This isn’t an endorsement. If you read my summary of this month’s patches, you’ll recall that there’s one potentially important patch: Microsoft relea
[See the full post at: Single-purpose patch for CVE-2018-8174, the VBScript 0day, available from 0patch]
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Single-purpose patch for CVE-2018-8174, the VBScript 0day, available from 0patch
Home » Forums » Newsletter and Homepage topics » Single-purpose patch for CVE-2018-8174, the VBScript 0day, available from 0patch
- This topic has 19 replies, 14 voices, and was last updated 7 years ago.
Tags: 0patch CVE-2018-8174
AuthorTopicViewing 6 reply threadsAuthorReplies-
Seff
AskWoody PlusMay 15, 2018 at 11:18 am #192503I wouldn’t personally be tempted by an independent patch.
First, I don’t know the supplier of the patch and therefore wouldn’t want to risk them compromising my machine for their own ends.
Second, I would be concerned about future compatibility problems once Microsoft issue their own patch related to this, or indeed all future patches generally.
4 users thanked author for this post.
-
Microfix
AskWoody MVPMay 15, 2018 at 3:17 pm #192550To add to seff’s comment, my initial concerns were:
1. How would these fixes be undone to revert to default? no method available as a failsafe should something go wrong..other than system restore/ image/ registry backup etc..2. How do these 3rd party patches affect the system integrity? sfc /scannow (verifyonly..etc)
3. When an MS patch IS released to fix the issue, whos to say that the system couldn’t be broken due to the 3rd party patch already being on the system. (no method of removal)Edit: does have an installer/ uninstaller
There’s just too many unknowns for people without VM’s and I’d happily advise those without a Windows VM not to use 3rd party patches, not everyone is a technical expert.
Wait…MS will fix it (fingers crossed, based on last 5 months anyway)
Windows - commercial by definition and now function... -
ky41083
AskWoody LoungerMay 16, 2018 at 12:44 pm #1927102. How do these 3rd party patches affect the system integrity? sfc /scannow (verifyonly..etc)
0patch does not in any way effect filesystem integrity. It is strictly a memory patcher, i.e. all patching happens in RAM only, on demand (when the code to be patched is called into RAM). This is why patching & unpatching with 0patch is more or less instant, and extremely safe.
Edit: does have an installer/ uninstaller
There’s just too many unknowns for people without VM’s and I’d happily advise those without a Windows VM not to use 3rd party patches, not everyone is a technical expert. Wait…MS will fix it (fingers crossed, based on last 5 months anyway)
Normally I would not recommend 3rd party patches either, but 0patch is an extremely well structured, organized, and tested solution. Honestly, it’s exactly how every vendor should quickly roll out patches for in the wild exploits. Instant apply / unapply, in memory only, nothing is ever permanently modified, I could go on all day…
Patches from other sources, especially in persistent “modify on disk data” form, I would avoid like the plague.
2 users thanked author for this post.
-
Microfix
AskWoody MVPMay 16, 2018 at 1:21 pm #192724all patching happens in RAM only, on demand (when the code to be patched is called into RAM). This is why patching & unpatching with 0patch is more or less instant, and extremely safe.
Problem I have with this is, Spectre/ Spectre v2 and possible sideband violations/ exploitations. I’ve never needed or used 3rd party OS patches to be safe online (trusting my instincts). Thanks for the explanation and hope others can do what they think is right.
Honestly, it’s exactly how every vendor should quickly roll out patches for in the wild exploits. Instant apply / unapply, in memory only, nothing is ever permanently modified, I could go on all day…
I could not agree more
Windows - commercial by definition and now function...1 user thanked author for this post.
-
-
-
-
anonymous
Guest -
PKCano
ManagerMay 15, 2018 at 12:20 pm #192510Your Windows (any version) computer does!!
Even if you do not use it for your browser, it is integrated into and used by the Windows Operating System. If you leave it unpatched, you are leaving your computer unpatched and not secure..
-
dononline
AskWoody Lounger
-
-
gborn
AskWoody_MVPMay 15, 2018 at 1:02 pm #1925170patch is long in business and provided a couple of useful patches in the past (I’ve blogged several times about their solutions). If you are facing the situation that you can leave your machine vulnerable or closing the vulnerability but haven’t a network, then 0patch can be a solution – imho.
Ex Microsoft Windows (Insider) MVP, Microsoft Answers Community Moderator, Blogger, Book author
https://www.borncity.com/win/
-
Barry
AskWoody Lounger -
Cascadian
AskWoody LoungerMay 15, 2018 at 4:09 pm #192559I am very appreciative for your efforts to give information that is available, even when it does not quite meet the high standard of an endorsement. I think you did everything you could in plain language to say here is an available option.
I also liked the
impliedinferred by me idea that if it can be patched, it could have been patched by the responsible owner of my licensed copy operating system. Thanks for dispersing the information to us.4 users thanked author for this post.
-
Bob99
AskWoody MVPMay 15, 2018 at 9:23 pm #192595On one of the other threads here on Askwoody, I found a link to an MS blog page that describes (from 2017, I believe) how to disable VBscript within IE. It’s simply a matter of changing two registry entries or using GPEdit to do the same, depending on your flavor of Windows.
BTW, the thread was from two or three weeks ago. The link leads to a Microsoft blog page, wherein the blogger (an employee from MS no less!) describes the “new feature” wherein one can disable VBScript within Win 10 and below. For some editions, you use regedit. For others, you use GPEdit.
I run Win7Pro 64 bit SP1, and had to use the regedit method because the entry didn’t exist when I went to GPEdit.
Can one of the MVP’s dig up the post and copy/paste the link here on this thread?
I would think that disabling VBScript within IE would be a good workaround until MS stops breaking folks’ networking with 4103718 later this month.
-
RDRguy
AskWoody LoungerMay 16, 2018 at 1:20 am #192615All, not sure exactly what or where it was posted in 2017 but how about this link at Microsoft support:
Interesting that it was last updated on Apr 20, 2018
Another Microsoft link describing new group policy settings for IE11:
This one’s dated 7/27/2017
Win7 - PRO & Ultimate, x64 & x86
Win8.1 - PRO, x64 & x86
Groups A, B & ABS -
anonymous
GuestMay 16, 2018 at 1:39 am #192614@Bob99 Is https://support.microsoft.com/en-us/help/4012494/option-to-disable-vbscript-execution-in-internet-explorer-for-internet what you were referrering to?
-
anonymous
GuestMay 16, 2018 at 8:44 am #192653@bob99 posting anonymously here. Yes, both you and @RDRguy just above you posted the link I was referring to. Thanks for digging it up! It just might help someone reduce their stress level by disabling VBScript within IE and being able to wait for MS to fix the faulty patch instead of worrying about getting a malware infection because they can’t go without networking.
However, before we go too far down this road, the following question bears asking:
@abbodi86 , @CH100 , @MrBrian , is the above method of disabling VBScript within IE a valid workaround for the VBScript zero day vulnerability that’s allegedly fixed by this month’s faulty security only patches and security rollups?
-
-
-
columbia2011
AskWoody Lounger -
anonymous
GuestMay 16, 2018 at 8:34 am #192648It is included in this month’s security rollup update. However, on several machines, installing the update removes network card drivers without reinstalling them successfully thereby rendering them unable to reach the Internet or any network for communications and for re-downloading fixes for the error.
This month’s security only update also exhibits the same behavior of removing and not reinstalling the network card driver(s) successfully.
At the moment, I don’t recall if this unwanted behavior is limited to Windows 7 machines or if it’s also present in this month’s updates for Windows 8/8.1 and Windows 10.
1 user thanked author for this post.
-
Viewing 6 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Android 15 and IPV6
by
Win7and10
1 hour, 24 minutes ago -
KB5058405 might fail to install with recovery error 0xc0000098 in ACPI.sys
by
Susan Bradley
7 hours, 34 minutes ago -
T-Mobile’s T-Life App has a “Screen Recording Tool” Turned on
by
Alex5723
10 hours, 16 minutes ago -
Windows 11 Insider Preview Build 26100.4202 (24H2) released to Release Preview
by
joep517
4 hours, 51 minutes ago -
Windows Update orchestration platform to update all software
by
Alex5723
17 hours, 35 minutes ago -
May preview updates
by
Susan Bradley
4 hours, 59 minutes ago -
Microsoft releases KB5061977 Windows 11 24H2, Server 2025 emergency out of band
by
Alex5723
7 hours, 10 minutes ago -
Just got this pop-up page while browsing
by
Alex5723
9 hours, 47 minutes ago -
KB5058379 / KB 5061768 Failures
by
crown
6 hours, 51 minutes ago -
Windows 10 23H2 Good to Update to ?
by
jkitc
4 hours, 1 minute ago -
At last – installation of 24H2
by
Botswana12
1 day, 9 hours ago -
MS-DEFCON 4: As good as it gets
by
Susan Bradley
4 hours, 12 minutes ago -
RyTuneX optimize Windows 10/11 tool
by
Alex5723
1 day, 21 hours ago -
Can I just update from Win11 22H2 to 23H2?
by
Dave Easley
1 day, 14 hours ago -
Limited account permission error related to Windows Update
by
gtd12345
2 days, 10 hours ago -
Another test post
by
gtd12345
2 days, 10 hours ago -
Connect to someone else computer
by
wadeer
2 days, 5 hours ago -
Limit on User names?
by
CWBillow
2 days, 8 hours ago -
Choose the right apps for traveling
by
Peter Deegan
1 day, 22 hours ago -
BitLocker rears its head
by
Susan Bradley
1 day, 6 hours ago -
Who are you? (2025 edition)
by
Will Fastie
1 day, 5 hours ago -
AskWoody at the computer museum, round two
by
Will Fastie
2 days ago -
A smarter, simpler Firefox address bar
by
Alex5723
2 days, 21 hours ago -
Woody
by
Scott
3 days, 6 hours ago -
24H2 has suppressed my favoured spider
by
Davidhs
1 day, 5 hours ago -
GeForce RTX 5060 in certain motherboards could experience blank screens
by
Alex5723
3 days, 20 hours ago -
MS Office 365 Home on MAC
by
MickIver
3 days, 14 hours ago -
Google’s Veo3 video generator. Before you ask: yes, everything is AI here
by
Alex5723
4 days, 10 hours ago -
Flash Drive Eject Error for Still In Use
by
J9438
1 day, 5 hours ago -
Windows 11 Insider Preview build 27863 released to Canary
by
joep517
5 days, 5 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.