Miles Associates LLC

Jim Miles – IT & IT Security Consultant – Web Sites for Growing Organizations

Tag Archives: eEye

May 2011 Patch Tuesday Security Bulletins | eEye Digital Security

This month, Microsoft released 2 patches which repair a total of 3 vulnerabilities. Both of these patches address Remote Code Execution vulnerabilities.

via Patch Tuesday Security Bulletins | eEye Digital Security.

eEye’s analysis of February’s Patch Tuesday

This month, Microsoft released 12 patches which repair a total of 22 vulnerabilities. 5 of these patches address Remote Code Execution vulnerabilities, 5 address Elevation of Privilege, 1 addresses Denial of Service, and 1 addresses Information Disclosure.

via eEye Digital Security.

eEye’s analysis of January’s patch Tuesday

eEye’s Patch Tuesday analysis

This month, Microsoft released 17 patches which repair a total of 40 vulnerabilities. Of these 17 patches, 10 address Remote Code Execution vulnerabilities, 4 address Elevation of Privilege vulnerabilities, and 3 address Denial of Service.

Patch Precedence

eEye advises administrators to patch MS10-090 and MS10-091, followed by MS10-092, MS10-093, MS10-094, MS10-095, MS10-096, MS10-097, MS10-098, MS10-099, MS10-100, MS10-101, MS10-102, MS10-103, MS10-104, and MS10-105, and then patch MS10-106.

via eEye Digital Security.

eEye’s August Patch Analysis

This month, Microsoft released 15 patches which repair a total of 35 vulnerabilities. Of these 15 patches, 11 address Remote Code Execution vulnerabilities and 4 address Elevation of Privilege vulnerabilities.

Patch Precedence

  • Administrators are advised to patch MS10-054, MS10-053, and MS10-056 immediately to prevent exploitation by attackers.
  • Next, administrators should patch MS10-049, 050, 051, 052, 055, 057, and 060 as soon as possible.
  • Lastly, administrators should patch MS10-047, 048, 058 and 059 at their earliest convenience.

As always, eEye suggests that all users apply Microsoft patches as fast as possible…

via eEye Digital Security.

Out-of-band MS Patch!

Today, Microsoft released a special out-of-band patch which repairs a single Remote Code Execution vulnerability in how Windows Shell processes .lnk files.

As always, eEye suggests that all users apply Out of Band Microsoft patches as fast as possible, preferably after testing the impact on internal applications and network continuity.

via eEye Digital Security.

Patch Tuesday Summary for Feb from eEye Digital Security

Out of the 13 advisories this month, administrators are advised to patch MS10-006, MS10-009, MS10-013, MS10-015, and MS09-012 immediately. Machines with Microsoft Office installed should also be patched for MS10-003 and MS10-004 as soon as possible. The remainder of the patches should be applied after environment testing, or to environments that have the specifically affected software deployed.

As always, eEye suggests that users roll out Microsoft patches as fast as possible, preferably after testing the impact on internal applications and network continuity.

via eEye Digital Security .

MS issues out-of-band patch for IE vulns – eEye Digital Security

This security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer… The security update addresses these vulnerabilities by modifying the way that Internet Explorer handles objects in memory, validates input parameters, and filters HTML attributes.

EEye recommends immediate installation of the patch.

via eEye Digital Security .

Patch Tuesday analysis from eEye

Out of the 6 patches this month, three are client-side specific, and 3 are remote network vulnerabilities. Administrators should patch MS09-072, MS09-0071, and MS09-073 immediately. The remainder of the patches should be applied after environment testing, or to environments that have the specifically affected software deployed.

via Security bulletin from eEye Digital Security .