I am sure most of the IT guys supporting Windows out there would have been impacted by the release of the RPC patch, MS08-067: Vulnerability in Server service could allow remote code execution.
This has caused a flurry of activities with the top management in my firm with over night meetings and engineering trying to churn out the fix that can be deployed globally and top honchos deciding the best way to deploy this globally and have the servers rebooted.
Anyway, the patch did not give us major issues in the Windows estate, except some serers complaining of “not enough storage to….”. This seems related to IRPStackSize and you can resolve it by tweaking the reg here -> MSKB285089.
Also due to the number of servers I need to verify if the patch have been applied, I cobbled up a quick and dirty vbs script to verify that this patch is installed on remote machines. Obviously, this can be redeployed to other patches in the future.
mspatchcheck.zip (note: rename doc to zip)