Twitter | Pretraživanje | |
0patch
Microscopic cures for big security holes. 0patch (pronounced 'zero patch')
2.518
Tweetovi
235
Pratim
5.243
Osobe koje vas prate
Tweetovi
0patch proslijedio/la je tweet
Christine Hall 4. velj
I checked it out and you have more options than merely paying a king's ransom to Microsoft: Options for the Windows Server 2008 End of Life Blues
Reply Retweet Označi sa "sviđa mi se"
0patch proslijedio/la je tweet
Christine Hall 3. velj
Using Windows Server 2008 without support? Here are the ways I've found to protect yourself: Options for the Windows Server 2008 End of Life Blues
Reply Retweet Označi sa "sviđa mi se"
0patch proslijedio/la je tweet
Mitja Kolsek 3. velj
Odgovor korisniku/ci @AskWoody @BAR01474
We tested it and KB4532695 does NOT modify jscript.dll. It does modify mshtml.dll (which we micropatched) but not in a way that would prevent jscript.dll from getting loaded. So it's really unlikely that this KB does anything for CVE-2020-0674.
Reply Retweet Označi sa "sviđa mi se"
0patch 3. velj
Paging 24 million instances of now-unsupported Windows Server 2008! 0patch will have security micropatches to keep you patched for three more years, along with Windows 7. Contact sales@0patch.com for details on enterprise deployment and central management.
Reply Retweet Označi sa "sviđa mi se"
0patch 31. sij
How will our users running Windows 7 and Windows Server 2008 R2 learn about the status of our monthly security micropatches?
Reply Retweet Označi sa "sviđa mi se"
0patch 30. sij
Odgovor korisniku/ci @0patch
Upon popular demand, we have just ported our "CVE-2020-0674 workaround" micropatch to both 32-bit and 64-bit: Windows 10 v1903 Windows 10 v1909 Both are included in 0patch FREE
Reply Retweet Označi sa "sviđa mi se"
0patch proslijedio/la je tweet
Mitja Kolsek 30. sij
Malicious RTF files exploiting Equation Editor vulnerabilities are being detected across the globe. Everyone: 0patch FREE includes free micropatches for all known Equation Editor vulnerabilities and will block these attacks. Did I mention it was FREE? Use it.
Reply Retweet Označi sa "sviđa mi se"
0patch proslijedio/la je tweet
Günter Born 29. sij
Project: Windows 7/Server 2008/R2 Life Extension & 0patch one month trial
Reply Retweet Označi sa "sviđa mi se"
0patch proslijedio/la je tweet
Günter Born 29. sij
Windows 7/Server 2008/R2 Life Extension-Projekt & 0patch Probemonat Borns IT- & Windows-Blog
Reply Retweet Označi sa "sviđa mi se"
0patch 30. sij
Odgovor korisniku/ci @UnrealJonsson
Uninstall can be done at any time, without rebooting.
Reply Retweet Označi sa "sviđa mi se"
0patch 29. sij
Odgovor korisniku/ci @oesten
0patch Central has notifications about agents that haven't synced in more than 30 days.
Reply Retweet Označi sa "sviđa mi se"
0patch 29. sij
Odgovor korisniku/ci @oesten
Correct.
Reply Retweet Označi sa "sviđa mi se"
0patch 29. sij
Deciding between 0patch and Extended Security Updates for your Windows 7 and Server 2008 R2 computers? We'll give you a one-month free trial for your entire Windows fleet so you can test us. If you don't like what you get, you can still go with ESU. Email sales@0patch.com
Reply Retweet Označi sa "sviđa mi se"
0patch 28. sij
Odgovor korisniku/ci @UnrealJonsson
Thanks. Based on what you wrote it's likely that you had a very old 0patch Agent, which indeed was generating huge log files. This hasn't been the case in a long time now.
Reply Retweet Označi sa "sviđa mi se"
0patch 28. sij
Odgovor korisniku/ci @ItsReallyNick
We're going to test that. Most modules we've seen are identical between Office 2016 and Office 365 so if that's the case here, the micropatch applies to O365 too. Otherwise we'd have to port it but in either case, it would prevent the bypass. Thanks for pointing this out.
Reply Retweet Označi sa "sviđa mi se"
0patch 28. sij
Odgovor korisniku/ci @ItsReallyNick
Note that this micropatch only breaks WebView in Outlook, and only when it tries to show the Home Page and when it decides to show the Home Page tab in folder options.
Reply Retweet Označi sa "sviđa mi se"
0patch 28. sij
Odgovor korisniku/ci @FireEye
A good article on recent exploitation of CVE-2017-11774 by Iran-nexus threat actors from :
Reply Retweet Označi sa "sviđa mi se"
0patch 28. sij
Odgovor korisniku/ci @0patch
The micropatch is currently written for the last vulnerable version of Outlook 2016 but it will be trivial to port it to any other affected Outlook version. Anyone interested is welcome to contact us at sales@0patch.com
Reply Retweet Označi sa "sviđa mi se"
0patch 28. sij
Odgovor korisniku/ci @0patch
The micropatch simply overrides Outlook's reading of WebView settings for determining whether Home Page is enabled, and makes Outlook believe the answer is "disabled" regardless of what the Registry says. This prevents the bypass. Source code contains just one instruction:
Reply Retweet Označi sa "sviđa mi se"
0patch 28. sij
We issued a micropatch for CVE-2017-11774, a remote code execution vulnerability in Outlook that has been widely exploited and remains popular with attackers. In contrast to official patch which could be reverted by non-admins, micropatch will reliably disable Outlook Home Page.
Reply Retweet Označi sa "sviđa mi se"