Showing posts with label advisory. Show all posts
Showing posts with label advisory. Show all posts
Wednesday, March 8, 2017
Microsoft Security Advisory 3046015 FREAK
Microsoft Security Advisory 3046015 FREAK
Microsoft released Security Advisory 3046015 which relates to the SSL/TLS issue referred being referred to as FREAK (Factoring attack on RSA-EXPORT Keys).
Most of the publicity surrounding FREAK has been addressing the vulnerability in the Safari, Chrome and Android browsers with OS X, iOS and Android. However, the flaw also affects many popular websites. As described in the Security Advisory:
"The vulnerability could allow a man-in-the-middle (MiTM) attacker to force the downgrading of the cipher used in an SSL/TLS connection on a Windows client system to weaker individual ciphers that are disabled but part of a cipher suite that is enabled."The problem is that it isnt only the browser that is vulnerable but websites as well. Are you or the sites you frequent vulnerable? To find out, do the following:
- Test your browser for the FREAK Vulnerability at https://freakattack.com/.
- A list of websites known to be vulnerable to FREAK is at https://freakattack.com/vulnerable.txt. You can also check websites you frequent at SSL Server Test, although if vulnerable, it is up to the website to update their server.
References:
- CVE Reference: CVE-2015-1637
- MSRC: Security Advisory 3046015 released
- Tech Net Advisory: Microsoft Security Advisory 3046015 Vulnerability in Schannel Could Allow Security Feature Bypass
- Tracking the FREAK Attack

Remember - "A day without laughter is a day wasted."
May the wind sing to you and the sun rise in your heart...
Computer security news & information, help, tips, tutorials, and more.
©2006 - 2016 "Security Garden" By Corrine
Available link for download
.png)
Wednesday, January 11, 2017
Microsoft Security Advisory 3010060 with Fixit Solution
Microsoft Security Advisory 3010060 with Fixit Solution
Microsoft released Security Advisory 3010060 which relates to a vulnerability affecting all supported releases of Microsoft Windows, excluding Windows Server 2003.
The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Office file that contains an OLE object. Microsoft is aware of limited, targeted attacks.
Recommendations
Microsoft has made available a Fix it solution "OLE packager shim workaround" which prevents execution of the vulnerability. Below are direct links to both enable and disable the Fix it solution.Note: The Fix it solution is not at this time for 64-bit editions of PowerPoint on x64-based editions of Windows 8 and Windows 8.1.
Enable Fix it | Disable Fix it |
---|---|
![]() Microsoft Fix it 51026 | ![]() Microsoft Fix it 51027 |
Another option is to install the Enhanced Mitigation Experience Toolkit (EMET), described in the "workarounds" section of the Tech Net Advisory.
References:
- CVE Reference: CVE-2014-6352
- Microsoft KB Article 3010060: Microsoft security advisory: Vulnerability in Microsoft OLE could allow remote code execution: October 21, 2014
- MSRC: Security Advisory 3010060 released
- Tech Net Advisory: Microsoft Security Advisory 3010060 Vulnerability in Microsoft OLE Could Allow Remote Code Execution

Remember - "A day without laughter is a day wasted."
May the wind sing to you and the sun rise in your heart...
Computer security news & information, help, tips, tutorials, and more.
©2006 - 2016 "Security Garden" By Corrine
Available link for download
.png)
Subscribe to:
Posts (Atom)