Microsoft bumper patch batch on Tuesday failed to address not just one but two zero-day vulnerabilities, each of which has become the scope of targeted attacks. Tuesday brought eight bulletins from Microsoft addressing 28 vulnerabilities. As previously reported, the batch fails to address a new Internet Explorer vulnerability …
Your failboat has arrived.
Good way to get people to move to Vista or Linux though. Make all the old Windows security risks again.
They *have* released a patch for the majority already? (SP3 of course!)
Oh for heavens sake!
"In addition, an unpatched vulnerability in WordPad has also become fodder for malicious hackers. The issue affects the Wordpad text converter for Word 97."
Look I don't want to get all on the MS bashing train but FFS! It's fecking text editor with a few tweaks for colour and font, HTF does it give "malicious hackers" something to work on? WTF is in that O/S? Oh yes, sorry we can't tell you 'cos it's proprietry IP!
I know the cock-up with SSL certs was a bit of an unmitigated disaster for Debian, but for crying out loud, a text editor?!
...but what about mspaint?
WordPad Zero-Day Flaw to Servers???
Only a stupid admin would check his/her e-mail on a Windows server and then open an attachment with WordPad. So why is this a server zero-day flaw?
Wordpad has been around for ages...
So surely this Wordpad flaw has been around for many years now? Would they have ever had to change the code for the Wordpad program very much over the years? I'd guess not so it must have been around for quite a while now?
- Geek's Guide to Britain INSIDE GCHQ: Welcome to Cheltenham's cottage industry
- 'Catastrophic failure' of 3D-printed gun in Oz Police test
- Game Theory Is the next-gen console war already One?
- Analysis Spam and the Byzantine Empire: How Bitcoin tech REALLY works
- VIDEO Herschel Space Observatory spots galaxies merging