Microsoft released 13 patches today designed to address 20 vulnerabilities, including the one exploited by the Duqu worm. One of the patches, MS11-087 or KB2639417, addresses a currently exploited issue in the way that the Windows kernel-mode driver handles TrueType font files and has been given a "PATCH NOW" rating by SANS for workstations and a Critical rating for servers. In addition, there are 7 other patches rated critical for workstations. Windows, Office and Internet Explorer are all affected and many of the updates will require you to restart your computer.
Members of the KUMC community will have these patches deployed automatically to your on-campus computers, so no further action is needed. However, you should ensure that your personal computer are updated as soon as possible.
For more information see: http://technet.microsoft.com/en-us/security/bulletin/ms11-dec
Members of the KUMC community will have these patches deployed automatically to your on-campus computers, so no further action is needed. However, you should ensure that your personal computer are updated as soon as possible.
For more information see: http://technet.microsoft.com/en-us/security/bulletin/ms11-dec
No comments:
Post a Comment