Armenian Knowledge Base  

Go Back   Armenian Knowledge Base > Technical sections > Operating Systems > Microsoft Windows
Register

Reply
 
LinkBack Thread Tools
Old 16.11.2006, 05:58   #1
★★★★★★★★★★★★★
 
Hrach_Techie's Avatar
 
Join Date: 08 2004
Location: London, UK
Age: 38
Posts: 16,531
Downloads: 8
Uploads: 0
Reputation: 482 | 6
Default Microsoft patches for seven 'critical' flaws

Microsoft Corp. today released six security bulletins detailing patches for nine separate flaws across several of its products as part of its monthly updates for November.

Seven of the flaws were rated "critical" by the company, while the other two were rated "important."

The most dangerous of the vulnerabilities in this month's batch is a flaw in Microsoft's Workstation Service memory, according to security vendor Symantec Corp. The flaw is remotely executable and allows attackers to potentially take complete control of compromised systems to create new user accounts, install programs and view, modify or delete data.

"A successful exploitation of this vulnerability could result in a complete system compromise," Symantec said in its advisory. "This issue can be exploited by remote anonymous attackers on Windows 2000, Windows XP and possibly Windows Server 2003 systems." Symantec added that a wide variety of component technologies and services are affected by this issue.
A remotely exploitable flaw in Microsoft XML Core Services poses another critical threat to enterprises because it has already been publicly disclosed, said Michael Sutton, security evangelist at Web application security firm SPI Dynamics Inc.

As with the Workstation Service flaw, attackers who successfully exploit this vulnerability could take complete administrative control of systems, Microsoft said in its advisory. Enterprises need to make patching this flaw a top priority because public exploits have already started becoming available, Sutton said.


Also important from an enterprise standpoint is the cumulative update Microsoft issued today to fix three separate remotely exploitable vulnerabilities in Internet Explorer, Sutton said. Two of the flaws addressed in the bulletin -- both involving DirectAnimation ActiveX controls -- have already been publicly disclosed, and exploit code for them has begun circulating, he said.
__________________
Мадмазель, Медам, Месье! "Глория" меняет курс и направляется в Кейптаун! Кому это не нравится будет расстрелян на месте. (с)

http://texneg.livejournal.com
Reply With Quote
Old 16.11.2006, 10:44   #2
...overwined...
 
noone's Avatar
 
Join Date: 03 2003
Location: ...tortuga...
Posts: 3,429
Downloads: 3
Uploads: 0
Reputation: 158 | 3
Default

баян...
Reply With Quote
Reply

Thread Tools


На правах рекламы:
реклама

All times are GMT. The time now is 23:47.


Powered by vBulletin® Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.