Yesterday, I wrote:

ZDNet says Mozilla products (recent ones, anyway) are safe from the
latest[FN] SSL/TLS security hole:
<http://www.zdnet.com/article/how-to-protect-yourself-against-freak/>

Of course, systems that also use other software are still vulnerable.
For example, even though my SM 2.32.1 passed the test, my fully patched
IE 11 is still vulnerable until I fix it.

--------------------
[FN]--By "latest," I mean "the most recently discovered," not "the most
recently created." This one apparently goes back decades.

Ironically, the group policy workaround described in the ZDNet article (copied from an M$ security advisory) fixes Internet Exploiter, but breaks Windows Update. So in order to detect and apply Micro$oft's forthcoming patch (whenever that may be), you have to remain vulnerable. Alternatively, you can periodically disable the workaround, restart, check for updates, reenable the workaround, and restart.

--
War doesn't determine who's right, just who's left.
--
Paul B. Gallagher

_______________________________________________
support-seamonkey mailing list
[email protected]
https://lists.mozilla.org/listinfo/support-seamonkey

Reply via email to