IE critical patches (MS08-078) supported in Desktop Central
Hi
Desktop Central Patch Management supports the latest IE Security vulnerability patches. Trust you are aware of the IE security holes identified and patched recently this week. Here is the description of the vulnerability
A remote code execution vulnerability exists as an invalid pointer reference in the data binding function of Internet Explorer. When data binding is enabled (which is the default state), it is possible under certain conditions for an object to be released without updating the array length, leaving the potential to access the deleted object�s memory space. This can cause Internet Explorer to exit unexpectedly, in a state that is exploitable.
An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user.
This is released in the below security bulletin.
http://www.microsoft.com/technet/security/bulletin/ms08-078.mspx
Now you would be able to apply this 18 patches to your network through Desktop Central Patch Management.
Update your vulnerability DB, Scan and apply the Patches.
regards,
******************************************
R. Romanus Prabhu
Technical Consultant - Lead
Windows Desktop Management Solution
Tel : +1 925 965 6478
Email : desktopcentral-support@manageengine.com
http://www.desktopcentral.com
******************************************
New to ADSelfService Plus?