Word 0day, Cisco DoS, and Bricked Androids My weekly InfoSec summary arrives bit late this time due to business travel. Last week, I spoke at Watchcom's Paranoia conference in Oslo Norway, so I couldn't post my security news summary until the weekend. Nonetheless, why not start your week off by quickly catching up on last week's news. This week's episode includes a quick … [Read more...]
Multiple Word Memory Corruptions Make for Malicious Documents
Severity: High Summary: These vulnerabilities affect: Microsoft Office related products, including Word and Outlook How an attacker exploits them: Typically by enticing users to open or interact with maliciously crafted Office documents or email Impact: In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the appropriate … [Read more...]
Trio of Office Updates Fix SharePoint Flaw & ASLR Bypass
Severity: High Summary: These vulnerabilities affect: Microsoft Office and related products, including SharePoint How an attacker exploits them: Varies. Typically by enticing users to visit malicious web content or open Office documents Impact: Many. In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the appropriate … [Read more...]
Office Updates Mend Word and Outlook Vulnerabilities
Severity: High Summary: These vulnerabilities affect: Microsoft Office related products, including Word and Outlook How an attacker exploits them: Typically by enticing users to open or interact with maliciously crafted Office documents or email Impact: In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the appropriate … [Read more...]
Sharepoint, Excel, and Word Security Updates
Severity: High Summary: These vulnerabilities affect: Microsoft Office related products, including SharePoint, Word, and Excel How an attacker exploits them: Varies. Typically by enticing users to open or interact with maliciously crafted Office documents Impact: Many. In the worst case, an attacker can gain complete control of your Windows computer What to do: Install the … [Read more...]