Jump to content

Kb number to MS number


Flashz
 Share

Recommended Posts

In my environment, when we patch servers, we apply selective MS patches; and i've found it always troublesome to match it against the MS number to find out if all the required patches are in.

The script attached will use the .ini file and do the conversion.

I know there're better ways to do it, but I just whipped up this one real quick so I can start querying my servers. Currently I'm working on it to change the IniReadSection to IniRead to make the ini file easier to update. I'm also planning to use arrays so when the MS numbers are displayed, they'll be in ascending order.

Let me know what you guys think. Not sure if there's already such a script posted.

Save the part below as KBLib.ini in the Script directory to test.

CODE

[KB890175]

MS05-001=Remote Code Execution-HTML Help and Active X-Internet Explorer 6

[KB891711]

MS05-002=Remote Code Execution-Cursor and Icon Format-Internet Explorer

[KB871250]

MS05-003=Indexing Service-IIS Server 5.0 and above

[KB887981]

MS05-006=Remote Code Execution-SharePoint Services

[KB890047]

MS05-008=Remote Code Execution-Drag and Drop Vulnerability

[KB890261]

MS05-009=Remote Code Execution-PNG and Media Player

[KB885834]

MS05-010=Remote Code Execution-License Logging Service

[KB885250]

MS05-011=Remote Code Execution-Server Message Block

[KB873333]

MS05-012=Remote Code Execution-OLE and COM Component

[KB891781]

MS05-013=Remote Code Execution-Active X Component-DHTML

[KB867282]

MS05-014=Cummulative Patch-IE Component

[KB888113]

MS05-015=Remote Code Execution-Hyperlink Object Library

[KB893086]

MS05-016=Code Execution-Windows Shell

[KB892944]

MS05-017=Code Execution-Message Queue

[KB890859]

MS05-018=Windows Kernel-Elevation of Privelege-DoS

[KB893066]

MS05-019=Denial of Service-TCP Packet-Malformed Packets

[KB890923]

MS05-020=Cummulative Patch-IE Component

[KB894320]

MS05-024=Remote Code Execution-Web View

[KB883939]

MS05-025=Remote Code Execution-Cumulative IE Update

[KB896358]

MS05-026=Remote Code Execution-HTML Help

[KB896422]

MS05-027=Remote Code Execution-SMB Protocol

[KB896426]

MS05-028=Remote Code Execution-Web Client Service

[KB890046]

MS05-032=Spoofing-Microsoft Agent

[KB899753]

MS05-034=Elevation of Privilege-ISA 2000

[KB901214]

MS05-036=Remote Code Execution- Windows Color management module

[KB903235]

MS05-037=Remote Code Execution- - Windows - Jview Profiler

[KB896727]

MS05-038=Remote Code Execution - IE Cummulative Patch-Remote code execution

[KB899588]

MS05-039=Remote Code Execution - Plug and Play-Elevated to Worm:Win32/Zotob.A

[KB893756]

MS05-040=Remote Code Execution - Telephony Service

[KB899591]

MS05-041=Denial of Service - Remote Desktop Protocol

[KB899587]

MS05-042=Denial of Service - Kerberos Key

[KB896423]

MS05-043=Remote Code Execution - Printer Spooler

[KB905495]

MS05-044=File Location Tampering - Windows FTP Client

[KB905414]

MS05-045=Denial of Service - Network Connection Manager

[KB899589]

MS05-046=Remote Code Execution - Client Service for Netware

KB2MS.au3

Edited by Flashz
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...