Is it really that exciting? It's not like it's a worm that requires no interaction (it's just named after a worm), and it is generally exploited thru weaponized documents. Its made it into the media through various factors (like the NATO bit), but it's not really any different to the remote code execution vulns admins patch against every month, IMO.
YMMV, etc. On 14 October 2014 17:58, Andrew S. Baker <[email protected]> wrote: > There's a zero-day Windows patch that is part of today's fix. You'll want > to prioritize that... > > > http://www.isightpartners.com/2014/10/cve-2014-4114/ > > https://technet.microsoft.com/library/security/ms14-oct > > > > > *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker> > *Providing Virtual CIO Services (IT Operations & Information Security) for > the SMB market…* > > > -- *James Rankin* --------------------- RCL - Senior Technical Consultant (ACA, CCA, MCTS) | The Virtualization Practice Analyst - Desktop Virtualization http://appsensebigot.blogspot.co.uk

