Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: mercenary
« on: 02. August 2010., 18:47:28 »

The patch is out now...  That was quick!  thanks MS...

http://www.microsoft.com/technet/security/bulletin/ms10-aug.mspx
Posted by: Samker
« on: 22. July 2010., 19:46:06 »

"Fixit"?

Are you kidding me? What kind of fix is disabling all of the task bar and start menu links? I'm surprised that they didn't just suggest you just shut the computer off and wait 'till next week?

Another "surprise" from Microsoft.  :down:
Posted by: Steve_53
« on: 22. July 2010., 18:08:25 »

"Fixit"?

Are you kidding me? What kind of fix is disabling all of the task bar and start menu links? I'm surprised that they didn't just suggest you just shut the computer off and wait 'till next week?
Posted by: Samker
« on: 22. July 2010., 07:13:52 »



Microsoft released a temporary "Fixit" workaround on Tuesday, to protect Windows users against a  critical unpatched Windows Shell vulnerability: http://scforum.info/index.php/topic,4366.0.html

Microsoft issued a security bulletin on Friday to warn customers of a 0-day exploit involving the Windows Shell. The vulnerability is caused due to an error in Windows Shell when parsing shortcuts (.lnk). The flaw can be exploited automatically by executing a program via a specially crafted shortcut. Certain parameters of the .lnk are not properly validated on load, resulting in the vulnerability. Microsoft says it has "seen only limited, targeted attacks on this vulnerability."

On Tuesday the software giant issued a Fixit solution for customers, to help prevent attacks attempting to exploit this vulnerability: http://support.microsoft.com/kb/2286198
Applying the fixit will remove the graphical representation of icons on the Task bar and Start menu bar and replace them with white icons without the graphical representation of the icon.

 For the exploit to be successful it requires that users insert removable media (when AutoPlay is enabled) or browse to the removable media (when AutoPlay is disabled). According to Microsoft's advisory, exploitation may also be possible via network shares and WebDAV shares. Microsoft states that the exploit affects all Windows versions since Windows XP, including Windows 7. However, unsupported versions of Windows 2000 and Windows XP SP2 are also affected by the flaw. Applying Microsoft's Fixit will prevent the vulnerability from being exploited.

Microsoft is still investigating reports of limited, targeted attacks. The company's next patch Tuesday isn't scheduled until August 10 but an out of band security update has not been ruled out.

(NW)
Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising