I'd say that it is, because it is active, and because you only need to
receive the document in some fashion (probably some level of previewing it).






*ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
*Providing Virtual CIO Services (IT Operations & Information Security) for
the SMB market...*



On Tue, Oct 14, 2014 at 1:03 PM, James Rankin <[email protected]> wrote:

> Is it really that exciting? It's not like it's a worm that requires no
> interaction (it's just named after a worm), and it is generally exploited
> thru weaponized documents. Its made it into the media through various
> factors (like the NATO bit), but it's not really any different to the
> remote code execution vulns admins patch against every month, IMO.
>
> YMMV, etc.
>
> On 14 October 2014 17:58, Andrew S. Baker <[email protected]> wrote:
>
>> There's a zero-day Windows patch that is part of today's fix.  You'll
>> want to prioritize that...
>>
>>
>> http://www.isightpartners.com/2014/10/cve-2014-4114/
>>
>> https://technet.microsoft.com/library/security/ms14-oct
>>
>>
>>
>>
>> *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker>
>> *Providing Virtual CIO Services (IT Operations & Information Security)
>> for the SMB market...*
>>
>>
>>
>
>
> --
> *James Rankin*
> ---------------------
> RCL - Senior Technical Consultant (ACA, CCA, MCTS) | The Virtualization
> Practice Analyst - Desktop Virtualization
> http://appsensebigot.blogspot.co.uk
>

Reply via email to