Microsoft bumper patch batch on Tuesday failed to address not just one but two zero-day vulnerabilities, each of which has become the scope of targeted attacks. Tuesday brought eight bulletins from Microsoft addressing 28 vulnerabilities. As previously reported, the batch fails to address a new Internet Explorer vulnerability …
Your failboat has arrived.
Good way to get people to move to Vista or Linux though. Make all the old Windows security risks again.
They *have* released a patch for the majority already? (SP3 of course!)
Oh for heavens sake!
"In addition, an unpatched vulnerability in WordPad has also become fodder for malicious hackers. The issue affects the Wordpad text converter for Word 97."
Look I don't want to get all on the MS bashing train but FFS! It's fecking text editor with a few tweaks for colour and font, HTF does it give "malicious hackers" something to work on? WTF is in that O/S? Oh yes, sorry we can't tell you 'cos it's proprietry IP!
I know the cock-up with SSL certs was a bit of an unmitigated disaster for Debian, but for crying out loud, a text editor?!
...but what about mspaint?
WordPad Zero-Day Flaw to Servers???
Only a stupid admin would check his/her e-mail on a Windows server and then open an attachment with WordPad. So why is this a server zero-day flaw?
Wordpad has been around for ages...
So surely this Wordpad flaw has been around for many years now? Would they have ever had to change the code for the Wordpad program very much over the years? I'd guess not so it must have been around for quite a while now?
- SMASH the Bash bug! Red Hat, Apple scramble for patch batches
- A BENDY iPhone 6, you say? Pah, warp claims are bent out of shape: Consumer Reports
- eXpat Files 'Could we please not have naked developers running around the office BEFORE 10pm?'
- CoTW Emma Watson should SHUT UP, all this abuse is HER OWN FAULT
- Vulture at the Wheel Renault Twingo: Small, sporty(ish), safe ... and it's a BACK-ENDER