The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft Statement Concerning Windows Meta File Vulnerability
Time: 12:12 EST/17:12 GMT | News Source: Microsoft Press Release | Posted By: Jonathan Tigner

On Tuesday, December 27, 2005, Microsoft became aware of public reports of attacks on some customers that exploit a vulnerability in the Windows Meta File (WMF) code area in the Windows platform. Upon learning of the attacks, Microsoft mobilized under its Software Security Incident Response Process (SSIRP) to analyze the attack, assess its scope and determine the appropriate guidance for customers, as well as to engage with anti-virus partners and law enforcement.

Microsoft has completed development of a security update to fix the vulnerability. The security update is now being finalized through testing to ensure quality and application compatibility. Microsoft’s goal is to release the update on Tuesday, January 10, 2006, as part of its monthly release of security bulletins on the second Tuesday of the month. The update will be released worldwide simultaneously in 23 languages for all affected versions of Windows once it passes a series of rigorous testing procedures. It will be available through Microsoft Update and Windows Update, as well as Microsoft’s Download Center and through Windows Server Update Services for enterprise customers. Customers who use Windows’ Automatic Updates feature will be delivered the fix automatically.

Based on strong customer feedback, all Microsoft’s security updates must pass a series of testing processes, including testing by third-parties, to assure customers that they can be deployed effectively in all languages and for all versions of the platform with minimum down time.

Microsoft has been carefully monitoring the attempted exploitation of the WMF vulnerability since it became public last week, through its own forensic capabilities and through partnerships within the industry and law enforcement. Although the issue is serious and the attacks are being attempted, Microsoft’s intelligence sources indicate that the scope of the attacks is limited. In addition, attacks exploiting the WMF vulnerability are being effectively mitigated by anti-virus companies with up-to-date signatures.

Write Comment
Return to News

  Displaying 326 through 327 of 327
Prev | First
  The time now is 10:35:36 AM ET.
Any comment problems? E-mail us
#326 By 4240821 (77.83.4.69) at 11/27/2024 11:27:39 PM
https://telegra.ph/LusciousLux-OnlyFans-Leaked-07-18
https://telegra.ph/AshleyTervort-Girls-Patreon-Leaked-11-17
http://activewin.com/mac/comments.asp?ThreadIndex=62856
https://namethatpornstar.com/thread/4253021
https://telegra.ph/belledelphine-Cruise-Fansly-Leak-01-06
http://activewin.com/mac/comments.asp?ThreadIndex=2437
https://168.exodirectory.com/index.php?topic=166937.new
https://168.exodirectory.com/index.php?topic=155965.new
https://www.google.com/maps/d/edit?mid=1BMdqUqVxgBu2WxgqZEnMbz6Wgnhm0ds
http://activewin.com/mac/comments.asp?ThreadIndex=6451

#327 By 4240821 (80.73.244.53) at 11/28/2024 5:41:17 AM
https://www.google.vu/amp/s/lustful.su/get/a136/a136juoysmsopisdunn.php
https://www.google.tt/amp/s/sexonly.su/get/a227/a227nlqlhxngxkfqktq.php
https://www.google.tm/amp/s/nsfw.su/get/a197/a197mhtsetxpqfpiwce.php
https://www.google.tm/amp/s/nsfw.su/get/a51/a51xqrrtslwljajzuy.php
https://www.google.uz/amp/s/sexonly.su/get/a268/a268dsjpaemnhpkchot.php
https://www.google.vu/amp/s/nsfw.su/get/a24/a24kkkjbpfmoohbvpj.php
https://www.google.vg/amp/s/sexonly.top/get/a133/a133krxbiktysvvjxrl.php
https://www.google.vg/amp/s/sexonly.su/get/a23/a23nxrnfhmlniofbxq.php
https://www.google.tn/amp/s/nsfw.su/get/a260/a260ainnvbimvelndve.php
https://www.google.tt/amp/s/nsfw.su/get/a294/a294wtgevtamymitmra.php

Write Comment
Return to News
  Displaying 326 through 327 of 327
Prev | First
  The time now is 10:35:36 AM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *