jueves, octubre 30, 2008
viernes, octubre 24, 2008
Nueva vulnerabilidad de windows 0-day afecta si tienes archivos compartidos en red
Alerts
MS Windows Wormable Vulnerability, Out-of-Band Patch Released (MS08-067)
Date:10.23.2008
Threat Type: Malicious Web Site / Malicious Code
Websense® Security Labs™ has received reports of exploits circulating in the wild that take advantage of a serious Windows vulnerability. Microsoft just released an out-of-band patch to address this just hours ago (see MS08-067).
The remote code execution vulnerability is found in netapi32.dll, and carries a severity rating of "Critical" by Microsoft, affecting even fully patched Windows machines. This vulnerability (CVE-2008-4250) allows malicious hackers to write a worm (self-propagating malicious code without need for any user interaction), by crafting a special RPC request. A successful exploitation would result in the complete control of victim machine.
To date, we have seen attacks installing a Trojan (Gimmiv) upon successful exploitation. At the time of this alert, only 25% of 36 anti-virus vendors could detect this malicious code. Blocking TCP ports 139 and 445 at the firewall is only a partial solution because most desktops have file/printer sharing turned on. The out-of-band patch release by Microsoft testifies to the severity of this vulnerability and the urgency for an immediate fix.
MS Windows Wormable Vulnerability, Out-of-Band Patch Released (MS08-067)
Date:10.23.2008
Threat Type: Malicious Web Site / Malicious Code
Websense® Security Labs™ has received reports of exploits circulating in the wild that take advantage of a serious Windows vulnerability. Microsoft just released an out-of-band patch to address this just hours ago (see MS08-067).
The remote code execution vulnerability is found in netapi32.dll, and carries a severity rating of "Critical" by Microsoft, affecting even fully patched Windows machines. This vulnerability (CVE-2008-4250) allows malicious hackers to write a worm (self-propagating malicious code without need for any user interaction), by crafting a special RPC request. A successful exploitation would result in the complete control of victim machine.
To date, we have seen attacks installing a Trojan (Gimmiv) upon successful exploitation. At the time of this alert, only 25% of 36 anti-virus vendors could detect this malicious code. Blocking TCP ports 139 and 445 at the firewall is only a partial solution because most desktops have file/printer sharing turned on. The out-of-band patch release by Microsoft testifies to the severity of this vulnerability and the urgency for an immediate fix.
domingo, octubre 19, 2008
Ultimo debate obama mccain
Ver debate completo aqui
proximamente
Ver chistes que hicieron en la cena en honor de adam smith
http://www.msnbc.msn.com/id/21134540/vp/27001471#27230396
viernes, octubre 17, 2008
webcam
Ahora que tengo una webcam q me compre en london, voy a ponerla cuando me acuerde.
Podras acceder al chat en
http://www.blogtv.com/People/jony24
http://www.stickam.com/jonytk
jony24- Broadcast your self LIVE
Aunque seguramente preferireis ir a ver a chicas retransmitiendo "live" con sus webcams.
Podras acceder al chat en
http://www.blogtv.com/People/jony24
http://www.stickam.com/jonytk
jony24- Broadcast your self LIVE
Aunque seguramente preferireis ir a ver a chicas retransmitiendo "live" con sus webcams.
Suscribirse a:
Entradas (Atom)