Help and Knowledge

Security Updates

Security Updates

Patch the Sandworm Vulnerability

October 2014

Your Tagadab Windows server might be vulnerable to a bug called Sandworm. The vulnerability impacts desktop versions of Windows and all server versions of Windows from 2003 to 2012, and allows an attacker to remotely execute arbitrary code. Microsoft have now released the security update to remove the vulnerability.

This tutorial will guide you through the steps to manually install Windows updates. Once you complete this installation, your server will have the necessary patch to ensure your system is not vulnerable to Sandworm.

If you have any questions or need help checking your server, please e-mail us at support@tagadab.com or call us at 020 3697 5537 Monday through Friday between 8am - 6pm GMT.

Sandworm Vulnerability Patch Installation

If you have opted to install Windows updates automatically then the Sandworm patch will have been installed depending on the schedule you have chosen. Microsoft released the vulnerability patch late on 14th October 2014 and the specific security update is called KB300061. We recommend installing any Windows updates labelled as important.

To check how your schedule is set and manually install updates outside of the normal schedule or install a specific update then follow the steps below. Please note there may be some small differences between our guide and your own version of Windows, but overall they reflect the steps to check the schedule and install Windows updates manually.

Windows Server 2003:

  1. Click on the ‘Start Menu’
  2. Select ‘All Programs’
  3. Select ‘Windows Update’
  4. Select the ‘Custom’ option to check for all the latest available updates
  5. Click on ‘Select by Type’ from the left-hand side of the screen
  6. Click on ‘High Priority’ from the left-hand side of the screen
  7. Select ‘Review and install updates’ at the top
  8. Make sure the box for the update you wish to install is ticked or simply choose to install all available updates
  9. Click ‘Install updates’

Upon completion, you will be prompted to restart the server for the updates to take effect. Once you’ve done that, your server will no longer be vulnerable to Sandworm.

You will need to follow these steps for each of the Windows Server 2003 you have with Tagadab.

Windows Server 2008:

  1. Click on the ‘Start’ menu
  2. Select ‘All Programs’
  3. Select ‘Windows Update’
  4. Click ‘Check for updates’ from the left-hand side of the screen
  5. Then click ‘Change settings’ from the left-hand side of the screen
  6. From the ‘Important updates’ dropdown, select ‘Download updates but let me choose whether to install them’
  7. Click on ‘Updates are available’
  8. Make sure the box for the update you wish to install is ticked or simply choose to install all available updates
  9. Click ‘Install updates’

Upon completion, you will be prompted to restart the server for the updates to take effect. Once you’ve done that, your server will no longer be vulnerable to Sandworm.

You will need to follow these steps for each of the Windows Server 2008 you have with Tagadab.

Windows Server 2012:

  1. Click on the ‘Start’ menu
  2. Open the Control Panel
  3. Select ‘System and Security’ (this will only appear if the control panel is in ‘Category’ view but if it isn’t then ‘Windows Update’ will be one of the items listed under ‘All Control Panel Items’)
  4. Click on ‘Windows Update’
  5. Click ‘Check for updates’ from the left-hand side of the screen
  6. From the ‘Important update’s’ dropdown, select ‘Download updates but let me choose whether to install them’
  7. Click on ‘Updates are available’
  8. Make sure the box for the update you wish to install is ticked or simply choose to install all available updates
  9. Click ‘Install updates’

Upon completion, you will be prompted to restart the server for the updates to take effect. Once you’ve done that, your server will no longer be vulnerable to Sandworm.

You will need to follow these steps for each of the Windows Server 2012 you have with Tagadab.