Well if the security researchers weren't doing this, then we wouldn't be
patching so much... wait that aint true, we still have Adobe.... (tongue
in cheek)

 

Z

 

Edward E. Ziots

CISSP, Network +, Security +

Network Engineer

Lifespan Organization

Email:ezi...@lifespan.org

Cell:401-639-3505

 

From: James Rankin [mailto:kz2...@googlemail.com] 
Sent: Friday, August 20, 2010 8:40 AM
To: NT System Admin Issues
Subject: Re: 200 + Windows applications trivial to exploit bugs

 

Way to make my day....I'd like to disregard this on the basis that I'm
moving jobs, but as I'll be doing more or less exactly the same things
in my new role, there is truly no escape. :-)

On 20 August 2010 13:29, Ziots, Edward <ezi...@lifespan.org> wrote:

http://www.theregister.co.uk/2010/08/20/windows_code_execution_vuln/

HD Moore: Critical bug in 40 different Windows apps | ZDNet:
http://www.zdnet.com/blog/security/hd-moore-critical-bug-in-40-different
-windows-apps/7188?tag=nl.e589

SecurityFocus:
http://www.securityfocus.com/archive/1/513190


Let the patching pain begin... looks like its going to be a seriously
bumpy ride for the next few months as these are vetted, and patches
produced.

Z


Edward E. Ziots
CISSP, Network +, Security +
Network Engineer
Lifespan Organization
Email:ezi...@lifespan.org <mailto:email%3aezi...@lifespan.org> 
Cell:401-639-3505



~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~




-- 
"On two occasions...I have been asked, 'Pray, Mr Babbage, if you put
into the machine wrong figures, will the right answers come out?' I am
not able rightly to apprehend the kind of confusion of ideas that could
provoke such a question."

 

 

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to