Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Microsoft Internet Explorer Windows

Microsoft Patches OLE Zero-Day Vulnerability 37

msm1267 writes: Microsoft today released a patch for a zero-day vulnerability under active exploit in the wild. The vulnerability in OLE, or Microsoft Windows Object Linking and Embedding, enables a hacker to remotely execute code on an infected machine, and has been linked to attacks by the Sandworm APT group against government agencies and energy utilities. Microsoft also issued a massive Internet Explorer patch, but warned organizations that have deployed version 5.0 of its Enhanced Mitigation Experience Toolkit (EMET) to upgrade to version 5.1 before applying the IE patches. Version 5.1 resolves some compatibility issues, in addition to several mitigation enhancements.
This discussion has been archived. No new comments can be posted.

Microsoft Patches OLE Zero-Day Vulnerability

Comments Filter:
  • by The New Guy 2.0 ( 3497907 ) on Tuesday November 11, 2014 @07:41PM (#48364669)

    It's Patch Tuesday falling on Veteran's Day this year... so this may catch some IT staff sleeping. Everybody checking Slashdot at home who maintains one of these things... log in an apply the update!

  • by Gravis Zero ( 934156 ) on Wednesday November 12, 2014 @02:33AM (#48366291)

    this was a zero day vulnerability... THREE WEEKS AGO.

  • That's a refreshingly honest description of a Windows computer.
  • From the summary

    The vulnerability in OLE, or Microsoft Windows Object Linking and Embedding, enables a hacker to remotely execute code on an infected machine,

    100% wrong, the exploit is of the trojan type and needs either code to be run by a user or an MS Office document to be opened locally before the machine is pwned.

Work is the crab grass in the lawn of life. -- Schulz

Working...