Skip to: [ search ] [ menus ] [ content ] Select style [ Aqua ] [ Citrus ] [ Fire ] [ Orange ] [ show/hide more content ]



Here we go again!

Just to satisfy my curiosity, I did a Google seaarch after reading the first paragraph of a CNET article. My search terms were “Microsoft fix critical hole IE,” and I got 270,000 hits in 0.18 seconds. :-)

The latest critical hole in IE (Internet Explorer, but I have heard other explanations of the acronym) is described on CNET after Microsoft said today that it would be releasing security updates on Tuesday, outside of its monthly patch cycle, for the critical vulnerability in IE and a moderate vulnerability in Visual Studio.

The two security bulletins address one overall issue, but are being released separately to “provide the broadest protections possible to customers,” according to the Microsoft statement.

The Microsoft Security Bulletin Advance Notification said that the systems affected include: Windows 2000, Windows XP, Vista, Windows Server 2003 and 2008, Internet Explorer 6, 7 and 8, Microsoft Visual Studio .NET 2003, Visual Studio 2005 and 2008 and Visual C++ 2005 and 2008.

Please see the CNET summary and the Microsoft Security Bulletin Advance Notification for additional information.

-Bill at Cheshire Cat Photo™

You can view higher-resolution photos (*generally* 7-30 megabytes, compressed) at the Cheshire Cat Photo™ Pro Gallery on Shutterfly™, where you can also order prints and gifts decorated with the photos of your choice from the gallery. Apparel and other gifts decorated with some of our most popular photos can be ordered from the Cheshire Cat Photo™ Store on CafePress®. Both Shutterfly™ and CafePress® ship to most international locations worldwide! If you don’t see what you want or would like to receive an email when new photos are up on the site, send us an email at info@cheshirecatphoto.com.

1 Comment to “Here we go again!”

  (RSS feed for these comments)

You must be logged in to post a comment.

Hey, it’s Black Hat week again. :-)

Obviously Internet Explorer is only the attack target but the source comes from the used development platform. I’m sure that we will see more patches and updates the next couple of weeks coming from major software vendors who have either used the same development platform or the same libraries to compile their software code. You can find more about my theory at my Risk Management blog at http://ITRiskSpace.com

-Andreas
http://ITRiskSpace.com

ITRiskSpace said this on July 24th, 2009 at 10:12 pm


InspectorWordpress has prevented 52092 attacks.
Get Adobe Flash player