Was there a KB# associated with this patch?

----- Original Message ----- 
From: "David Ferrin" <[EMAIL PROTECTED]>
To: <[email protected]>
Sent: Tuesday, September 26, 2006 9:11 PM
Subject: [jaws-users] Microsoft puts out fix for Explorer flaw


> Microsoft puts out fix for Explorer flaw (AP)
> Published Tue, 26 Sep 2006 22:33:18 GMT
>
>  AP - Microsoft Corp. rushed out a fix Tuesday for a security flaw in its
>  Internet Explorer Web browser after attackers had begun exploiting the
>  vulnerability
>  to take control of computers.
>
>  Yahoo! News
>
>  By ALLISON LINN, AP Business Writer 6 minutes ago SEATTLE - Microsoft 
> Corp.
>  rushed out a fix Tuesday for a security flaw in its Internet Explorer Web
>  browser
>  after attackers had begun exploiting the vulnerability to take control of
>  computers.
>
>  The Redmond-based software maker said it was putting out the fix ahead of
>  the next scheduled security fix release date on Oct. 10 because of the
>  severity
>  of the problem. The flaw carries Microsoft's highest "critical" rating.
>
>  The vulnerability in Microsoft's browser is particularly worrisome to
>  security experts because computer users could come under attack just by
>  visiting a
>  Web site that had been manipulated to take advantage of the flaw. That, 
> in
>  turn, would give an attacker complete control of a user's computer,
>  including
>  access to e-mails, personal information and other data.
>
>  Johannes Ullrich, chief technology officer with the security research
>  organization SANS Institute, said it appears that a couple of thousand 
> Web
>  sites have
>  already been manipulated to launch such attacks. The attack also seems to 
> be
>  spreading via e-mail, he said.
>
>  Stephen Toulouse, senior product manager in Microsoft's security 
> technology
>  unit, said Microsoft had only seen very limited attacks since the flaw
>  became
>  public a little over a week ago. But he said the activity was enough to
>  prompt the company to release the update ahead of schedule.
>
>  "What we're seeing from our end are very specific, limited attacks," he
>  said.
>
>  This is the latest in a series of flaws that have been publicly disclosed
>  before Microsoft was able to offer users a patch. More typically, 
> security
>  researchers
>  at outside organizations, or within Microsoft itself, discover the flaws 
> and
>  work in secret to come up with a patch before attackers have a chance to
>  take
>  advantage of them.
>
>  Ullrich faulted Microsoft for not getting a fix out sooner, noting that
>  attacks are already under way, and urged users to get the fix 
> immediately.
>
>  "Installing the patch is definitely the way to go," he said.
>
>
> [Non-text portions of this message have been removed]
>
>
>
> Visit the JAWS Users list home page at:
> http://www.jaws-users.com
>
> For a complete list of email commands pertaining to the JAWS Users List 
> send a blank email to:
> [EMAIL PROTECTED]
>
> Visit the new archives page at the following address
> http://www.mail-archive.com/[email protected]/
> Yahoo! Groups Links
>
>
>
>
>
>
>
>
>
> 




Visit the JAWS Users list home page at:
http://www.jaws-users.com

For a complete list of email commands pertaining to the JAWS Users List send a 
blank email to:
[EMAIL PROTECTED]

Visit the new archives page at the following address
http://www.mail-archive.com/[email protected]/ 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/jaws-users/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/jaws-users/join
    (Yahoo! ID required)

<*> To change settings via email:
    mailto:[EMAIL PROTECTED] 
    mailto:[EMAIL PROTECTED]

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 



Reply via email to