Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43441
  • Total Topics: 16533
  • Online today: 3258
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 1
Guests: 3216
Total: 3217









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 06. November 2013., 18:02:39 »



If you use aged versions of Windows or Microsoft Office, be on the lookout; Redmond issued a security warning today.

In their latest Security Advisory report, Microsoft states that they are investigating reports of vulnerabilities in multiple versions of Windows Vista, Windows Server 2008 and Microsoft Office. They’re also aware of “targeted attacks” that try to take advantage of a security hole in Office.

Here’s how Microsoft describes the vulnerability:

“[It's] a remote code execution vulnerability that exists in the way affected components handle specially crafted TIFF images. An attacker could exploit this vulnerability by convincing a user to preview or open a specially crafted email message, open a specially crafted file, or browse specially crafted web content. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.”

The report indicates that a hacker who attacks a PC using this vulnerability could gain the same rights to the machine that the user has, even administrative rights. However, the hacker would also be bound do whatever restrictions the user is limited to in the event that they do not have administrative rights access. Hackers could also attack a machine with this vulnerability if a user clicked an affected link in an email or instant message, or opened a tainted email attachment.

Microsoft says that they are working with partners in this investigation and could choose to address the issue by releasing an update. The update may fall in line with Microsoft’s monthly update schedule, though the report states that the patch could be released “out-of-cycle.” Which route Microsoft goes depends on “customer needs.”

Click here to see the report, and a complete list of the affected Microsoft software:
http://technet.microsoft.com/en-us/security/advisory/2896666

(DT)

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023