Microsoft’s August 2011 Patch Tuesday Serves 13 PatchesMicrosoft has just issued a total of 13 security-patches, fixing vulnerabilities within its large number of software applications among which security flaws within its Windows Server OSs and Internet Explorer are rated critical. Theregister.co.uk reported this on August 9, 2011. Basically, attackers who exploit the IE flaws manage to run malware remotely, requiring Web-surfers to merely view a booby-trapped site. Albeit no evidence has yet emerged of anyone exploiting the vulnerabilities, the security team of Microsoft states that there's an immense possibility of real-world criminals developing a dependable attack code within 30 days from now. Meanwhile, the security flaws impact each of the IE browser's supported editions, including the 8th and 9th that have been reconstructed from their original state for lessening potential destruction from hackers. Further, alongside the above security flaws, Microsoft has rated a loophole within Windows Server 2008 R2 and 2008 as "critical." Through the dispatch of maliciously-designed NAPTR (Naming Authority Pointer) suites intended for certain DNS Server, cyber-criminals may insert as also run random code. Nevertheless, if end-users resist using the Server they're likely to stay invulnerable. Here security engineers at Microsoft state that a particular configuration that's frequently affected is a relay alternatively caching DNS Server running on interconnected PCs of an enterprise, while there's an ill-intentioned end-user lurking. But trustworthy DNS Servers have low potential towards being affected provided they harbor regions connected online, which frequently have recursion deactivated, the experts add. Softpedia.com reported this on August 10, 2011. Furthermore, Microsoft has also fixed twin DOS vulnerabilities -MS11-065 and MS11-064 with which cyber-miscreants can render the server useless. The MS11-065 vulnerability as well impacts Windows Server 2003 SP2. In addition to the above updates, Microsoft has issued some others which it rates "important" alternatively more-than-important for Office 2003 to 2010 (Visio), Windows XP SP3 to Windows 7 as well as the .NET structure. Several among these flaws when abused allow invisible malware infection on a computer. But, they normally depend on end-users manually viewing certain maliciously-designed file that minimizes their danger limits. Conclusively, users running Windows/Windows-related servers must ensure that they've the latest MS patches installed soon. Related article: Microsoft Patches Live OneCare to Tackle Quarantined E-Mails » SPAMfighter News - 8/20/2011 |
Dear Reader
We are happy to see you are reading our IT Security News.
We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!