Severity: High 9 August, 2011 Summary: This vulnerability affects: The DNS service that ships with the Server versions of Windows How an attacker exploits it: By sending specially crafted DNS queries Impact: In the worst case, an attacker gains complete control of your DNS server What to do: Deploy the appropriate Windows update immediately, or let Windows Automatic … [Read more...]
Cumulative Patch Corrects Drive-by Download Flaws in IE9
Severity: High 9 August, 2011 Summary: This vulnerability affects: All current versions of Internet Explorer, including IE9 How an attacker exploits it: In most cases, by enticing one of your users to visit a malicious web page Impact: Various, in the worst case an attacker can execute code on your user's computer, gaining complete control of it What to do: Deploy the … [Read more...]
Evil Visio 2003 Documents Could Install Malware
Severity: Medium 12 July, 2011 Summary: This vulnerability affects: Visio 2003, only How an attacker exploits it: By enticing one of your users into opening a maliciously crafted Visio document Impact: An attacker can execute code, potentially gaining complete control of your users' computers What to do: Deploy the Visio 2003 patch as soon as possible, or let Windows … [Read more...]
Three Windows Updates: Critical Wireless Bluetooth Attack
Also, Flaws in CSRSS and Kernel-Mode Drivers Severity: High 12 July, 2011 Summary: These vulnerabilities affect: All current versions of Windows and components that ship with it How an attacker exploits them: Multiple vectors of attack, including sending specially crafted wireless Bluetooth traffic Impact: An attacker can gain complete control of your Windows computer What … [Read more...]
Apple OSX: Take Your Leopards In For a Checkup
Summary: These vulnerabilities affect: All current versions of OS X 10.5.x (Leopard) and OS X 10.6.x (Snow Leopard) How an attacker exploits them: Multiple vectors of attack, including enticing your users to visit a malicious web site, or into downloading and viewing various documents or images Impact: Various results; in the worst case, an attacker executes code on your … [Read more...]