Demult se vorbea sa deschidem o tema dedicata fericitilor utilizatori ms windows, care au bucuria de a afla de doua ori pe luna ca s-a descoperit o noua vulnerabilitate in sistema, si ca tre' de tras patch-uri, altfel "un tilizator malintentionat ar putea prelua controlo complet asupra sistemei voastre (c)ms". O deschid acum, sunt inspirat din noile gauri ale lunii octombrie. Asadar, pe rand, caut linkurile mai vechi, si le postez aici, si apoi ajung la ultimile.
Faimosul blaster:
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-026.asp .
Welchia(Nachi):
http://www.microsoft.com/security/antivirus/nachi.asp
SoBig:
http://www.microsoft.com/security/antivirus/sobig.asp
Gauri diferite in ie si win: http://www.microsoft.com/security/security_bulletins/ms03-040.asp
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-039.asp
In genere, e de dorit sa fie trase toate updateu-rile, ca nustiu ce in ultima vreme cam toate is critice
Daca observati ca conexiunea voastra e prea lenta, ori diferite ciudatenii in lucrul compului, nu ezitati sa va verificati sistema:
- Blaster: http://securityresponse.symantec.com/avcenter/FixBlast.exe
- Welchia: http://www.symantec.com/avcenter/FixWelch.exe
- SoBig: http://securityresponse.symantec.com/avcenter/FixSbigF.exe
(ideal ar fi un KAV innoit regulat la fiecare 2 saptamani)
Si acuma, delicatese lunii acestea. Noile gauri din octombrie (au aparut patch-urile ieri, 15 oct.): http://www.microsoft.com/security/security_bulletins/20031015_windows.asp .-> sumar
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-041.asp -> In sfarsit patch pt, gaura cu ActiveX (se dedica lui NaE, caruia nush' ce ii merge rau sistema dupa vizita pe siteul lui [Legion] :lol: )
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-043.asp -> Iarasi messenger service si cu rpc-ul s-au dovedit a fi pline de buguri. (The attacker could then take any action on the system, including installing programs, viewing, changing or deleting data, or creating new accounts with full privileges.)
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-044.asp -> Gaura in Help&support center, (An attacker could exploit the vulnerability by constructing a URL that, when clicked on by the user, could execute code of the attacker’s choice in the Local Computer security context. The URL could be hosted on a web page, or sent directly to the user in email. In the web based scenario, where a user then clicked on the URL hosted on a website, an attacker could have the ability to read or launch files already present on the local machine.)
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-045.asp -> gaura in niste controluri standarte a win (combobox, listbox) . (This could give an attacker complete control over the system by using Utility Manager in Windows 2000.)
Cam atata horror pe luna asta
Adica suntem abia la jumate de luna, mai vedem noi. Trageti updateurile si dormiti linistit. Si nu uitat ca ignoranta userului = forta hackerului ![Smile :) :)](/styles/default/xenforo/smilies/smile.png)
Ps: pe parcurs, vom posta aici noutatile la tema asta. Mi se pare ca ea n-o sa moara niciodata![Smile :) :)](/styles/default/xenforo/smilies/smile.png)
Faimosul blaster:
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-026.asp .
Welchia(Nachi):
http://www.microsoft.com/security/antivirus/nachi.asp
SoBig:
http://www.microsoft.com/security/antivirus/sobig.asp
Gauri diferite in ie si win: http://www.microsoft.com/security/security_bulletins/ms03-040.asp
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/MS03-039.asp
In genere, e de dorit sa fie trase toate updateu-rile, ca nustiu ce in ultima vreme cam toate is critice
![Smile :) :)](/styles/default/xenforo/smilies/smile.png)
- Blaster: http://securityresponse.symantec.com/avcenter/FixBlast.exe
- Welchia: http://www.symantec.com/avcenter/FixWelch.exe
- SoBig: http://securityresponse.symantec.com/avcenter/FixSbigF.exe
(ideal ar fi un KAV innoit regulat la fiecare 2 saptamani)
Si acuma, delicatese lunii acestea. Noile gauri din octombrie (au aparut patch-urile ieri, 15 oct.): http://www.microsoft.com/security/security_bulletins/20031015_windows.asp .-> sumar
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-041.asp -> In sfarsit patch pt, gaura cu ActiveX (se dedica lui NaE, caruia nush' ce ii merge rau sistema dupa vizita pe siteul lui [Legion] :lol: )
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-043.asp -> Iarasi messenger service si cu rpc-ul s-au dovedit a fi pline de buguri. (The attacker could then take any action on the system, including installing programs, viewing, changing or deleting data, or creating new accounts with full privileges.)
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-044.asp -> Gaura in Help&support center, (An attacker could exploit the vulnerability by constructing a URL that, when clicked on by the user, could execute code of the attacker’s choice in the Local Computer security context. The URL could be hosted on a web page, or sent directly to the user in email. In the web based scenario, where a user then clicked on the URL hosted on a website, an attacker could have the ability to read or launch files already present on the local machine.)
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-045.asp -> gaura in niste controluri standarte a win (combobox, listbox) . (This could give an attacker complete control over the system by using Utility Manager in Windows 2000.)
Cam atata horror pe luna asta
![Smile :) :)](/styles/default/xenforo/smilies/smile.png)
![Smile :) :)](/styles/default/xenforo/smilies/smile.png)
Ps: pe parcurs, vom posta aici noutatile la tema asta. Mi se pare ca ea n-o sa moara niciodata
![Smile :) :)](/styles/default/xenforo/smilies/smile.png)