Over 1 million tech questions and answers.

Solved: How do I clear up security vulnerability (Very High -- MS07-016)?

Q: Solved: How do I clear up security vulnerability (Very High -- MS07-016)?

A Trend-Micro PC-cillin Internet Security Check gave this result:

The following security vulnerabilities were found on this computer:

High MS05-004
Very High MS07-016

I clicked on Windows Update and found that I apparently needed a Security Update for MS.NET Framework 1.1 Service Pack 1 (KB928366), which I downloaded and installed. Then I rebooted my computer, ran another Trend-Micro Security Check and discovered that these two "vulnerability checks" were still there! (In fact, I may have downloaded and installed this twice.)

At this point I don't recall what I did after that, but I Googled around and tried a thing or two to clear up my problem. Well, whatever I did, now whenever I run a T-M Security Check I see that the only "vulnerability" found is: Very High MS07-016. Somehow I must've done something that cleared up the High MS05-004 vulnerability.

Could someone please tell how to clear up the one remaining vulnerability? I would greatly appreciate whatever help I can get. By the way, how dangerous is it for me to continue to have this one "Very High" vulnerability? Thank you.

RELEVANCY SCORE 200
Preferred Solution: Solved: How do I clear up security vulnerability (Very High -- MS07-016)?

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)

A: Solved: How do I clear up security vulnerability (Very High -- MS07-016)?

Well, I guess I got smart.

As Trend-Micro's website recommended, I went to the Microsoft Security Bulletins website and followed the steps given. After applying the related security patch, I ran yet another T-M Security Check. This time it showed that there are no longer any MS vulnerabilities on my computer.

Read other 1 answers
RELEVANCY SCORE 78

Full exploit code was published this morning for MDAC vulnerability MS07-009. The original demonstration of this vulnerability occurred on July 29, 2006 in HD Moore's Month of Browser Bugs #29. At the time, only a denial-of-service demonstration was published.Here the full article of Websense

A:Full Exploit Code Was Published This Morning For Mdac Vulnerability Ms07-009

Exploits are published all the time..........

Read other 1 answers
RELEVANCY SCORE 65.6

For some reason I can't get MS Security Bulletin MS07-042 to install. All previous updates have installed normally, but MS07-042 won't install. When I click on the ICON, process starts normally, but update never gets into the system. When I restart my system, there is the ICON again with the same update (MS07-042) waiting to be installed. No error codes.

Hard office Linksys network and current Norton anti-virus software.

Read other answers
RELEVANCY SCORE 64

Hi,

I was recently having problems with my computer, esp quicktime and some plug-ins. I kept getting buffer overrun errors.

I finally decided that it would be best if I ran trend house micro, and this is the error I got.

I went to the microsoft web page and I was confused on what and what not I should download.



(MS07-016) Cumulative Security Update for Internet Explorer (928090)

Transfering more information about this vulnerability...
An error occured while trying to retrieve more information about this vulnerability. There is currently no more information available.
(CVE-2006-4697, CVE-2007-4697) COM Object Instantiation Memory Corruption Vulnerability A remote code execution vulnerability exists in the way Internet E...
More information about this vulnerability and its elimination.
Affected programs and services: Microsoft Internet Explorer 6.0 (Microsoft Windows Server 2003)
Microsoft Windows 2000 Server Service Pack 4
Microsoft Windows Server 2003
Microsoft Windows XP Service Pack 2
Microsoft Windows Server 2003 for Itanium-based Systems
Microsoft Internet Explorer 6 Service Pack 1 (Microsoft Windows 2000 Service Pack 4)
Microsoft Internet Explorer 6 for Microsoft Windows XP Service Pack 2
Microsoft Windows XP Professional x64 Edition
Microsoft Windows Server 2003 Service Pack 1
Microsoft Windows Server 2003 with SP1 for Itanium-based Systems
Microsoft Windows Server 2003 x64 Edition
Microsoft Internet Explorer 6.0 (Microsoft Window... Read more

A:(MS07-016) Cumulative Security Update for Internet Explorer (928090)

Hello Qwertyrow and welcome to TSF, maybe I'm missing something but what exactly is the error that you're receiving. Is it a BSOD, Stop error? Please be as precise as possible.

Read other 6 answers
RELEVANCY SCORE 56.8

Hello everyone,

I have been running through Rollin Rog's Sticky on Security; bookmarking, downloading,
and printing out those items, and the link to Security Test Sites, listed under Vulnerability
Testing would not work for me.

Is it me(?), a server problem? or is the link dead?
 

A:Solved: In Rollin Rogs Sticky: Vulnerability Testing - Security Test Sites Link Not Working

It doesn't seem to work for me either. It starts loading very slow, then takes me to Cannot find server - the Page Cannot Be Displayed
 

Read other 3 answers
RELEVANCY SCORE 54.4

I have Trend Micro PC-cillin and a vulnerability check popped up on my screen. It locked up my computer but upon restart it came up again. It says 'Very High' risk level Target: Office w/ Related bulletin MS04-028. I found that Microsoft bulletin and read up on it, and I also attempted to download an update for Windows XP Service Pack 2 (which I have) but received an error message saying something to the effect of "The expected software was not found." I also tried a general Office update which PC-cillin suggested but it needs the Suite 2003 disk to complete and I can't find it at the moment.

Any explainations and tips would be greatly appreciated, and avoiding having to use the disk would be a plus.

A:Pc-cillin Found 'very High' Risk Vulnerability In Microsoft Office

The requirement of the disk is one of MicroSoft's clever (painful) ways of reducing piracy. I don't see a way around it that would be allow to be discussed on this forum, seeing it would involve circumventing the security features on the program.Was this the bulletin you were talking about?

Read other 5 answers
RELEVANCY SCORE 52

A while ago, I noticed that attachments had begun arriving via Outlook Express already opened, but didn't give it much thought. Then the other day, I realised that this could lead to the kind of exposure that I didn't want. I tried remedying this by going to View, then Layout in order to uncheck the Preview Pane box, but it was aleady unchecked. This was odd! Then I came across Microsoft Security Bulletin MS03-014 which suggested that my problem was caused by a virus, or could result in a virus. The remedy for this was to download the Cumulative Patch 330994 for Outlook Express. I felt heartened but when I try to install the patch, I keep getting an error message telling me that I need Internet Explorer 6 to do so. I have Windows XP Professional, and IE 6 comes with the package, so what is going on? It looks like my efforts are being blocked. Do I have a virus? My Norton Internet Security 2005 and System Works programs inform me that I do not, so how can I solve this problem? I am using Incredimail now for incoming mail, because it is unaffected.
I really hope that you can help. Thanks!
 

A:Security vulnerability in OE

Read other 8 answers
RELEVANCY SCORE 52

My Symantec picked up something about 2 hours after the computer would not get out of a security vulnerability?

Running very slow...
OS Name Microsoft Windows XP Home Edition
Version 5.1.2600 Service Pack 3 Build 2600
OS Manufacturer Microsoft Corporation
System Manufacturer TOSHIBA
System Model Satellite M35X
System Type X86-based PC
Processor x86 Family 6 Model 13 Stepping 6 GenuineIntel ~1598 Mhz
BIOS Version/Date TOSHIBA V1.60, 11/30/2004
SMBIOS Version 2.31
Windows Directory C:\WINDOWS
System Directory C:\WINDOWS\system32
Boot Device \Device\HarddiskVolume1
Locale United States
Hardware Abstraction Layer Version = "5.1.2600.5512 (xpsp.080413-2111)"
Time Zone Eastern Standard Time
Total Physical Memory 1,536.00 MB
Available Physical Memory 799.69 MB
Total Virtual Memory 2.00 GB
Available Virtual Memory 1.95 GB
Page File Space 2.03 GB
Page File C:\pagefile.sys

Hijack Log as follows:

Logfile of Trend Micro HijackThis v2.0.2
Scan saved at 1:02:29 PM, on 12/22/2009
Platform: Windows XP SP3 (WinNT 5.01.2600)
MSIE: Internet Explorer v8.00 (8.00.6001.18702)
Boot mode: Normal

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\WIDCOMM\Bluetooth Software\bin\btwdins.exe
C:\WINDOWS\Explorer.exe
C:\WINDOWS\system32\brsvc01a.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\brss01a.exe
C:\W... Read more

Read other answers
RELEVANCY SCORE 52

http://www.internetweek.com/security02/showArticle.jhtml?articleID=15600402


Attackers Gearing Up To Exploit Windows Messenger Security Hole

By Gregg Keizer, TechWeb News

Exploit code that takes advantage of a recent Microsoft vulnerability is out in the wild and could prove as dangerous as this summer's MSBlaster worm if attackers decide to focus their efforts, security analysts said Friday.

Released earlier this week, the exploit code--which has been crafted to run not only on attackers' Windows machines, but also on Linux and Unix boxes --crashes Windows systems not patched against a vulnerability released last week.

The vulnerability, which Microsoft rated as 'Critical' when it released several bulletins in its first-ever monthly patch roundup, is in the Windows Messenger Service. Not to be confused with Windows Messenger, Microsoft's instant messaging platform, Windows Messenger Service is used by applications to communicate with each other, and often by enterprise network administrators to alert users of such things as impending server shutdowns or the unavailability of print servers.

Most users will have had at least some experience with Windows Messenger Service, which is used by some spammers to pop up text message spam onto their desktops.

"The Windows Messenger Service vulnerability is clearly the most significant of those released last week by Microsoft," said Vincent Weafer, senior director of Symantec's secu... Read more

Read other answers
RELEVANCY SCORE 51.6

In full, on what appears to be a genuine MSIE warning (yellow ! mark) window, I get this:

"There is a security vulnerability from the TrojanSPM/LX. We recommend you DOWNLOAD one of the security software programs to prevent malware infections"

Does this mean I have TrojanSPM/LX? Or is it some scam to induce me to click the "OK" button on that popup?

Hijack This:

Logfile of HijackThis v1.99.1
Scan saved at 5:26:41 AM, on 9/22/2006
Platform: Windows XP SP2 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP2 (6.00.2900.2180)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\Program Files\Common Files\Symantec Shared\ccSetMgr.exe
C:\Program Files\Common Files\Symantec Shared\SNDSrvc.exe
C:\Program Files\Common Files\Symantec Shared\SPBBC\SPBBCSvc.exe
C:\Program Files\Common Files\Symantec Shared\ccEvtMgr.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\system32\drivers\CDAC11BA.EXE
C:\Program Files\Toshiba\Power Management\CeEPwrSvc.exe
C:\Program Files\TOSHIBA\ConfigFree\CFSvcs.exe
C:\WINDOWS\system32\DVDRAMSV.exe
C:\Program Files\Norton AntiVirus\navapsvc.exe
C:\Program Files\Norton AntiVirus\IWP\NPFMntor.exe
C:\WINDOWS\system32\svchost.exe
c:\TOSHIBA\Ivp\Swupdate\swupdtmr.exe
C:\Program Files\Common Files\Symantec Shared\CCPD-LC\symlcsvc.exe
C:\Program Files\TOSHIBA\Power Management\CePMTray.exe
C... Read more

A:... security vulnerability ... TrojanSPM/LX ...

Read other 8 answers
RELEVANCY SCORE 51.6

Security vulnerability in WinZip

http://www.eweek.com/article2/0,4149,1540329,00.asp

Security analysts on Friday reported that versions of the popular ZIP file management program WinZip have a serious security flaw.

According to security intelligence firm iDefense Inc., an error in the parameter parsing code in these versions "allows remote attackers to execute arbitrary code."

The attacker would have to construct a specially designed MIME archive (with one of .mim, .uue, .uu, .b64, .bhx, .hqx and .xxe extensions) and distribute the file users, the company explained.

Once opened, the attack would trick WinZip into executing code contained in the attacking file. iDefense said it had a functioning proof-of-concept attack demonstrating the problem.

The malicious file could be distributed by e-mail, on a Web page, or through peer-to-peer networks.

Files handled by WinZip are not normally executable, so many users are less-hesitant to launch them, even when they come from unknown sources. This problem makes those files much more inherently dangerous.

According to iDefense, versions 7 and 8, as well as the latest beta of WinZip 9 are vulnerable to this attack. However, the released Version 9 of WinZip is not vulnerable.

In addition to upgrading, users can prevent an attack by turning off automatic handling of these file types by WinZip in Windows Explorer. In Windows XP, choose Tools-Folder Options, select the File Types tab, scroll down to the appropriate file t... Read more

Read other answers
RELEVANCY SCORE 51.6

There's a serious Windoze security issue that's come up, what they call a 'zero day' exploit. It effects all machines running the Windows OS and effects up-to- date patched machines as well. Steve Gibson has a workaround posted on his site. Go here to check it out.
 

A:Serious Windows Security Vulnerability (what's new)

bump
 

Read other 1 answers
RELEVANCY SCORE 50.8

Advisory ID : FrSIRT/ADV-2006-3180Rated as : Low Risk Remotely Exploitable : YesLocally Exploitable : YesRelease Date : 2006-08-07Technical Description: A vulnerability has been identified in Microsoft Windows, which could be exploited by attackers to cause a denial of service. This flaw is due to a signedness error in the GDI library (gdi32.dll) when processing malformed WMF images, which could be exploited by attackers to crash an application linked against the vulnerable library (e.g. Internet Explorer) by tricking a user into visiting a malicious web page or opening a specially crafted image.A new unpatched vulnerability has been published, that can result in a Denial-of-Service (DoS) attack. Links from Secunia and FrSIRT are noted below. Microsoft Windows GDI Library WMF Image Handling Remote Denial of Service Vulnerabilityhttp://secunia.com/advisories/21377/http://www.frsirt.com/english/advisories/2006/3180

Read other answers
RELEVANCY SCORE 50.8

Microsoft has confirmed officially a zero-day security vulnerability affecting Internet Information Services (IIS). The security hole was initially reported just ahead of Christmas on December 23rd, and the Redmond company provided the first response at the end of the past week. So far, the issue in question affects version 6 of IIS on a fully patched Windows Server 2003 R2 SP2; however, additional IIS
releases might also be impacted. A Microsoft security program manager notes that

Microsoft is aware of the problem and that investigation into the matter has already been kicked off. At the same time, the program manager assured customers running IIS that it hasn?t detected any active attacks in the wild targeting the new 0-day flaw.

The vulnerability identified in Microsoft Internet Information Services (IIS) involves the incorrect manner in which the server deals with files with multiple extensions. As long as the multiple extensions are divided by the ?;? character, the IIS server handles them as ASP files.

A possible attacks scenario could be based on an exploit constructed out of malformed executables. Any malicious files uploaded to a vulnerable web server would circumvent any file extension protections and restrictions in place.

More/.........Microsoft Confirms 0-Day IIS Security Vulnerability - IIS 6.0 Security Best Practices can help mitigate the threat - Softpedia

A:Microsoft confirms 0-Day IIS security vulnerability

Update:





Quote:
We’ve completed our investigation into the claims that came up over the holiday of a possible vulnerability in IIS and found that there is no vulnerability in IIS.

What we have seen is that there is an inconsistency in IIS 6 only in how it handles semicolons in URLs. It’s this inconsistency that the claims have focused on, saying this enables an attacker to bypass content filtering software to upload and execute code on an IIS server.

The key in this is the last point: for the scenario to work, the IIS server must already be configured to allow both “write” and “execute” privileges on the same directory. This is not the default configuration for IIS and is contrary to all of our published best practices. Quite simply, an IIS server configured in this manner is inherently vulnerable to attack.


See the complete report at The Microsoft Security Response Center (MSRC) : Results of Investigation into Holiday IIS Claim

Read other 2 answers
RELEVANCY SCORE 50.4

Hi!

I recently just downloaded BT Online Security package (Norton Antivirus and Firewall). How ever this was not without problems!

I used to use Norton but when the license expired I thought I'd download the new Kaspersky Security Suite trial as I'd heard it was good. During the trial I upgraded my internet which had the free security package.

Everything was working fine until I tried to download said package. I read the instructions and uninstalled Kaspersky. Now the fun begins! I couldn't access BT's Security Software Centre, it didn't matter what I did it just refreshing the Start page. Until I re-installed Kaspersky.

After re-installing Kaspersky I could then proceed with select my BT software and downloading it. After the download finished I installed the software, but when it came to activate the cpu usage monitor leapt upto 100% and nothing happened. I could still use anything else fine but the activation would not take place!

The BT software activation program will not run unless Kaspersky is installed! Just shows a blank screen if it's not. I cannot access my hotmail emails and no online security scanners work.

I've got an infection somewhere haven't I? The last scan I did was with Kaspersky and that showed up clean. What can I do? Please!
 

A:Solved: Security Activation prob. & V high cpu usage!

Read other 16 answers
RELEVANCY SCORE 50.4

I recently secured my home wireless network using WPA2 PERSONAL. My laptop (recent purchase, Windows7) connects just fine. Now I find my wife's work laptop (two to three years old, Windows XP I think) will not connect. She requested that her network admin update the driver for her wireless card (Dell Wireless 1390 WLAN card - Broadcom). Still cannot connect at WPA2 level. I checked properties of her card and there is not an option for WPA2. There was an option for WPA so I selected that, went back to my router, and lowered my network security to WPA. Now she is able to connected.

I'm far from well schooled on wireless security. Is there anything else I should be doing or are we stuck with WPA?
 

A:Solved: Wireless Security Level too high for laptop

JoeFrank

If the card doesn't support WPA2 encryption, you're stuck with using WPA. WPA, while obviously not the strongest choice, is still pretty strong. The good news is....you're not using WEP.

Curtis
 

Read other 3 answers
RELEVANCY SCORE 50.4

Hi, all.
 
I've now gotten the Internet Security 2013 virus twice.  It was MrSEC.com both times, by the way, and even if I try to avoid the site, a lot of reputable sports sites link there.  The last one was on a link off the USA Today sports home page!
 
I have my home computer locked down with Spyware Blaster and scan with Malware Bytes and I know I've been to MrSEC.com accidently since they've been infected without any problem.  So something that I have configured at home (probably by Spyware Blaster) blocks it.
 
The problem I have is that my company doesn't give me admin rights or let me install software so I can't run Spyware Blaster on my work computer.  Yes, coming in through a basic user account, the Trojan rogue can break things, but the internet settings are locked such that I can't get in to block it.
 
I was wondering if anyone knew what setting Spyware Blaster changes to block it because I could temporarily request an "admin login" that would let me change them but not install a SW package.
 
Thanks,
 
---------------
Now, before you lock the thread because you misread it thinking that I'm asking for help getting around my company's security, I'm not.  The company WILL let me have temporary admin rights to make settings changes.  They will NOT let me install an unvalidated application.  So what I'm asking is" What is the setting that Spyware Blaster is using to block Internet Securit... Read more

A:What vulnerability does the Internet Security 2013 rogue use?

What is the setting that Spyware Blaster is using to block Internet Security 2013These settings are developed by the program makers and as such are not usually allowed for us to access - Look it as "Will your Company / Manager share all of the personal company records and dealings with ME" ?? Same thing exactly. Do you wish for help to try and remove this infection, or are you just asking for information on Spyware Blaster program ?? We do not have specific inside information on most Antimalware programs, and it is your and your company's responsibility to install a Decent Antivirus and Decent matching Antimalware programs.Will your Manager / Company allow you to use this program fully on this computer ? If not we can not help you ! If you are asking for the company, then why are you asking and not installing the program ?? First you must NEVER access MrSEC.com if you know the site is infected - Any program will not stop you from using a keyboard --Adding the site to your Hosts file may prevent you from accessing the site, but nothing is 100%. Please fully read Antivirus, Antimalware, And Antispyware Resources and also post back with ALL of the security programs that are installed on the problem computerNow read How Malware Spreads - How did I get infected and this may help.I was wondering if anyone knew what setting Spyware Blaster changes to block it because I could temporarily request an "admin login" th... Read more

Read other 5 answers
RELEVANCY SCORE 50.4

Was prompted to update Java and so I did. After updating Java, I find the Java plugins in Firefox 24 deactivated. The Java Deployment Toolkit plugin and Java Platform SE 7 U45 plugins in Firefox 24 are unsafe to use. See screenshot below:

The two Firefox plugins that are deactivated due to security vulnerabilities are as follows:
1. Java Deployment Toolkit 7.0.450.18 10.45.218
2. Java (TM) Platform SE 7 U45 10.45.218

The "more information" link that you see in the above screenshot are:

https://addons.mozilla.org/en-US/firefox/blocked/p428
https://addons.mozilla.org/en-US/firefox/blocked/p463

"JAR file manifest does not contain the Permissions attribute"

My system is:
OS: Windows 7 Home Premium
Firefox: 24
Java: SE 7

Anyone who knows how to fix the Java plugin security vulnerability or have further info?
 

A:Firefox 24 - Java Plugin Security Vulnerability

Read other 11 answers
RELEVANCY SCORE 50.4

Attackers have found another hole in Microsoft's Office products. Yesterday, Symantec reported that it has discovered a targeted attack that takes advantage of an unpatched vulnerability in Microsoft's PowerPoint software. This PowerPoint attack was discovered late Wednesday by a Symantec customer, who received a Chinese-character e-mail from a Gmail account. The e-mail contained a PowerPoint attachment that installed two pieces of malicious code when opened: a Trojan horse program, called Trojan.PPDDropper.B, and a backdoor program called Backdoor.Bifrose.E. The backdoor program tries to cover its tracks, by writing over the original PowerPoint document. It then awaits instructions from the attackers, who can use it to control the infected system Here is another link to the information about the Vulberabilityhttp://www2.csoonline.com/blog_view.html?CID=22959

A:Microsoft Office Powerpoint Security Vulnerability

Yep another bug to contend with. More here about it.

Read other 1 answers
RELEVANCY SCORE 50.4

 

 
Executive Summary

Microsoft is aware of a security feature bypass vulnerability in Secure Channel (Schannel) that affects all supported releases of Microsoft Windows. Our investigation has verified that the vulnerability could allow an attacker to force the downgrading of the cipher suites used in an SSL/TLS connection on a Windows client system. The vulnerability facilitates exploitation of the publicly disclosed FREAK technique, which is an industry-wide issue that is not specific to Windows operating systems. When this security advisory was originally released, Microsoft had not received any information to indicate that this issue had been publicly used to attack customers.
We are actively working with partners in our Microsoft Active Protections Program (MAPP) to provide information that they can use to provide broader protections to customers.
Upon completion of this investigation, Microsoft will take the appropriate action to help protect customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.

Mitigating Factors
A server needs to support RSA key exchange export ciphers for an attack to be successful.

Recommendation 
Please see the Suggested Actions section of this advisory for workarounds to disable the RSA export ciphers. Microsoft recommends that customers use these workarounds to mitigate this vulnerability.
 
Read more here.... Read more

A:Vulnerability in Schannel Could Allow Security Feature Bypass

https://technet.microsoft.com/en-us/library/security/3046015#_Apply_Workarounds

 

Suggested Actions
 
Apply Workarounds
Workarounds refer to a setting or configuration change that does not correct the underlying issue but would help block known attack vectors before a security update is available.
Disable RSA key exchange ciphers using the Group Policy Object Editor 

 
 
so, what can I do if my version of windows lacks the requisite group policy editor?

Read other 5 answers
RELEVANCY SCORE 50.4

We have a bunch of Toshiba laptops, e.g. Satellite P70-A

Intel just announced a critical security vulnerability: https://security-center.intel.com/ad...nguageid=en-fr

Reports are already coming out that the vulnerability affects far more computers than the scope of the disclosure: https://semiaccurate.com/2017/05/01/...tel-platforms/

Will Toshiba be as pro-active as the other main brands and push out BIOS fixes?

Read other answers
RELEVANCY SCORE 50.4

My AV program (Trend-Micro PC-cillin Internet Security 2006) found a security vulnerability on my computer, but I feel that perhaps I should not install the update since it appears not to apply to my situation. Here are the details of the security vulnerability:

Risk Level - Very High

Target - Office

Related Bulletin - MS06-027

I am given options to run updates both for Windows and for Office.

Windows is already up-to-date, but whenever I clicked on Run Office Update, I get the following notice:

The previous site might require the following ActiveX control: 'Office Update Installatiion Engine' from 'Microsoft Corporation'. Click here to install....

I have been told that installing ActiveX controls can cause serious problems, so I'm a bit leery about installing them. Also, the MS06-027 bulletin indicates that the affected software are several versions of both MS Works Suite and MS Word, and one version of MS Word Viewer. I have none of these programs on my computer. While I do have a version of Open Office on my PC, Open Office is not listed as affected software.

I would greatly appreciate hearing from anyone who is able to tell me what action, if any, I should take.

Thank you.
 

Read other answers
RELEVANCY SCORE 50.4

Hi, all.
 
I've now gotten the Internet Security 2013 virus twice.  It was MrSEC.com both times, by the way, and even if I try to avoid the site, a lot of reputable sports sites link there.  The last one was on a link off the USA Today sports home page!
 
I have my home computer locked down with Spyware Blaster and scan with Malware Bytes and I know I've been to MrSEC.com accidently since they've been infected without any problem.  So something that I have configured at home (probably by Spyware Blaster) blocks it.
 
The problem I have is that my company doesn't give me admin rights or let me install software so I can't run Spyware Blaster on my work computer.  Yes, coming in through a basic user account, the Trojan rogue can break things, but the internet settings are locked such that I can't get in to block it.
 
I was wondering if anyone knew what setting Spyware Blaster changes to block it because I could temporarily request an "admin login" that would let me change them but not install a SW package.
 
Thanks,
 

A:What vulnerability does the Internet Security 2013 rogue use?

mea culpa. I misread/misinterpreted what the OP of the thread stated. Since the reply I made was so off base I am deleting it and have admitted my mistake to the OP in another topic he started & apologized to him.

Read other 1 answers
RELEVANCY SCORE 50

recently i have a vundo/virtumonde infection which i eventually got rid of and has sunsequently re-formatted my pc(as it needed it had'nt been done in awhile)but now everytime i run the security inspector it keeps detecting the weakness in my IP address,it never used to do it!!is there anychance it is being redirected somewhere else due to the virus i had!!though i thought re-formatting usually wipes anything remnants of a virus away!!

not sure how much of a worry this is so any advice would be greatfully appreciated.

cheers

A:Why Does Norton Security Inspector Keep Detecting Vulnerability In My Ip Address?

with respect you have an active HJT log on here so all advise needs to be on there and NOT on this threadHJT thread ............ http://www.bleepingcomputer.com/forums/t/145057/hjt-log-poss-delf-ux-trojan/

Read other 3 answers
RELEVANCY SCORE 50

Any chance to expect a fix from Lenovo/Intel for this HUGE problem for older Lenovo products affected T4xx... ?Intel AMT CVE-2017-5689 mjg59theregister Red alert!

Read other answers
RELEVANCY SCORE 49.2

I own 2 Lenovo laptops. An ideapad y700 (still under warranty) and a flex 3 (just out of warranty). Both are in need of bios patches to address the Intel ME vulnerability, and yet nothing posted with respect to these models. Any Lenovo computer over a year old has been ignored so far. This is unacceptable Lenovo, would you please do what is right and provide us some answers?

Read other answers
RELEVANCY SCORE 49.2

Microsoft is investigating public reports of a vulnerability in all supported versions of Internet Explorer. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9. Applying the Microsoft Fix it solution, "CVE-2013-3893 MSHTML Shim Workaround," prevents the exploitation of this issue. See the Suggested Actions section of this advisory for more information.Microsoft Security Advisory (2887505)Security Advisory 2887505 and Microsoft Fix it solutionOfficial Microsoft Fix it

A:Microsoft Security Advisory (2887505): Vulnerability in Internet Explorer

The attack using this vulnerability depends on a MS Office / MSDN DLL (hxds.dll). It is used to display help in MS Office and MSDN Library. Typically, in all products that show help using ms-help:// protocol.
 
Using hxds.dll for attacking was known for many months in the underground world. So its nothing new. If you use IE and also MS Office, then be careful.
 
My personal suggestion is to just use Chrome.

Read other 5 answers
RELEVANCY SCORE 48.8

Password-cracking chip causes security concerns.

A technique for cracking computer passwords using inexpensive off-the-shelf computer graphics hardware is causing a stir in the computer security community.

Using the "massively parallel processing" capabilities of a graphics processing unit (GPU) - the processor normally used to produce realistic graphics for video games, the speed of password cracking was increased by a factor of 25 - and a Russian company has filed for a U.S. patent on the technique.

How vulnerable is your computer's GPU?

-- Tom
 

A:Nvidia GeForce 8800 Ultra and lesser GPUs security vulnerability

Time to start making really really long pass phrases.
 

Read other 1 answers
RELEVANCY SCORE 48.8

Hiya

An identified security vulnerability in Microsoft® Windows 2000® could allow an attacker to take control of the computer. This issue is most likely to affect computers used as Web servers. You can help protect your computer from this and other identified issues by installing this update from Microsoft.
System Requirements
Supported Operating Systems: Windows 2000

Windows 2000 Professional
Windows 2000 Server
Windows 2000 Advanced Server
Internet Information Server 5.0
http://www.microsoft.com/downloads/...45-5145-4844-b62e-c69d32ac929b&DisplayLang=en

Regards

eddie
 

Read other answers
RELEVANCY SCORE 48

December 17, 2007 (Computerworld) -- Microsoft Corp. confirmed today that it is investigating reports that a security update for Internet Explorer issued last week has crippled some users' ability to get on the Web.

Users started posting messages to multiple Microsoft support newsgroups almost immediately after Microsoft released the MS07-069 security bulletin on Dec. 11, saying that they were unable to connect to the Internet, either because IE refused to open or because when it did open, it could not reach various sites.

"About 60% of the time, I would get an 'Internet Explorer has encountered a problem and must close' dialog," reported Bill Drake on the Windows Update newsgroup. Others echoed the problem on IE-specific forums, noting that both IE6 and IE7 balked at loading, or while loading some pages, particularly home pages, on both Windows XP and Windows Vista machines.

Harold Decker, operations manager with San Diego-based Gold Peak Industries NA Inc., started fielding calls from users last Wednesday morning as soon as people hit the office. "I stopped everyone who hadn't installed the update from installing it after four PCs out of 14 had the problem," said Decker, who manages a total of 35 Windows XP SP2 machines. "We're a pretty plain shop, all our systems run Windows XP SP2 and IE6," said Decker, "but some kept crashing. It seemed limited to the window that was opened, and changing the home page ... Read more

A:MS07-069 update crashes IE6, IE7 on Windows XP, Vista

follow-up: MS fix

this KB article contains a registry fix for the issue.
 

Read other 1 answers
RELEVANCY SCORE 48

my pc has been affected by ms07,ms08 series f viruses and the computer deosnt start in normal mode.can any one henp me to detect and remove it

A:help me to remove ms07,ms08 series of viruses

Hello emprormohit,

Does Windows load for you in Safe Mode?

Read other 2 answers
RELEVANCY SCORE 47.6

BIOS is not accepting the security password that I have set up to enter to access BIOS settings. I have removed the battery to the motherboard overnight, and repeatedly switched the CLR CMOS jumpers from normal to clear position, then booted, then returned them to the normal position. None of these clear the BIOS security password - I get three tries, then the PC boots to windows. There is no problem accessing windows, which works normally - I just can't clear the BIOS security password. I tried recovering the password and deleting CMOS settings using MS-DOS programs, which was unsuccessful. I am out of ideas. Halp! 

Read other answers
RELEVANCY SCORE 46.4

I'm running Norton 360 Version 4. When I clear the Full History I get the message. Clear History Security Alert The selected action did not succeed. But it looks like it did clead the history. Any Help???
 

A:Norton 360 Ver4 Clear History Security Alert

please do not duplicate posts
closing this one
continue here
http://forums.techguy.org/all-other-software/998208-norton-360-ver-4-scheduled.html
 

Read other 1 answers
RELEVANCY SCORE 46

Unable to clear fingerprint data in HP client security manager. Which is why I am getting an error "The specified identity and sub-factor are already enrolled in the database" and am unable to register my index and middle finger to set up fingerprint authentication in HP Client Security Manager. Any help would be greatly appreciated. The product is still in warranty.

Read other answers
RELEVANCY SCORE 45.6

 
LAS VEGAS—During his keynote and a press conference that followed here at the Black Hat information security conference, In-Q-Tel chief information security officer Dan Geer expressed concern about the growing threat of botnets powered by home and small office routers. The inexpensive Wi-Fi routers commonly used for home Internet access—which are rarely patched by their owners—are an easy target for hackers, Geer said, and could be used to construct a botnet that "could probably take down the Internet." Asked by Ars if he considered home routers to be the equivalent of critical infrastructure as a security priority, he answered in the affirmative.

Security expert calls home routers a clear and present danger
 
 
.

A:Security expert calls home routers a clear and present danger

It's a well known threat, but mostly ignored by consumers. Thanks for bringing this up Nick
 
Other firmware you can load onto your router to avoid this include DD-WRT and Tomato. There are other free open-source projects too that do the same thing for other routers.
 
Sadly many people cannot load these firmware products as their routers don't support them... So in future when buying a new router, a prerequisite might include that it is compatible with firmware like this.
 
Not that that will help us if the router-bot has brought down the internet as a whole.

Read other 2 answers
RELEVANCY SCORE 44.8

Hi all,I came across this and thought it may be usefull to a few people here on the forums, although if you use 16 bit applications you may want to keep this disabled:This security hole is said to affect 32bit Windows operating systemsA CRITICAL FLAW has been found in the Windows NT trap handler that makes all Windows machines wide open to hackers. The problem has been a feature of every Windows system for the last 17 years and no one has noticed. According to Full Disclosure, the security hole in Windows allows users with restricted access to escalate their privileges to system level. It can be done on all 32-bit versions of Windows from Windows NT 3.1 to Windows 7. This is not likely to bother consumers much, but corporate IT managers will be wetting themselves.And the removal instructions. Enabling the "Prevent access to 16-bit applications"1. Start2. Run (Windows key + R)3. Type gpedit.msc and press enter (Run as Administrator if need be) 4. Expand - Computer Configuration5. Expand - Administrative Templates6. Expand - Windows Components 7. Open - Application Compatibility section.8. Double Click 'Prevent access to 16 bit applications'9. Check Enabled10 Click Apply then OkHere is a screenshot to help those having any troubles: http://i24.photobucket.com/albums/c11/smak...6bitdisable.jpgSources:http://www.theinquirer.net/inquirer/news/1...nt-windows-flawhttp://www.neowin.net/news/microsoft-issue...s-vulnerability

A:17 year old Windows flaw discovered in Windows 7. How to close this security vulnerability

According to the same site microsoft had promised to patch the hole in security http://www.theinquirer.net/inquirer/news/1...osoft-patch-bug. I am afraid I am one of those people who just has automatic updates on and hardly checks to see what I am actually downloading. I guess if some person who shouldnt have admin access especially in a company or business was to get it this way microsoft would have to do a lot of explaining. Its amazing that only after 17 years this hole has been found.

Read other 1 answers
RELEVANCY SCORE 44

High Memory usage occurred in KIS 2016 (version: 16.0.1.445 (c)) .

Is this normal?

 

A:High Memory usage occurred in Kaspersky Internet Security 2016. Internet Security this normal?

Is it scanning, or at boot time?
 

Read other 16 answers
RELEVANCY SCORE 43.2

Several times recently I've received MicroSoft Vulnerability Check messages, and I'm not sure what, if anything, I should do in response.

The most recent check returned the following "problems":

Very High Office MS06-027
Very High Office MS06-060
Very High Windows MS06-061

I just ran Windows Update and found that there were no High-Priority Updates to run. I did install the following three optional program updates:

Network Diagnostic Tool KB91440

Update for Windows XP KB920342

MicroSoft Base Smart Card Cryptographic Service Provision Package x86 KB909520

Do I need to run the Office Update? I don't have MicroSoft Office on my computer, and I figure that's what it's referring to. I use OpenOffice instead.

Is this a matter I need to be concerned about, or am I getting these Vulnerability Check results by mistake? I would greatly appreciate hearing from anyone who can explain what's going on.

Thank you.
 

A:Solved: Results of MS Vulnerability Check

Read other 7 answers
RELEVANCY SCORE 42.8

Hello there i wondered if you could help me please, everytime i select my homepage from internet explorer taskbar the web page goes to a screen titled with 401 MPV Warning (Privacy vulnerability detected). Is there a way in removing this ? I`ve enclosed the hijack this info below. Thankyou for your time.
Logfile of HijackThis v1.99.1
Scan saved at 19:35:54, on 10/04/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgamsvr.exe
C:\PROGRA~1\Grisoft\AVGFRE~1\avgupsvc.exe
C:\Program Files\Belkin\Belkin Wireless Network Utility\WLService.exe
C:\Program Files\Belkin\Belkin Wireless Network Utility\WLanCfgG.exe
C:\WINDOWS\System32\nvsvc32.exe
C:\WINDOWS\system32\ZoneLabs\vsmon.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\RUNDLL32.EXE
C:\WINDOWS\SOUNDMAN.EXE
C:\Program Files\QuickTime\qttask.exe
C:\PROGRA~1\INTERN~2\MEDIAKEY.EXE
C:\Program Files\CyberLink\PowerDVD\PDVDServ.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Saitek\Software\Profiler.exe
C:\Program Files\Saitek\Software\SaiSmart.exe
C:\PROGRA~1\INTERN~2\KBOSDCtl.EXE
C:\Program Files\Saitek\Software\SaiMfd.exe
C:\PROGRA~1\INTERN~2\KCodeMsg.EXE
C:\Program Files\Zone Labs\Zo... Read more

A:Solved: 401 MPV Warning (Privacy vulnerability detected)

Read other 14 answers
RELEVANCY SCORE 42.8

Hello,

I received the following message: Privacy Vulnerability Detected (401 MPV Warning). I located this site because I looked up the message in yahoo and this site popped up . Im not sure what this is and I dont know if It is serious or not but any help would be appreciated. I also downloaded Hijackthis and my log is below. Thanks for any help that can be provided.

Logfile of HijackThis v1.97.7
Scan saved at 4:26:30 PM, on 5/29/2005
Platform: Windows XP SP1 (WinNT 5.01.2600)
MSIE: Internet Explorer v6.00 SP1 (6.00.2800.1106)

Running processes:
C:\WINDOWS\System32\smss.exe
C:\WINDOWS\system32\winlogon.exe
C:\WINDOWS\system32\services.exe
C:\WINDOWS\system32\lsass.exe
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\System32\svchost.exe
C:\WINDOWS\system32\spoolsv.exe
C:\WINDOWS\Explorer.EXE
C:\WINDOWS\System32\DeltTray.exe
C:\WINDOWS\System32\spool\DRIVERS\W32X86\3\E_S4I2G1.EXE
C:\Program Files\Hewlett-Packard\HP Share-to-Web\hpgs2wnd.exe
C:\Program Files\Hewlett-Packard\Digital Imaging\Unload\hpqcmon.exe
C:\Program Files\Network Associates\VirusScan\SHSTAT.EXE
C:\Program Files\Network Associates\Common Framework\UpdaterUI.exe
C:\Program Files\QuickTime\qttask.exe
C:\Program Files\Common Files\Real\Update_OB\realsched.exe
C:\Program Files\Hewlett-Packard\HP Share-to-Web\hpgs2wnf.exe
C:\Program Files\Fhrdm\Sliuuk.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\System32\rundll32.exe
C:\WINDOWS\System32\rundll32.exe
C:\Program Files\Netscape\Netscape\Netscp.exe
C:\Program Files\A... Read more

A:Solved: Privacy Vulnerability Detected (401 MPV Warning)

Read other 12 answers
RELEVANCY SCORE 42.8

I've inherited an HP Elitebook, which has beefed-up security features commensurate with a business-class laptop.

I don't have any real secrets to protect other than credit card numbers and such, and I know how to avoid those risks. I've been playing around with this machine's security features just to learn how to use them and to see how well I can button down the machine in case I ever have to do it for real..

I understand the potential problems with a cold boot attack to capture the Bitlocker key, and so am using two-factor authentication -- a fingerprint and a password to open the TPM. Another password to start up Windows and a screensaver password. I understand that the Bitlocker key is still in system memory when the computer is sleeping, so the machine is set up to use hibernation rather than sleep if I don't want to turn it off completely.

All the normal things a prudent user would enable on a less-expensive laptop are in place -- firewall, A/V, etc. No sense worrying about whether the NSA has a backdoor into Bitlocker.

Pause here for the first question -- any gaping security holes so far?

I've also read about the flaw in which system memory can be accessed and the Bitlocker key read through the Firewire port and the PCExpress port, both of which this machine has. That's only when the computer is awake or asleep..

Second question: I use Firewire very rarely and PCExpress cards not at all. Could I block this potential security... Read more

A:Solved: firewire/pc express vulnerability and Bitlocker

Read other 6 answers
RELEVANCY SCORE 41.6

The system was working OK when I got up Friday morning, no alerts or freeze-ups, an overnight download from my seedbox had completed OK, so, before running the DVD disc cleaner disc (I run this every 20 burns) , I rebooted.
During reboot, boot failed - black screen with "DISC_READ_ERROR"
I booted to Seatools for DOS CD (HD is Maxtor 320Gb SATA) and ran both the short & long tests - both OK. But, line in RED text reads "Security Freeze Locked" . I cannot boot to the WinXP version of Seatools - "DISC READ ERROR" .
So far I have tried/done the following :
Ran Seagate Disc Utility (2005) but it reported "Drive not supported (because utility only for IDE drives ?)
Ran PowerMax 4.23 from bootable CD - took almost 2 hours but reported drive entirely OK !
I have also flushed the BIOS - made no difference "DISC READ ERROR" , including with 'default' settings.
There are NO passwords set on the BIOS or drive.
I can boot to Linux live CDs (have tried old versions of Knoppix & DSL). Am now downloading (from my Win98 box !) Ubuntu & KuBuntu live CDs) But, what would/could I do from Linux that I haven't already done from DOS ? I am NO Linux geek (wish I were !) !
Have 'Googled' til my fingers ache, trolled several forums, but, nothing at all useful found.

I keep coming back to the central question - what triggers the 'lock' order, where does it come from (BIOS, WinXP, HD firmware ??) , where is the... Read more

A:How to clear "Security Freeze Locked" on XP boot?

Read other 7 answers
RELEVANCY SCORE 41.6

Tech Support Guy System Info Utility version 1.0.0.2
OS Version: Microsoft Windows 10 Home, 64 bit
Processor: Intel(R) Core(TM) i5-4210U CPU @ 1.70GHz, Intel64 Family 6 Model 69 Stepping 1
Processor Count: 4
RAM: 8075 Mb
Graphics Card: Intel(R) HD Graphics Family, 1024 Mb
Hard Drives: C: Total - 381545 MB, Free - 348400 MB; D: Total - 550703 MB, Free - 550543 MB; F: Total - 30516 MB, Free - 11746 MB;
Motherboard: ASUSTeK COMPUTER INC., TP500LA
Antivirus: ESET Smart Security 9.0.386.0, Updated and Enabled

Wanting to get the best consumer/small business Modem/Router with a good Firewall and high security. I asked Dell Sonicwall TZ support and they said those routers were a little too much for my circumstance. I need something that would meet most ISP"s standards, as universal as possible, and would last as long as possible. I have had terrible problems with hackers and spies along with information theft. FYI my current ISP Midco has this list of approved Routers: https://www.midco.com/services/internet/modems/
 

A:High Security Router

Read other 16 answers
RELEVANCY SCORE 41.6

HI,i would like to ask you to help me please...After rebooting my Laptop i can't download any programs like Divx Player or VLC Player or Skype and e.t..
The message i am getting for example for Divx Player is:

High security alert!!!

You are not permitted to download the file "DivXInstaller.exe".
URL = http://download.divx.com/divx/DivXInstaller.exe

Please tell me what can i do.

A:High Security Alert...

Are you on a admin account?

Read other 1 answers
RELEVANCY SCORE 41.2

I get

http://img.photobucket.com/albums/v285/nhackmeep/helpmeeef.gif

every time I open up IE or iTunes. Why?
 

A:Computer security settings too high

Read other 8 answers