Discussion in 'other security issues & news' started by ronjor, Mar 16, 2012.
Thumbs for this, Ron
More on the POC (Proof of Concept), Microsoft offers bounty for RDP exploit.
Suspicions aroused as exploit for critical Windows bug is leaked As previously posted, there is a Microsoft Fix-It available - the actual patch release remains to be seen.
More as I know more.
This was patched on Tuesday. The Fix-It is for server admins who don't want to deploy a patch without properly testing it.
If you want to read about the leak, go to the source:
Despite the he-said-she-said The threat is real.
A comment in a recent ISC Diary sums it up nicely:
Why We Rated the MS12-020 Issue with RDP "Patch Now"
On the other hand, as another commenter points out, it's a no-threat if the organization has proper perimeter security in place. (My translation: a System Administrator who is doing her/his job)
Of course, with a Patch now released, the above should be moot.
On the other hand #2: Remember Conficker -- that worm appeared on the scene 11 days after the patch for MS08-067 was released, and didn't peak until a few months later.
(Translation offered free of charge: patches don't work unless they are installed.)
A friend has setup my computer (it is windows 7 pro version). All is in grey?
Does this mean everything is disabled and not vulnarable to the exploit?
If you keep your computer updated with Windows Update, you should be okay.
Im confused about this.
So, if we received the Windows Update last Tuesday are we ok? Or not?
This patch here right?
You're okay if you keep you Windows Updates current.
We're all set here then at work.
I agree with Dan 100%. Victim blaming is probably the most common trend in IT. "Well they clicked the link so they deserve it blah blah blah they didn't update the patch so they deserve it." It's ridiculous.
Separate names with a comma.