[<prev] [next>] [day] [month] [year] [list]
Message-ID: <c524f8960601051350v18b8e806k55bbd4101a437d4a@mail.gmail.com>
Date: Thu, 5 Jan 2006 15:50:36 -0600
From: Matthew Schiros <schiros@...il.com>
To: security-basics@...urityfocus.com, bugtraq@...urityfocus.com
Subject: WMF Exploit Patch Released
Microsoft has released a patch for the WMF exploit a couple of days
early, apparently due to a faster-than-expected testing process, and,
at least I hope, some consumer pressure. It can be downloaded via
Windows Update, or as a standalone install at:
http://www.microsoft.com/technet/security/Bulletin/MS06-001.mspx
As a note, it appears that all of the attempts to circumvent the
problem via disabling SHIMGVW.DLL were irrelevant, and that those who
discovered that GDI32.DLL and WGDI32.DLL were the culprits were
correct.
Happy crawling.
Matt Schiros
Web Developer
Academic Superstore
www.academicsuperstore.com
---------------------------------------------------------------------------
EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The Norwich University program offers unparalleled Infosec management
education and the case study affords you unmatched consulting experience.
Tailor your education to your own professional goals with degree
customizations including Emergency Management, Business Continuity Planning,
Computer Emergency Response Teams, and Digital Investigations.
http://www.msia.norwich.edu/secfocus
----------------------------------------------------------------------------
Powered by blists - more mailing lists