You install this security update on a computer that has a third-party software solution installed. The software solution is based on Microsoft Visual Basic for Applications (VBA). The software solution creates an instance of the control directly through Microsoft Office. In this scenario, the control may not load in your solution.
To resolve this issue, delete the cached versions of the control type libraries (extender files) on the client computer. To do this, search your hard disk for files that have the ".exd" file name extension and delete all the .exd files that you find. These .exd files will be re-created automatically when you use the new controls the next time that you use VBA. These extender files will be under the user's profile and may also be in other locations, such as the following:
C:\documents and settings\username\Application Data\Microsoft\Forms
C:\documents and settings\username\AppData\Local\Temp\VBE
Prerequisites to apply this security update
To install this security update, you must have 2007 Microsoft Office Suite Service Pack 2 installed on the computer.
For more information about how to obtain the service pack, click the following article number to view the article in the Microsoft Knowledge Base:
949585 How to obtain the latest service pack for the 2007 Office suite
You do not have to restart the computer after you install this security update.
Security update replacement information
This security update does not replace a previously released security update.
You cannot remove this security update.
The English (United States) version of this security update has the file attributes (or later file attributes) that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time item in Control Panel.
For 2007 Microsoft Office Suite Service Pack 3
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service dos