You must not be in a PARCC State.  All the states just got together and gave 
Pearson 186 million dollars to create a java based standardized test.

From: [email protected] [mailto:[email protected]] On 
Behalf Of Matthew W. Ross
Sent: Tuesday, April 29, 2014 12:46 PM
To: [email protected]
Subject: Re: [BULK] RE: [NTSysADM] IE exploit

I thought I was cracking jokes the whole time!

In all seriousness, I'm all for HTML5 taking over Java and Flash. There is no 
reason for a web browser to require either plugin anymore, except for old 
software. And only if the old software was updated, I could happily remove both.


--Matt Ross
Ephrata School District


Andrew S. Baker <[email protected]<mailto:[email protected]>> , 4/29/2014 4:14 
AM:
Now you're cracking jokes...






ASB
http://XeeMe.com/AndrewBaker<http://xeeme.com/AndrewBaker>
Providing Virtual CIO Services (IT Operations & Information Security) for the 
SMB market…




On Mon, Apr 28, 2014 at 7:06 PM, Matthew W. Ross 
<[email protected]<mailto:[email protected]>> wrote:
I'm down with that. Thank goodness both have been replaced with HTML5.

Well... sorta.


--Matt Ross
Ephrata School District

[email protected]<mailto:[email protected]> , 4/28/2014 2:59 PM:
Java and Adobe. Done.

Sent from my Surface Pro

From: Matthew W. Ross<mailto:[email protected]>
Sent: Monday, April 28, 2014 5:39 PM
To: '[email protected]'<mailto:[email protected]>

Can we blame adobe for everything? They would make a great scapegoat.


--Matt Ross
Ephrata School District

Rod Trent <[email protected]<mailto:[email protected]>> , 4/28/2014 
2:33 PM:
I blame Adobe.

-----Original Message-----
From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]<mailto:[email protected]>] 
On Behalf Of Susan Bradley
Sent: Monday, April 28, 2014 5:15 PM
To: [email protected]<mailto:[email protected]>
Subject: Re: [NTSysADM] IE exploit

Hang on, it's not the same exploit.  You are confusing two Flash vectors.

The zero day via Fireeye is CVE-2014-1776 
http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html

The Flash patch below is a totally different Flash patch and it's from Adobe.
http://helpx.adobe.com/security/products/flash-player/apsb14-09.html
It's just via Microsoft becasuse they stuck Flash in their browser and thus 
they update it. *CVE number:* CVE-2014-0506, CVE-2014-0507, CVE-2014-0508, 
CVE-2014-0509

Two totally different issues.

Microsoft will patch all supported browsers for the weekend zero day when it's 
ready.

The flash patch is just a Flash update.

On 4/28/2014 2:00 PM, Rod Trent wrote:
>
> BTW: Microsoft has a patch ready for IE10 and IE11 only – for Windows
> 8.x and Windows Server 2012…
>
> http://windowsitpro.com/msrc/flash-fix-ie-10-and-ie-11-only
>
> *From:*[email protected]<mailto:*[email protected]>
> [mailto:[email protected]<mailto:[email protected]>]
>  *On Behalf Of *David Lum
> *Sent:* Monday, April 28, 2014 4:56 PM
> *To:* [email protected]<mailto:[email protected]>
> *Subject:* RE: [NTSysADM] IE exploit
>
> Saw this on a forum today:  ”We have one agency warning us of an
> exploit, and the other agency trying to use the exploit :)”
>
> FTW!
>
> -Dave Lum
>
> *From:*[email protected]<mailto:*[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> [mailto:[email protected]<mailto:[email protected]>]
>  *On Behalf Of *Rod Trent
> *Sent:* Monday, April 28, 2014 12:04 PM
> *To:* [email protected]<mailto:[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> *Subject:* RE: [NTSysADM] IE exploit
>
> It’s not. Adobe has been working on today’s patch since early April,
> working with Kaspersky. The one announced over the weekend as
> identified by FireEye and Microsoft is working on a patch.
>
> *From:*[email protected]<mailto:*[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> [mailto:[email protected]<mailto:[email protected]>]
>  *On Behalf Of *David Lum
> *Sent:* Monday, April 28, 2014 3:00 PM
> *To:* [email protected]<mailto:[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> *Subject:* RE: [NTSysADM] IE exploit
>
> Adobe’s patch addresses CVE-2014-0515
>
> Microsoft’s address CVE-2014-1776
>
> It’s possible they are linked, since this article does make them seem
> like the same attack vector, but I do not speek enough
> programmer-speak to know for sure:
>
> http://www.securelist.com/en/blog/8212/New_Flash_Player_0_day_CVE_2014
> _0515_used_in_watering_hole_attacks
>
> -Dave Lum
>
> *From:*[email protected]<mailto:*[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> [mailto:[email protected]<mailto:[email protected]>]
>  *On Behalf Of *David McSpadden
> *Sent:* Monday, April 28, 2014 10:37 AM
> *To:* '[email protected]<mailto:'[email protected]>'
> *Subject:* RE: [NTSysADM] IE exploit
>
> I thought that is what I read in the MS articles?
>
> VML and Flash were the vector for the exploit?
>
> *From:*[email protected]<mailto:*[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> [mailto:[email protected]<mailto:[email protected]>]
>  *On Behalf Of *Rod Trent
> *Sent:* Monday, April 28, 2014 1:34 PM
> *To:* [email protected]<mailto:[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> *Subject:* RE: [NTSysADM] IE exploit
>
> Yes, but that has nothing to do with the exploit reported over the
> weekend.
>
> *From:*[email protected]<mailto:*[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> [mailto:[email protected]<mailto:[email protected]>]
>  *On Behalf Of *Kennedy, Jim
> *Sent:* Monday, April 28, 2014 1:13 PM
> *To:* [email protected]<mailto:[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> *Subject:* RE: [NTSysADM] IE exploit
>
> Flash just released an update.
>
> http://helpx.adobe.com/security/products/flash-player/apsb14-13.html
>
> *From:*[email protected]<mailto:*[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> [mailto:[email protected]<mailto:[email protected]>]
>  *On Behalf Of *Rod Trent
> *Sent:* Monday, April 28, 2014 1:11 PM
> *To:* [email protected]<mailto:[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> *Subject:* RE: [NTSysADM] IE exploit
>
> It’s all versions of Internet Explorer. However, supported versions
> will be patched.
>
> There are ways to mitigate:
>
> http://windowsitpro.com/windows/all-hands-deck-zero-day-reported-wild-
> affects-ie6-11
>
>
> *From:*[email protected]<mailto:*[email protected]>..com
> <mailto:[email protected]<mailto:[email protected]>>
> [mailto:[email protected]<mailto:[email protected]>]
>  *On Behalf Of *David McSpadden
> *Sent:* Monday, April 28, 2014 1:05 PM
> *To:* [email protected]<mailto:[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> *Subject:* RE: [NTSysADM] IE exploit
>
> Is it just XP or am I wrong that the 7’s, 8’s, and Server OS’s also an
> issue the way I am reading it.
>
> Especially if they have Adobe Flash (Not sure of version) and the
> website being visited using VML.
>
> ??
>
> *From:*[email protected]<mailto:*[email protected]>..com
> <mailto:[email protected]<mailto:[email protected]>>
> [mailto:[email protected]<mailto:[email protected]>]
>  *On Behalf Of *Rod Trent
> *Sent:* Monday, April 28, 2014 12:59 PM
> *To:* [email protected]<mailto:[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> *Subject:* RE: [NTSysADM] IE exploit
>
> The is the first in a coming list of exploits that Windows XP will be
> vulnerable to forever.
>
> *From:*[email protected]<mailto:*[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> [mailto:[email protected]<mailto:[email protected]>]
>  *On Behalf Of *Jonathan Link
> *Sent:* Monday, April 28, 2014 12:51 PM
> *To:* [email protected]<mailto:[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>
> *Subject:* Re: [NTSysADM] IE exploit
>
> It's really bad if you're still running XP in your environment...
>
> On Mon, Apr 28, 2014 at 12:38 PM, David McSpadden 
> <[email protected]<mailto:[email protected]>
> <mailto:[email protected]<mailto:[email protected]>>> wrote:
>
>     Any reason for concern?
>
>     This e-mail and any files transmitted with it are property of
>     Indiana Members Credit Union, are confidential, and are intended
>     solely for the use of the individual or entity to whom this e-mail
>     is addressed. If you are not one of the named recipient(s) or
>     otherwise have reason to believe that you have received this
>     message in error, please notify the sender and delete this message
>     immediately from your computer. Any other use, retention,
>     dissemination, forwarding, printing, or copying of this email is
>     strictly prohibited.
>
>     Please consider the environment before printing this email.
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for
> the use of the individual or entity to whom this e-mail is addressed.
> If you are not one of the named recipient(s) or otherwise have reason
> to believe that you have received this message in error, please notify
> the sender and delete this message immediately from your computer. Any
> other use, retention, dissemination, forwarding, printing, or copying
> of this email is strictly prohibited.
>
> Please consider the environment before printing this email.
>
> This e-mail and any files transmitted with it are property of Indiana
> Members Credit Union, are confidential, and are intended solely for
> the use of the individual or entity to whom this e-mail is addressed.
> If you are not one of the named recipient(s) or otherwise have reason
> to believe that you have received this message in error, please notify
> the sender and delete this message immediately from your computer. Any
> other use, retention, dissemination, forwarding, printing, or copying
> of this email is strictly prohibited.
>
> Please consider the environment before printing this email.
>

--
Got your CryptoLocker prevention in place?
http://www.thirdtier.net/2013/10/cryptolocker-prevention-kit-updates/
Our last day of XP patching.  Wave it goodbye.








Reply via email to