Announcement

Collapse
No announcement yet.

If you are still using Windows be sure to read this update notice

Collapse
This topic is closed.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    If you are still using Windows be sure to read this update notice

    http://www.zdnet.com/blog/security/c...t;feature-roto
    "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
    – John F. Kennedy, February 26, 1962.

    #2
    Re: If you are still using Windows be sure to read this update notice

    lol or ...not lol......

    I turns the machine on, it churns through

    a) a bunch of MS critical updates, which are ALL security updates....except for the Digital Rights Management update.....which I never update....
    b) I restart
    c) Adobe has to update again, it updates EVERY time...what it updates I have no clue, but I do get to visit their site and they get to tell me about stuff to buy! lol
    d) I restart again.
    e) MS usually then has a couple of MORE updates....
    f) i restart again.

    And just like not going to porno sites.

    i do not touch ANYthing!! (Sgt Schultz here! lol )

    g) I makes my crossword puzzles
    h) I turn da machine off.

    no porno, no viruses, no nothing.

    woodsmoke

    Comment


      #3
      Re: If you are still using Windows be sure to read this update notice

      This...

      MIDI Remote Code Execution Vulnerability - CVE-2012-0003
      A remote code execution vulnerability exists in Windows Media Player. An attacker could exploit this vulnerability by constructing a specially crafted MIDI file that could allow remote code execution when played using Windows Media Player. An attacker who successfully exploited this vulnerability could take complete control of an affected system.

      What is the component affected by the vulnerability?
      Windows multimedia library (winmm.dll) is the component affected by this vulnerability. The component enables applications such as Windows Media Player to work with audio and video.

      What might an attacker use the vulnerability to do?
      An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. An attacker could then install programs, view, change, or delete data.
      ...is pathetic! The parser ought be a simple thing; all it needs to do is process event messages, control signals, and clock signals. MIDI is fully spec-ed and completely predictable. Yet winmm.dll appears to happily process ill-defined MIDI...?

      Comment


        #4
        Re: If you are still using Windows be sure to read this update notice

        Thanks for the insight, Steve! Not being a Windows expert myself I was hoping you'd step in and fill in the blanks for the rest of us! 8)
        "A nation that is afraid to let its people judge the truth and falsehood in an open market is a nation that is afraid of its people.”
        – John F. Kennedy, February 26, 1962.

        Comment


          #5
          Re: If you are still using Windows be sure to read this update notice

          WMP sucks anyway. It's worse than Totem.
          "The only way Kubuntu could be more user friendly would be if it came with a virtual copy of Snowhog and dibl"

          Comment

          Working...
          X