Preview

Unit 2 Assignment 2

Powerful Essays
Open Document
Open Document
340 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Assignment 2
1. 2401593 CVE-2010-3213: Vulnerability in outlook Web access could allow elevation of privilege. Microsoft Server Exchange 2003 and 2007 2264072 CVE-2010-1886: Elevation of privilege using Windows service Isolation Bypass. Windows Server 2003 and 2008 980088 CVE-2010-0255: Vulnerability in Internet Explorer could allow Information Disclosure. Windows XP 975497 CVE-2009-3103: Vulnerabilities in SMB could allow remote code execution. Windows Vista Service Pack 1 and 2 98343 CVE-2010-0817: Vulnerability in SharePoint could allow elevation of privilege. Microsoft SharePoint Version 2.0
2. Only two from the five listed in question one are privileged elevation. 2264072 CVE-210-1886 and 98343 CVE-210-0817. They are of importance but not considered a high priority issue.
3. Advisory Number: 977981 Solution: This security update resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Advisory Number: 979352 Solution: This security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Advisory Number: 954157 Solution: The update also removes the ability for this codec to be loaded when browsing the Internet with any other applications. By only allowing applications to use the Indeo codec when the media content is from the

You May Also Find These Documents Helpful

  • Good Essays

    A security breach has been identified within a small Microsoft workgroup LAN. The workgroup consists of three primary workgroups which contain group membership lists of users within the Active Directory infrastructure that currently exists on the SMB Server that is located within the confines of the LAN structure. The security breach, which is defined as any event that results in a violation of any of the CIA (confidentiality, integrity, availability) security principles, was caused by the SMB server being accessed by an unauthorized user due to a security hole that was detected by the server software manufacturer the previous day. The security patch will not be available until possible as long as three days, but hopefully within that timeframe. In addition, the LAN administrator needs at least one week (minimum) to download, test, and install the patch.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Itm Slp Paper Module 1

    • 643 Words
    • 3 Pages

    Web browsing has become a popular internet tool in today’s society. It has enhanced everyday demands with the click of mouse or keyboard. With technology at your fingertips, no question has been left without an answer. By exploring all the pros and cons that come along with different web browsers, each one play a major role for everyone throughout the world. With this being said, being used, everyone has something different that catches their eye about every browser but having only one favorite browser that is used on a daily basis. The world has changed tremendously. Just a decade ago, the internet was dominated by one browser: Microsoft Internet Explorer (IE). By doing this we’ve selected different internet browsers for information. The information that has been received on a day to day basis through the newspaper is no longer needed…

    • 643 Words
    • 3 Pages
    Good Essays
  • Better Essays

    There are many issues related to the disclosure of the vulnerabilities described in this document. Ideally this document…

    • 4017 Words
    • 17 Pages
    Better Essays
  • Good Essays

    These threats have changed the face of Internet security. These vulnerabilities allow attackers to install malicious files on a vulnerable computer when a user visits a website hosting an exploit. To carry out this attack, an attacker must exploit an arbitrary vulnerability that bypasses Internet Explorer security settings. The attacker can then execute malicious files installed by the initial security weakness. Also, an attacker can exploit this vulnerability by enticing a victim to open a malicious Web page. A…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    Cross-site scripting is a type of computer security vulnerability typically found in web applications that enables attacks to inject client side script into web pages viewed by others…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 4 MBSA Scan IT1400

    • 527 Words
    • 3 Pages

    Result: The Automatic Updates feature has not been configured on this computer. Please upgrade to the latest…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Since this information pertains directly to the application of web-based information security by Core & Main, the statement was not modified and/or paraphrased, in an effort to leave the official words and/or thoughts of the company unaltered and unmodified.…

    • 863 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    File Upload Via Hsbcnet

    • 4761 Words
    • 20 Pages

    All browser versions must be supported by 128-bit encryption (this is the highest level of protection for all internet communications and financial transactions). To check the level of security being used double click the security padlock at the bottom right of the browser – this will establish the level of security being used. The best way to check if you have 128-bit encryption in Internet Explorer is to Click on ‘Help’ in the toolbar, then ‘About Internet Explorer’ and check the cipher strength is 128-bit. If your equipment meets the above…

    • 4761 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    What was the business impact of this software problem, both for McAfee and for its customer?…

    • 287 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Sdl Series

    • 2896 Words
    • 12 Pages

    Article #3: The Microsoft Security Org Chart Article #5: Microsoft Security Toolbox Article #6: Microsoft’s Security Response Article #7: Evolution of the Microsoft SDL Article #8: Microsoft SDL Investigation: The Wrap Up…

    • 2896 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Sfdsfdsdfsdf

    • 611 Words
    • 3 Pages

    ^ Security Flaws in Online Banking Sites Found to be Widespread Newswise, Retrieved on July 23, 2008.…

    • 611 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    · Latest editions of internet security software should not affect access unless settings have been changed. You…

    • 400 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In July 2000, a vulnerability to buffer overflow attack was discovered in Microsoft Outlook and Outlook Express. A programming flaw made it possible for an attacker to compromise the integrity of the target computer by simply it sending an e-mail message. Unlike the typical e-mail virus, users could not protect themselves by not opening attached files; in fact, the user did not even have to open the message to enable the attack. The programs' message header mechanisms had a defect that made it possible for senders to overflow the area with extraneous data, which allowed them to execute whatever type of code they desired on the recipient's computers. Because the process was activated as soon as the recipient downloaded the message from the server, this type of buffer overflow attack was very difficult to defend. Microsoft has since created a patch to eliminate the…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    was introduced or manifested in deployed software to when access was removed, a security fix…

    • 653 Words
    • 4 Pages
    Good Essays