Page 2 of 47 FirstFirst 12345612 ... LastLast
Results 11 to 20 of 467

Thread: Microsoft Alerts

  1. #11
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation Update for Windows Update ...

    FYI...

    Update for Windows Update ...
    - http://h-online.com/-1624979
    25 June 2012 - "Microsoft has released an unscheduled, non-patch day update for Windows to update the Windows Update function itself. However, according to reports from readers, the Windows Update Agent update does -not- always run smoothly... Users who run Windows Update are confronted with a message which says that an update for Windows Update needs to be installed before the system can check for other updates. On some computers, clicking the "Install Updates" button results in a failed installation with error code 80070057 or 8007041B. On heise Security's test Windows 7 computer, repeatedly attempting the update (click on "Check for updates" on the left) did eventually result in the update being successfully applied. Microsoft has provided a "Fix it" tool* for more stubborn cases in Knowledge Base Article 949104**. The update in question upgrades the Windows Update Agent from version 7.4.7600.226 to 7.6.7600.256 ..."
    * Direct download: http://go.microsoft.com/?linkid=9767096

    ** http://support.microsoft.com/kb/949104

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  2. #12
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Arrow MS June cumulative updates have been released

    FYI...

    MS June cumulative updates have been released
    - https://blogs.technet.com/b/the_micr...edirected=true
    28 Jun 2012

    2007 Office system cumulative update for June 2012
    For Excel 2007: http://support.microsoft.com/kb/2712234 ...
    June 26, 2012 - "The cumulative update packages for June 2012 contain the latest hotfixes for the 2007 Microsoft Office system and for the 2007 Office servers..."

    Office 2010 cumulative update for June 2012
    For Excel 2010: http://support.microsoft.com/kb/2712235 ...
    June 28, 2012 - "The cumulative update packages for June 2012 contain the latest hotfixes for the Microsoft Office 2010 system and for the Office 2010 servers..."

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  3. #13
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Post .NET 4 updates can take longer than expected

    FYI...

    Installing updates for the Microsoft .NET Framework 4 can take longer than expected
    - http://support.microsoft.com/kb/2570...d=548#fixit4me
    Last Review: July 3, 2012 - Rev: 4.0
    ... CAUSE: Updates to the .NET Framework 4 require a complete regeneration of the Native Image Cache, a very time-consuming operation. For some computers, an interaction with previously installed Native Images may cause Native Image regeneration to take much longer than expected. Although this issue only affects setup times, the effect can be several minutes to tens of minutes. Computers that have more Native Images installed will see longer generation times...
    To fix this problem automatically, click the Fix it button or link. Then click Run in the File Download dialog box, and follow the steps in the Fix it wizard...

    - http://support.microsoft.com/kb/2570...=548#appliesto
    APPLIES TO Microsoft .NET Framework 4

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  4. #14
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Post MSRT results to date - June 2012 release

    FYI...

    MSRT results to date - June 2012 release ...
    - https://blogs.technet.com/b/mmpc/arc...edirected=true
    4 Jul 2012 - "... Since the release of the MSRT on June 12, we have removed 59,479 Win32/Cleaman threats from 56,982 computers..."

    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  5. #15
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation MS Security Bulletin Summary - July 2012

    FYI...

    - https://technet.microsoft.com/en-us/...letin/ms12-jul
    July 10, 2012 - "This bulletin summary lists security bulletins released for July 2012...
    (Total of -9-)

    Critical - 3

    Microsoft Security Bulletin MS12-043 - Critical
    Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution (2722479)
    - https://technet.microsoft.com/en-us/...letin/ms12-043
    Critical - Remote Code Execution - May require restart - Microsoft Windows, Microsoft Office, Microsoft Developer Tools, Microsoft Server Software

    Microsoft Security Bulletin MS12-044 - Critical
    Cumulative Security Update for Internet Explorer (2719177)
    - https://technet.microsoft.com/en-us/...letin/ms12-044
    Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer

    Microsoft Security Bulletin MS12-045 - Critical
    Vulnerability in Microsoft Data Access Components Could Allow Remote Code Execution (2698365)
    - https://technet.microsoft.com/en-us/...letin/ms12-045
    Critical - Remote Code Execution - May require restart - Microsoft Windows

    Important - 6

    Microsoft Security Bulletin MS12-046 - Important
    Vulnerability in Visual Basic for Applications Could Allow Remote Code Execution (2707960)
    - https://technet.microsoft.com/en-us/...letin/ms12-046
    Important - Remote Code Execution - May require restart - Microsoft Office, Microsoft Developer Tools

    Microsoft Security Bulletin MS12-047 - Important
    Vulnerabilities in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2718523)
    - https://technet.microsoft.com/en-us/...letin/ms12-047
    Important - Elevation of Privilege - Requires restart - Microsoft Windows

    Microsoft Security Bulletin MS12-048 - Important
    Vulnerability in Windows Shell Could Allow Remote Code Execution (2691442)
    - https://technet.microsoft.com/en-us/...letin/ms12-048
    Important - Remote Code Execution - Requires restart - Microsoft Windows

    Microsoft Security Bulletin MS12-049 - Important
    Vulnerability in TLS Could Allow Information Disclosure (2655992)
    - https://technet.microsoft.com/en-us/...letin/ms12-049
    Important - Information Disclosure - Requires restart - Microsoft Windows

    Microsoft Security Bulletin MS12-050 - Important
    Vulnerabilities in SharePoint Could Allow Elevation of Privilege (2695502)
    - https://technet.microsoft.com/en-us/...letin/ms12-050
    Important - Elevation of Privilege - May require restart - Microsoft Office, Microsoft Server Software

    Microsoft Security Bulletin MS12-051 - Important
    Vulnerability in Microsoft Office for Mac Could Allow Elevation of Privilege (2721015)
    - https://technet.microsoft.com/en-us/...letin/ms12-051
    Important - Elevation of Privilege - Does not require restart - Microsoft Office
    ___

    - https://blogs.technet.com/b/msrc/arc...edirected=true
    10 Jul 2012

    Bulletin Deployment Priority
    - https://blogs.technet.com/cfs-filesy...ly-2012-DP.png

    Severity and Exploitability Index
    - https://blogs.technet.com/cfs-filesy...ly-2012-XI.png
    ___

    ISC Analysis
    - https://isc.sans.edu/diary.html?storyid=13642
    Last Updated: 2012-07-10 18:30:31 UTC
    ___

    - https://secunia.com/advisories/49456/ - MS12-043
    - https://secunia.com/advisories/45690/ - MS12-044
    - https://secunia.com/advisories/49743/ - MS12-045
    - https://secunia.com/advisories/49800/ - MS12-046
    - https://secunia.com/advisories/49200/ - MS12-047
    - https://secunia.com/advisories/49873/ - MS12-048
    - https://secunia.com/advisories/49874/ - MS12-049
    - https://secunia.com/advisories/49877/ - MS12-050
    - https://secunia.com/advisories/49875/ - MS12-050
    - https://secunia.com/advisories/49876/ - MS12-051
    ___

    MSRT
    - http://support.microsoft.com/?kbid=890830
    July 10, 2012 - Revision: 106.0

    Download:
    - http://www.microsoft.com/download/en...ylang=en&id=16
    File Name: Windows-KB890830-V4.10.exe - 15.6 MB
    - https://www.microsoft.com/download/e...s.aspx?id=9905
    x64 version of MSRT:
    File Name: Windows-KB890830-x64-V4.10.exe - 16.3 MB

    .
    Last edited by AplusWebMaster; 2012-07-11 at 19:08.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  6. #16
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation MS Security Advisories - 2012.07.10 ...

    FYI...

    MS Security Advisories - 2012.07.10 ...

    Microsoft Security Advisory (2728973)
    Unauthorized Digital Certificates Could Allow Spoofing
    - https://technet.microsoft.com/en-us/...visory/2728973
    July 10, 2012

    - https://blogs.technet.com/b/msrc/arc...edirected=true
    July 10, 2012 - "... we’ve chosen to -deprecate- the Windows Gadget Gallery effective immediately, and to provide a Fix it to help sysadmins disable Gadgets and the Sidebar across their enterprises..."
    Microsoft Security Advisory (2719662)
    Vulnerabilities in Gadgets Could Allow Remote Code Execution
    - https://technet.microsoft.com/en-us/...visory/2719662
    July 10, 2012 - "... Applying the automated Microsoft Fix It* solution described in Microsoft Knowledge Base Article 2719662 disables the Windows Sidebar experience and all Gadget functionality..."
    * http://support.microsoft.com/kb/2719662#FixItForMe
    Last Review: July 13, 2012 - Revision: 2.0

    - https://isc.sans.edu/diary.html?storyid=13651
    Last Updated: 2012-07-10 22:10:12 UTC - "... insecure gadgets allow random code to be executed with the rights of the logged on user..."

    Microsoft Security Advisory (2719615)
    Vulnerability in Microsoft XML Core Services Could Allow Remote Code Execution
    - https://technet.microsoft.com/en-us/...visory/2719615
    Published: Tuesday, June 12, 2012 | Updated: Tuesday, July 10, 2012
    "... We have issued MS12-043 to address this issue..."
    - http://support.microsoft.com/kb/2722479#FixItForMe
    July 10, 2012
    Fix it solution for MSXML version 5 - Microsoft Fix it 50908
    > http://go.microsoft.com/?linkid=9813081

    Microsoft Security Advisory (2269637)
    Insecure Library Loading Could Allow Remote Code Execution
    - https://technet.microsoft.com/en-us/...visory/2269637
    July 10, 2012 - v17.0: Added the following Microsoft Security Bulletin to the Updates relating to Insecure Library Loading section: MS12-046

    > http://forums.spybot.info/showpost.p...2&postcount=37

    Last edited by AplusWebMaster; 2012-07-14 at 19:21.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  7. #17
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Post Win7 SP1 Browser Choice errors ...

    FYI...

    Win7 SP1 Browser Choice errors ...
    - https://www.microsoft.com/en-us/news...statement.aspx
    July 17, 2012 - "Under a December 2009 decision of the European Commission, Microsoft is required to display a “Browser Choice Screen” (BCS) on Windows PCs in Europe where Internet Explorer is the default browser. We have fallen short in our responsibility to do this. Due to a technical error, we missed delivering the BCS software to PCs that came with the service pack 1 update to Windows 7. The BCS software has been delivered as it should have been to PCs running the original version of Windows 7, as well as the relevant versions of Windows XP and Windows Vista. However, while we believed when we filed our most recent compliance report in December 2011 that we were distributing the BCS software to all relevant PCs as required, we learned recently that we’ve missed serving the BCS software to the roughly 28 million PCs running Windows 7 SP1. While we have taken immediate steps to remedy this problem, we deeply regret that this error occurred and we apologize for it. The Commission recently told us that it had received reports that the BCS was not being displayed on some PCs. Upon investigating the matter, we learned of the error... the engineering team responsible for maintenance of this code did not realize that it needed to update the detection logic for the BCS software when Windows 7 SP1 was released last year. As a result of this error, new PCs with Windows 7 SP1 did not receive the BCS software as they should have. Since most computer users run earlier versions of Windows, we estimate that the BCS software was properly distributed to about 90% of the PCs that should have received it. We recognize, however, that our obligation was to distribute the BCS to every PC that should have received it. Therefore, we have moved as quickly as we can to address the error and to provide a full accounting of it to the Commission."

    - http://thenextweb.com/microsoft/2012...d-of-the-week/
    "... 28 million PCs in question... Distribution of the fix started on July 3rd..."

    What is the Browser Choice update?
    - http://support.microsoft.com/kb/976002

    .
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  8. #18
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation MS advisory - Oracle Outside In libraries

    FYI...

    Microsoft Security Advisory (2737111)
    Vulnerabilities in Microsoft Exchange and FAST Search Server 2010 for SharePoint Parsing Could Allow Remote Code Execution
    - https://technet.microsoft.com/en-us/...visory/2737111
    July 24, 2012 - "Microsoft is investigating new public reports of vulnerabilities in third-party code, Oracle Outside In libraries, that affect Microsoft Exchange Server 2007, Microsoft Exchange Server 2010, and FAST Search Server 2010 for SharePoint, which ship that component. Customers that apply the workarounds described in this advisory are not exposed to the vulnerabilities described in Oracle Critical Patch Update Advisory - July 2012. The vulnerabilities exist due to the way that files are parsed by the third-party, Oracle Outside In libraries. In the most severe case of Microsoft Exchange Server 2007 and Microsoft Exchange Server 2010, it is possible under certain conditions for the vulnerabilities to allow an attacker to take control of the server process that is parsing a specially crafted file. An attacker could then install programs; view, change, or delete data; or take any other action that the server process has access to do. Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers..."
    • V1.1 (July 25, 2012): Revised the workaround titles for clarity. There were no changes to the workaround steps.

    More info...
    - https://blogs.technet.com/b/srd/arch...edirected=true
    24 Jul 2012

    Microsoft Exchange Server...
    - https://secunia.com/advisories/50019/
    Release Date: 2012-07-25
    Criticality level: Highly critical
    Impact: DoS, System access
    Where: From remote...
    ... more information: https://secunia.com/advisories/49936/
    Solution: ... vendor recommends to apply workarounds... see the vendor's advisory...
    Original Advisory: Microsoft: http://technet.microsoft.com/en-us/s...visory/2737111

    Microsoft SharePoint and FAST Search Server vuln...
    - https://secunia.com/advisories/50049/
    Release Date: 2012-07-25
    Criticality level: Moderately critical
    Impact: DoS, System access
    Where: From remote...
    ... more information: https://secunia.com/advisories/49936/
    Solution: ... vendor recommends to apply workarounds... see the vendor's advisory...
    Original Advisory: Microsoft: http://technet.microsoft.com/en-us/s...visory/2737111
    ___

    - http://www.kb.cert.org/vuls/id/118913
    Last revised: 27 Jul 2012 - "... used by a variety of applications, including Microsoft Exchange, Oracle Fusion Middleware, Guidance Encase Forensics, AccessData FTK, and Novell Groupwise. Outside In 8.3.7.77 and earlier fail to properly handle multiple file types when the data is malformed..."

    Vendor Information for VU#118913
    - http://www.kb.cert.org/vuls/byvendor...&SearchOrder=4

    - http://h-online.com/-1653568
    26 July 2012

    Oracle Outside In Advisory ...
    - http://atlas.arbor.net/briefs/index#101557049
    Severity: Elevated Severity
    Published: Thursday, July 19, 2012 21:19
    The Oracle Outside In library is used by many other applications and has multiple security holes in it's parsing routines. Patches are available.
    Analysis: Security holes in such a library are good news for the attackers, who have multiple targets to choose from. Defenders should patch ASAP. Of the 15 vulnerable vendors, heavyweights such as Microsoft, IBM and Cisco appear along with others. It is a positive development that this security hole was found by a Google security researcher instead of a cyber-criminal.
    Source: http://www.kb.cert.org/vuls/id/118913

    .
    Last edited by AplusWebMaster; 2012-07-28 at 18:29.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  9. #19
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Post MS Support phases ending in the next 2 years

    FYI...

    > https://blogs.technet.com/b/mrsnrub/...edirected=true
    5 Aug 2012

    July 13th 2013 (2013-07-13)
    Windows Server 2008
    - enters extended support
    - will receive only security/GDR updates
    - extended support end July 10th 2018 (2018-07-10)
    - last service pack was SP2
    - ref: Microsoft Product Lifecycle Search
    ___

    April 8th 2014 (2014-04-08)
    Windows XP
    - end of support
    - no more updates for this product
    - includes XP x64 Edition
    - last service pack for x86 was SP3
    - last service pack for x64 was SP2
    - ref: Microsoft Product Lifecycle Search
    - ref: End of Support

    Office 2003
    - end of support
    - no more updates for this product
    - ref: End of Support

    .
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

  10. #20
    Adviser Team AplusWebMaster's Avatar
    Join Date
    Oct 2005
    Location
    USA
    Posts
    6,881

    Exclamation MS Security Bulletin Summary - August 2012

    FYI...

    - https://technet.microsoft.com/en-us/...letin/ms12-aug
    August 14, 2012 - "This bulletin summary lists security bulletins released for August 2012...
    (Total of -9-)

    Critical -5-

    Microsoft Security Bulletin MS12-052 - Critical
    Cumulative Security Update for Internet Explorer (2722913)
    - https://technet.microsoft.com/en-us/...letin/ms12-052
    Critical - Remote Code Execution - Requires restart - Microsoft Windows, Internet Explorer

    Microsoft Security Bulletin MS12-053 - Critical
    Vulnerability in Remote Desktop Could Allow Remote Code Execution (2723135
    - https://technet.microsoft.com/en-us/...letin/ms12-053
    Critical - Remote Code Execution - Requires restart - Microsoft Windows

    Microsoft Security Bulletin MS12-054 - Critical
    Vulnerabilities in Windows Networking Components Could Allow Remote Code Execution (2733594)
    - https://www.microsoft.com/technet/se...letin/MS12-054
    Critical - Remote Code Execution - Requires restart - Microsoft Windows

    Microsoft Security Bulletin MS12-060 - Critical
    Vulnerability in Windows Common Controls Could Allow Remote Code Execution (2720573)
    - https://technet.microsoft.com/en-us/...letin/ms12-060
    Critical - Remote Code Execution - May require restart - Microsoft Office, Microsoft SQL Server, Microsoft Server Software, Microsoft Developer Tools
    - http://support.microsoft.com/kb/2708437
    Last Review: August 14, 2012 - Revision: 1.3

    Microsoft Security Bulletin MS12-058 - Critical
    Vulnerabilities in Microsoft Exchange Server WebReady Document Viewing Could Allow Remote Code Execution (2740358)
    - https://technet.microsoft.com/en-us/...letin/ms12-058
    Critical - Remote Code Execution - Does not require restart - Microsoft Exchange Server

    Important -4-

    Microsoft Security Bulletin MS12-055 - Important
    Vulnerability in Windows Kernel-Mode Drivers Could Allow Elevation of Privilege (2731847)
    - https://technet.microsoft.com/en-us/...letin/ms12-055
    Important - Elevation of Privilege - Requires restart - Microsoft Windows

    Microsoft Security Bulletin MS12-056 - Important
    Vulnerability in JScript and VBScript Engines Could Allow Remote Code Execution (2706045)
    - https://technet.microsoft.com/en-us/...letin/ms12-056
    Important - Remote Code Execution - May require restart - Microsoft Windows

    Microsoft Security Bulletin MS12-057 - Important
    Vulnerability in Microsoft Office Could Allow Remote Code Execution (2731879)
    - https://technet.microsoft.com/en-us/...letin/ms12-057
    Important - Remote Code Execution - May require restart - Microsoft Office

    Microsoft Security Bulletin MS12-059 - Important
    Vulnerability in Microsoft Visio Could Allow Remote Code Execution (2733918)
    - https://technet.microsoft.com/en-us/...letin/ms12-059
    Important - Remote Code Execution - May require restart - Microsoft Office
    ___

    Bulletin Deployment Priority
    - https://blogs.technet.com/cfs-filesy...Deployment.png

    Severity and Exploitability Index
    - https://blogs.technet.com/cfs-filesy...2-Severity.png

    August 2012 Bulletin Release
    - https://blogs.technet.com/b/msrc/arc...edirected=true
    14 Aug 2012 - "... MS12-060... We’re aware of limited, targeted attacks attempting to exploit this vulnerability..."
    ___

    - https://secunia.com/advisories/50237/ - MS12-052
    - https://secunia.com/advisories/50244/ - MS12-053
    - https://secunia.com/advisories/50245/ - MS12-054
    - https://secunia.com/advisories/50236/ - MS12-055
    - https://secunia.com/advisories/50243/ - MS12-056
    - https://secunia.com/advisories/50251/ - MS12-057
    - https://secunia.com/advisories/50019/ - MS12-058
    - https://secunia.com/advisories/50228/ - MS12-059
    - https://secunia.com/advisories/50247/ - MS12-060
    ___

    Update Rollup 4 for Exchange 2010 SP2
    - https://blogs.technet.com/b/exchange...edirected=true
    14 Aug 2012 - "... On August 13th 2012, the Exchange CXP team released Update Rollup 4 for Exchange Server 2010 SP2 to the Download Center. This update contains a number of customer reported and internally found issues. See KB 2706690* Description of Update Rollup 4 for Exchange Server 2010 Service Pack 2 for more details...
    * http://support.microsoft.com/kb/2706690
    August 14, 2012 - Revision: 1.0
    Applies to:
    Microsoft Exchange Server 2010 Service Pack 2, when used with:
    Microsoft Exchange Server 2010 Enterprise
    Microsoft Exchange Server 2010 Standard
    - https://isc.sans.edu/diary.html?storyid=13900#comment
    "... apparently we're all getting that rollup whether we want it or not...
    posted by GrumpySysAdmin, Wed Aug 15 2012, 21:37"
    __

    Update Rollup 8 for Exchange 2007 SP3
    - https://blogs.technet.com/b/exchange...edirected=true
    14 Aug 2012 - "On August 13th 2012, the Exchange CXP team released Update Rollup 8 for Exchange Server 2007 SP3 to the Download Center... See KB 2734323* Description of Update Rollup 8 for Exchange Server 2007 Service Pack 3..."
    * http://support.microsoft.com/kb/2734323
    Last Review: August 14, 2012 - Revision: 1.0
    Applies to: Microsoft Exchange Server 2007 Service Pack 3, when used with:
    Microsoft Exchange Server 2007 Enterprise Edition
    Microsoft Exchange Server 2007 Standard Edition
    ___

    MSRT
    - http://support.microsoft.com/?kbid=890830
    August 14, 2012 - Revision: 108.0
    - http://www.microsoft.com/security/pc...-families.aspx
    Updated: Aug 14, 2012 - "... added in this release...
    • Bafruz
    • Matsnu ..."
    - https://blogs.technet.com/b/mmpc/arc...edirected=true
    14 Aug 2012

    Download:
    - http://www.microsoft.com/download/en...ylang=en&id=16
    File Name: Windows-KB890830-V4.11.exe - 15.7 MB
    - https://www.microsoft.com/download/e...s.aspx?id=9905
    x64 version of MSRT:
    File Name: Windows-KB890830-x64-V4.11.exe - 16.3 MB
    ___

    ISC Analysis
    - https://isc.sans.edu/diary.html?storyid=13900
    Last Updated: 2012-08-14 18:32:51 UTC

    .
    Last edited by AplusWebMaster; 2012-08-16 at 12:07.
    The machine has no brain.
    ......... Use your own.
    Browser check for updates here.
    YOU need to defend against -all- vulnerabilities.
    Hacks only need to find -1- to get in...
    .

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •