IP Fragment Reassembly Vulnerability

March 2000

MS00-017 : DOS Device in Path Name Vulnerability

February 2000

MS00-011 : VM File Reading Vulnerability

January 2000

MS00-005 : Malformed RTF Control Word Vulnerability

September 1999

MS99-033 : Malformed Telnet Argument Vulnerability

MS99-034 : Fragmented IGMP Packet Vulnerability

August 1998

MS98-010 : Information on the Back Orifice Program

Related Topics:

  • Windows Client OS
  • BECOME A PETRI MEMBER:

    Don't have a login but want to join the conversation? Sign up for a Petri Account

    Register