Severity: High
9 September, 2008
Summary:
§ These vulnerabilities affect: Recent versions of Windows and many other Microsoft products (see “Exposure” section for full details)
§ How an attacker exploits them: By enticing your users into viewing malicious images or graphical content, including content hosted on a malicious Web site
§ Impact: Remote attacker can execute code, potentially gaining complete control of your computers
§ What to do: Install the appropriate Microsoft patches immediately
0 Comments