PDA

View Full Version : Check your MS Updates today



Ickie
July 20th, 2015, 13:29
Microsoft patches Windows zero-day
http://www.computerworld.com/article/2949589/malware-vulnerabilities/microsoft-patches-windows-zero-day-found-in-hacking-teams-leaked-docs.html

Security Update for Windows 7 for x64-based Systems (KB3079904)

Download size: 515 KB

You may need to restart your computer for this update to take effect.

Update type: Important

A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

More information:
http://support.microsoft.com/kb/3079904

Help and Support:
http://support.microsoft.com

hubbabubba
July 21st, 2015, 09:55
OpenType Font Driver Vulnerability - CVE-2015-2426[/B]

A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted OpenType fonts. An attacker who successfully exploited this vulnerability could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
There are multiple ways an attacker could exploit this vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage that contains embedded OpenType fonts. The update addresses the vulnerability by correcting how the Windows Adobe Type Manager Library handles OpenType fonts.
When this security bulletin was issued, Microsoft had information to indicate that this vulnerability was public but did not have any information to indicate this vulnerability had been used to attack customers. Our analysis has shown that exploit code could be created in such a way that an attacker could consistently exploit this vulnerability.
]from https://technet.microsoft.com/library/security/MS15-078

I did my daily manual update (on top of MS automatic updating) minutes before reading this. I'm using W7 64 bits.

Does it affect "non-supported" OS as well? Brrrrr...:snowman: