« 
Critique of NIST Guide to... | 
You’ve got 2 weeks to pat... »
                        
                            Commentary and analysis posted for todays 12 MS security bulletins
                        
                            Tue, 13 Jun 2006 15:30:04 GMT
                        
                            
    Microsoft finally released the patch for the very public Word 2000/2002/2003 vulnerability I began blogging about several weeks ago. (http://www.ultimatewindowssecurity.com/blog) Until now your only real protection has been comprehensive and up-to-date anti-malware coverage. I recommend deploying this update to all systems with a vulnerable version of Word installed as soon as possible since this is a very public vulnerability already being exploited in the wild.
    In addition Microsoft released 11 other security bulletins covering a wide range of vulnerabilities. One bulletin (MS06-021) covers 8 different vulnerabilities in Internet Explorer on all versions of Windows and I recommend installing it on all computers used to access the web. 2 bulletins deal with vulnerabilities in image file formats (ART and WMF) which you should like wise patch on workstations. Out of the 12, only about 4 bulletins deserve particular consideration for servers.
    See http://www.ultimatewindowssecurity.com/curtain/bulletins/default.aspx for full details.
  
                         
                        
                            
                            
                                                       
                            
                        
                        
                                
                                
                        
                            
                            email this
                            •
                            
                            digg
                            •
                            
                            reddit
                            •
                            
                            dzone
                            
                            
                            
                            comments (0)
                            •
                            references (0)
                            
                            
                        
                        
                            Related:
                            Auditing Privileged Operations and Mailbox Access in Office 365 Exchange Online
5 Indicators of Endpoint Evil
Live with Dell at RSA 2015
Severing the Horizontal Kill Chain:  The Role of Micro-Segmentation in  Your Virtualization Infrastructure 
                        
                    
                    Comments disabled
powered by Bloget™