Microsoft Graphics Component Could Allow Remote Code Execution
07 November 2013
Remote exploitation of a memory corruption vulnerability in multiple Microsoft products could allow attackers to execute arbitrary code on the targeted host. The issue occurs with how the TIFF codec in Microsoft's graphics component handles crafted TIFF files. Processing crafted TIFF files can corrupt system memory and create an exploitable condition.
CVSS v2 Base Score: 9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Posted on 16 December 2014. | APTs have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cybercriminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before.
Posted on 12 December 2014. | Make sure you understand the service level agreements with your cloud service provider. They will often replicate virtual machines in the cloud to ensure availability and make sure they maintain their SLAs. Ask them how they are making sure that your apps and data stay where they belong.
Posted on 11 December 2014. | Along with its predictions, which examine the likelihood of network security prophecies next year, WatchGuard also included 5 security trends NOT worth worrying about in 2015.
Posted on 10 December 2014. | Cyber attacks have reached a tipping point in terms of quantity, length, complexity and targets. As cyber threats are growing and expanding to new targets, more than half of respondents reported changes to their security process, protocols, and/or mandates.