Gonzalez Posted January 28, 2010 Report Share Posted January 28, 2010 Just got an email from Microsoft Technet (stupid win 7 beta) with some interesting info on a remote code execution that they are now patching, so people who don't pay attention to microsoft updates (Like I used to are still Vulnerable)Cumulative Security Update for Internet Explorer (978207)General InformationExecutive SummaryThis security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.This security update is rated Critical for all supported releases of Internet Explorer: Internet Explorer 5.01, Internet Explorer 6, Internet Explorer 6 Service Pack 1, Internet Explorer 7, and Internet Explorer 8 (except Internet Explorer 6 for supported editions of Windows Server 2003). For Internet Explorer 6 for supported editions of Windows Server 2003 as listed, this update is rated Moderate. For more information, see the subsection, Affected and Non-Affected Software, in this section.The security update addresses these vulnerabilities by modifying the way that Internet Explorer handles objects in memory, validates input parameters, and filters HTML attributes. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection under the next section, Vulnerability Information.This security update also addresses the vulnerability first described in Microsoft Security Advisory 979352.Recommendation. The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.For administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service.See also the section, Detection and Deployment Tools and Guidance, later in this bulletin.Known Issues. NoneSourcehttp://www.microsoft.com/technet/security/Bulletin/MS10-002.mspxAlso be sure to check the link to see all of the copies of internet explorer that are vulnerable and if anyone has an exploit, feel free to share Quote Link to comment Share on other sites More sharing options...