Ten patches in Microsoft monthly update

stealth_thunder

New Member
Messages
556
Reaction score
0
Points
0
Ten patches in Microsoft monthly update
Thursday, June 16 2005
by Ciaran Buckley in association with


Microsoft has released 10 security patches in its monthly update, three of which are critical, revealing new flaws in the world's most popular operating system.



The maker of Windows also announced seven vulnerabilities in the system. Three vulnerabilities, all of which were classified as "critical," involve Internet Explorer, Windows HTML Help and Windows Server Message Block. Each of the three critical vulnerabilities could "allow an attacker to take complete control of an affected system," according to Microsoft.


Four other vulnerabilities, ranked as "important," affect Windows' Web Client Service, Outlook Web Access for Exchange Server, Microsoft Windows Interactive Training and Outlook Express.


The Redmond-based firm also listed three "moderate" vulnerabilities, which affect Microsoft Agent, the Window's Telnet client and ISA Server 2000.


Patches to repair all of the flaws can be found on the Microsoft website, although users with the automatic update feature activated on their PC are likely to have already installed the repairs.


In May, Microsoft announced plans to offer its own anti-virus and security updates for home computers, called Windows OneCare. The service is to be provided on an annual subscription basis, as is conventional with anti-virus protection services.


The system is currently being tested and is scheduled to be released by the end of the year. Although Microsoft already offers some security features as an integral part of its operating system, it recently bought a number of anti-virus technology companies to help beef up its security offerings.


Microsoft's zeal for repelling hackers is not necessarily shared by its user base, which has been slow to implement its major security patches. A recent survey showed that fewer than one in four North American corporations running Windows XP have bothered to install Microsoft's security upgrade, Service Pack 2 (SP2).


According to a survey carried out by AssetMetrix, which surveyed over 136,000 PCs in 251 enterprises, just 24 percent of corporations had upgraded their PCs with Service Pack 2 by the end of April. This is despite the fact that Microsoft gave April 12 as its cut-off date for exemption from automatic SP2 updates.

website taken:
Code:
http://www.enn.ie/news.html?code=9613455

My views:

Hmm, after 2 weeks of repairing 4 computers, i realised without service pack 2 , all service pack 1 and 1a is totally useless against spyware and malware and other harmful component.

most people does not take care of their computer well enough and cause a hole in there, hence as days gone by the hole gets bigger, when its time to explode that's where user beginner to see side effects on their computer, calling computer technical to go their house to help them solve.

maybe this 10 new patches I would closely view them and post it here when i have the time, these information might help you in future when you are desperate for solutions.

So far most of the computer I solved has a bit of problem, is either they have access to the XXX dialer thingy or Popups all over the places or even malwares websearch bar all over the places.

Without service pack2 , the lass.exe would forever be unsolved to have that 1 min, 30 seconds timer count down to shutdown your pc.

well let's hope more solutions can be given out of microsoft, if only they hear our feeback well enough on wht we need them to do for us
 

saffron02

Banned
Messages
32
Reaction score
0
Points
0
links to exaples of the exploits or demenstrations can be found at(a few off the top of my head MSG me for more or if ur untersted in working on a project together. I make software to exploit or generate code to exploits flaws in OS or Software running on them. i can compromise computers i own, through an internet page using firefox, netscape,internet explorer. I am not a bad guy im a security guy with a big brain and lil words)

http://www.malware.com
http://www.edup.tudelft.nl/~bjwever/menu.html.php
http://www.greyhats.cjb.net/
http://www.securityfocus.com/vulnerabilities
http://umbrella.name/computer/originalvuln/msie/
 
Top