[prev in list] [next in list] [prev in thread] [next in thread]
List: patchmanagement
Subject: [patchmanagement] Microsoft Quietly Patches Another Critical Malware Protection Engine Flaw
From: Susan Bradley <sbradcpa () pacbell ! net>
Date: 2017-05-29 3:27:31
Message-ID: a5536872-48a8-71ee-cfd9-05cd56a875b2 () pacbell ! net
[Download RAW message or body]
https://threatpost.com/microsoft-quietly-patches-another-critical-malware-protection-e \
ngine-flaw/125951/?utm_source=newsletter&utm_medium=Email&utm_campaign=tp%20daily%20digest
Unlike a May 9 emergency patch
<https://threatpost.com/emergency-update-patches-zero-day-in-microsoft-malware-protection-engine/125529/> \
for what Google researchers called the worst Windows vulnerability in
recent memory
<https://threatpost.com/wormable-windows-zero-day-reported-to-microsoft/125513/>,
this week's bug was a silent fix, said Project Zero researcher Tavis
Ormandy, who privately disclosed it to Microsoft. The previous zero day
(CVE-2017-0290) was also in the Microsoft Malware Protection Engine,
running in most of Microsoft's antimalware offerings bundled with Windows.
---
PatchManagement.org is hosted by Shavlik
The content on the email list is intended for assisting administrators. If you would \
like to use any of this content in a blog or media publication, please contact the \
owners of the list for approval.
To unsubscribe send a blank email to leave-patchmanagement@patchmanagement.org
If you are unable to unsubscribe via this email address, please email
owner-patchmanagement@patchmanagement.org
[Attachment #3 (text/html)]
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=utf-8">
</head>
<body text="#000000" bgcolor="#FFFFFF">
<p><a class="moz-txt-link-freetext" \
href="https://threatpost.com/microsoft-quietly-patches-another-critical-malware-protec \
tion-engine-flaw/125951/?utm_source=newsletter&utm_medium=Email&utm_campaign=t \
p%20daily%20digest">https://threatpost.com/microsoft-quietly-patches-another-critical- \
malware-protection-engine-flaw/125951/?utm_source=newsletter&utm_medium=Email&utm_campaign=tp%20daily%20digest</a></p>
<p>Unlike a May 9<a
href="https://threatpost.com/emergency-update-patches-zero-day-in-microsoft-malware-protection-engine/125529/"> \
emergency patch</a> for what Google researchers called the <a
href="https://threatpost.com/wormable-windows-zero-day-reported-to-microsoft/125513/">worst
Windows vulnerability in recent memory</a>, this week’s bug was
a silent fix, said Project Zero researcher Tavis Ormandy, who
privately disclosed it to Microsoft. The previous zero day
(CVE-2017-0290) was also in the Microsoft Malware Protection
Engine, running in most of Microsoft’s antimalware offerings
bundled with Windows.</p>
</body>
</html>
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic