![]() |
If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
Thread Tools | Display Modes |
|
#1
|
|||
|
|||
![]()
from
http://grc.com/sn/notes-020.htm Official WMF Vulnerability update from Microsoft Available NOW! http://update.microsoft.com/ Ilfak Guilfanov on "Security Now" #21 ! Ilfak Guilfanov, developer of "The Patch" for temporarily protecting Windows users from exploitation of the WMF vulnerability (while we were waiting for Microsoft's official security update) joined Leo and me to discuss this first serious Windows vulnerability of the New Year. If you wish to be automatically notified whenever we post a new Security Now! audio program, you may use the button below to register an eMail address with the trustworthy "Change Detection" service. You will be able to easily remove yourself at any time: (it's private by ChangeDetection) Microsoft is not fixing Windows 98/ME *.*.*. so GRC will. Microsoft has now "reclassified" the WMF vulnerability in Windows 95, 98, and ME as non-critical (instead of just fixing it!). This means that it will probably NOT be updated and patched to eliminate the WMF handling vulnerability that those older versions of Windows apparently still have. (This vulnerability still needs to be confirmed.) So, if Microsoft does not produce an update to repair those older versions of Windows, GRC will make one available. Microsoft's official security update does the same thing as Ilfak's patch Users of Ilfak's temporary patch ‹ which is no longer needed in the wake of Microsoft's early released official update ‹ may rest easily. Ilfak reports that he checked-out Microsoft's new replacement GDI32.DLL*.*.*. and it permanently does the same thing as his temporary patch: It simply revokes support for the age-old WMF "SETABORT" command from metafile processing. |
#2
|
|||
|
|||
![]()
On Fri, 06 Jan 2006 18:50:42 GMT, john smith wrote in
:: Official WMF Vulnerability update from Microsoft Available NOW! Read all about it! http://www.microsoft.com/technet/sec.../ms06-001.mspx |
Thread Tools | |
Display Modes | |
|
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Attention WINDOWS Users... Exploit Update | john smith | Piloting | 7 | January 3rd 06 01:06 PM |
Run up for plug clearing | Roger Long | Piloting | 78 | October 18th 04 03:39 AM |
Real World Specs for FS 2004 | Paul H. | Simulators | 16 | August 18th 03 09:25 AM |
Latest update | DHeitm8612 | General Aviation | 0 | August 1st 03 02:54 AM |
Notebook PC Configuration for MSFS2004 | Paul H. | Simulators | 0 | July 18th 03 11:21 PM |