Severity: High Summary: These vulnerabilities affect: All current versions of Windows (and related components like XML Core Services) How an attacker exploits them: Multiple vectors of attack, including enticing you to malicious web sites, or into interacting with malicious documents or images. Impact: In the worst case, an attacker can gain complete control of your Windows … [Read more...]
Microsoft Black Tuesday: IE Fix Leads the List of Critical Updates
Today's Microsoft Patch Day will probably be a bit busier than expected. It looks like Microsoft called a last minute audible, releasing seven security bulletins rather than the five I mention in last week's security video. The good news is this last minute play change might help your security team win the game by providing your users with a more protected web … [Read more...]
Microsoft Black Tuesday: Updates Correct .NET and MSXML Flaws
Are you ready for the first Patch Day of 2013? If you run a Microsoft shop (Mac users need not apply this month), get ready as you'll want to install some of today's updates as soon as you can. As promised, Microsoft released seven security bulletins and software updates today, two of which they rate as Critical. The seven updates fix 12 vulnerabilities in products like … [Read more...]
Microsoft Black Tuesday: Patch Critical IE, RDP, and RAP Vulnerabilities
It's that time of the month again... By which I mean, time for Microsoft administrators to download, test, and deploy a bunch of Microsoft security patches. This morning, Microsoft posted their security bulletins for August. You can find a condensed version of their bulletins in the August bulletin summary. By the numbers, today's Patch Day looks similar to the last month, … [Read more...]
Five July Windows Bulletins: MSXML Fix Included
Severity: High Summary: These vulnerabilities affect: All current versions of Windows, as well as optional components like MSXML and MDAC. How an attacker exploits them: Multiple vectors of attack, including enticing your users to web sites with malicious content or getting them to run malicious executables Impact: In the worst case, an attacker can gain complete control … [Read more...]