[Note] One of the severe vulnerabilities in January May is the Exchange vulnerability.

Source: Internet
Author: User

Microsoft today announced the Information Security Update in July and seven new important Security announcements. The following summary shows Symantec's assessment of the three most important issues in this security update.

Microsoft Exchange Vulnerability

Symantec's security response center lists Microsoft Exchange vulnerabilities as one of the most influential vulnerabilities in this month's Security Bulletin. This remote code execution vulnerability may affect the MIME (multi-purpose Internet Mail Extension) decoding mechanism of Microsoft Exchange Server 2000/2003/2007. This vulnerability is very likely to be opened when a user opens an attachment encoded by base64.

Only when an Exchange server user opens a suspicious attachment can an attacker successfully launch an attack against this vulnerability and completely intrude into a computer with a vulnerable Exchange server, and it is very likely to cause adverse effects on a large number of users.

Windows Internet Explorer vulnerability

Microsoft announced a Security Bulletin involving five Internet Explorer vulnerabilities (four of which belong to the "emergency" risk level and one belongs to the "serious" risk level ). The Property Type Memory upload uption vulnerability and the HTML Objects Memory upload uption vulnerability are client-side code execution vulnerabilities that may affect Internet Explorer 6.0-7.0 and Internet Explorer 7.0. Both vulnerabilities affect Explorer 7.0 on Vista.

A malicious website allows attackers to run arbitrary code on their computers by exploiting this vulnerability. When a user accesses a malicious website, the attacker can exploit this vulnerability.

Windows dns rpc Interface Vulnerability

Microsoft recently released a zero-day attack vulnerability patch that affects the running of Windows dns rpc interfaces. The patch was detected on January 1, April and damaged the network. This remote code execution vulnerability affects a variety of Server operating systems, including windows 2000 and Windows Server 2003, as well as systems with DNS support (such as Domain Controller, DNS Server and Microsoft Small Business Server deployments ). Enterprise and small company users must ensure that the system patches are promptly downloaded after the vulnerability is discovered. Otherwise, a successful vulnerability attack will completely collapse the user's computer.

"When we edit the latest <Internet Security Threat Report>, attackers are still using browser and application vulnerabilities and social engineering techniques to intrude into computers and execute malicious code ." "These vulnerabilities further validate the security trends identified in Symantec's report," says Oliver Friedrichs, new technical director at Symantec's security response center. It is important for users to download and install the latest patch to protect their computers. In general, once connected to the Internet, the computer must install a comprehensive condom ."

Symantec recommends that the system administrator take the following measures:

· Assess the potential impact of these vulnerabilities on key systems.

· Plan necessary response measures, including taking appropriate security and availability solutions to deploy and update patches and implementing best security practices.

· Take proactive measures to protect network and information integrity.

· Confirm that enterprises have appropriate and effective data backup procedures and security measures.

· Remind users to carefully open all email attachments with unknown origins or links to websites with unknown or unverified origins.

Symantec recommends that family users take the following measures:

· Regularly execute Windows Update and install the latest security Update program to keep the software updated.

· Do not open email attachments with unknown origins or links to websites with unknown or unverified origins.

· Use Internet security solutions such as "Norton 2007 cyber security expert" to address today's known threats and protect internet security risks tomorrow.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.