![]() |
New Zero Day Windows Vulnerability
Dog Windows all you want, it pays the bills for me. And today I'm earning my pay. As a courtesy to all my friends in the same boat around here, I offer this urgent warning: Get this patch. Now.
Here's why: Quote:
|
Oh, for the love of... :smack:
|
But Firefox is immune, right?
|
No
This is a system-level problem with how Windows handles .ANI cursor animations.
In other words, it doesn't matter what you run on top of Windows. If you get this, you've got issues with your PC. |
The latest news is that MS will be releasing a patch *today* to fix this problem. I have just visited the Microsoft Update page, and no patch is available yet. But watch this space. It should happen today.
By the way, the third party patch described in the OP installed fine for me, and like most defensive measure, there's no way to tell if it did its job. Anyway, many others in my organization did have trouble with it, but all those troubles were related to the distribution method, not to the patch itself. It remains to be seen what complications I face when the MS patch comes out and I have a mixed set of systems with the 3rd party patch applied and some without. I reckon the "without" group will have the least trouble. I may find the "with" group will need to have the patch uninstalled. Lovely. |
Order UP!
Your patch is ready. Check Microsoft Update or Windows Update. |
And then don't forget to get the patch to fix the patch. :smack:
|
*whimpers*
Please, just make it stop. UNCLE, already. |
/grant hugs his copy of Parallels
|
All times are GMT -5. The time now is 04:36 PM. |
Powered by: vBulletin Version 3.8.1
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.