Can't wait to see the wide ranging list of apps.

You know, unless all the vendors patch at the very same time, or unless
Microsoft (or someone else) provides an extra mitigation at the OS level, as
soon a few of these are patched, the malware writers will figure out how to
exploit it for at least some of the applications, and it's going to be one
batch of chaos.


*ASB *(My XeeSM Profile) <http://XeeSM.com/AndrewBaker>
*Exploiting Technology for Business Advantage...*
* *
Signature powered by WiseStamp <http://www.wisestamp.com/email-install>


On Fri, Aug 20, 2010 at 8:29 AM, Ziots, Edward <ezi...@lifespan.org> wrote:

> http://www.theregister.co.uk/2010/08/20/windows_code_execution_vuln/
>
> HD Moore: Critical bug in 40 different Windows apps | ZDNet:
>
> http://www.zdnet.com/blog/security/hd-moore-critical-bug-in-40-different-windows-apps/7188?tag=nl.e589
>
> SecurityFocus:
> http://www.securityfocus.com/archive/1/513190
>
>
> Let the patching pain begin… looks like its going to be a seriously bumpy
> ride for the next few months as these are vetted, and patches produced.
>
> Z
>
>
> Edward E. Ziots
> CISSP, Network +, Security +
> Network Engineer
> Lifespan Organization
> Email:ezi...@lifespan.org <email%3aezi...@lifespan.org>
> Cell:401-639-3505
>
>
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to