Guest NewsBot Posted June 16, 2012 Posted June 16, 2012 For the concerned people around: “<i><span>During our regular Update Tuesday bulletin cycle this week, we released <a href="http://technet.microsoft.com/en-us/security/advisory/2719615" target="_blank"> Security Advisory 2719615</a>, which provides guidance concerning a remote code execution issue affecting MSXML Code Services. As part of that Advisory, we've built a Fix it workaround that blocks the potential attack vector in Internet Explorer. Fix its are a labor-saving mechanism that helps protect customers from a specific issue in advance of a comprehensive security update. We encourage customers to read more about SA2716915's one-click, no-reboot-required Fix it in an in-depth post <a href="http://blogs.technet.com/b/srd/archive/2012/06/13/msxml-fix-it-before-fixing-it.aspx" target="_blank"> on the SRD blog</a></span></i><span>.” "<em>MSXML: Fix it before fixing</em> it"</span> <span>By the MSRC Team</span> <span>Regards</span> <span>PS - <a href="http://technet.microsoft.com/en-us/library/cc722487.aspx#EBAA" target="_blank"> <span>10 Immutable Laws of Security</span></a></span> View the thread Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.