Microsoft yesterday re-patched Internet Explorer, the third time it's been forced to repair one of the updates from its largest-ever bug fix, which was delivered on Oct. 13.
Monday's fix targeted MS09-054 , the update that patched four vulnerabilities, all "critical," in Internet Explorer (IE). According to Christopher Budd, a spokesman for the Microsoft Security Response Center (MSRC), the follow-on hotfix patches Web page display problems introduced by the update. Budd downplayed the severity of the problems, saying that the number of users affected was "limited."
The new problems can crop up in any still-supported edition of IE, including IE 5.01, IE6, IE7 and the newest version, IE8, on all Windows operating systems, including Windows 7.
The troubles are serious enough to prompt Microsoft to push the re-patch to all users. "We plan to release this update through the same broad release channels as the original security update, MS09-054," Budd said in an entry to the MSRC blog yesterday. "Customers will see [the re-patch] offered by default through Windows Update, Microsoft Update and Automatic Updates."
Computerworld confirmed that Windows XP, Vista and Windows 7 systems that had been fully patched last month were offered Monday's update through Windows Update.
Monday's re-patch was the third correction related to Oct. 13's massive security update , which set records for both the number of separate bulletins (13) and the number of vulnerabilities quashed (34).
The company also revised an August update, MS09-043 , last week to correct a patch-detection error that may have left some corporate users who receive updates via Windows Server Update Services (WSUS) unpatched.
It's not unusual for Microsoft to re-release security updates. In June 2008, for example, the company admitted a patch intended to fix a problem in Windows XP's implementation of Bluetooth didn't work. Microsoft blamed human error for the snafu.
The update for MS09-054 can be downloaded from Microsoft's site, or retrieved using Windows Update or WSUS.