Is it really that exciting? It's not like it's a worm that requires no
interaction (it's just named after a worm), and it is generally exploited
thru weaponized documents. Its made it into the media through various
factors (like the NATO bit), but it's not really any different to the
remote code execution vulns admins patch against every month, IMO.

YMMV, etc.

On 14 October 2014 17:58, Andrew S. Baker <[email protected]> wrote:

> There's a zero-day Windows patch that is part of today's fix.  You'll want
> to prioritize that...
>
>
> http://www.isightpartners.com/2014/10/cve-2014-4114/
>
> https://technet.microsoft.com/library/security/ms14-oct
>
>
>
>
> *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
> *Providing Virtual CIO Services (IT Operations & Information Security) for
> the SMB market…*
>
>
>


-- 
*James Rankin*
---------------------
RCL - Senior Technical Consultant (ACA, CCA, MCTS) | The Virtualization
Practice Analyst - Desktop Virtualization
http://appsensebigot.blogspot.co.uk

Reply via email to