[ale] semi OT - critical Windows security updates / MySQL security flaw

Ron Frazier (ALE) atllinuxenthinfo at techstarship.com
Wed Jun 13 21:00:08 EDT 2012


Hi all,

Here are a couple of security notes I thought I'd pass along that I 
heard about on the Security Now podcast.

Some kind of flaw in MySQL was discovered.  I don't know anything about 
it, but it might affect some of you.  A little googling found this:

https://www.esiss.ac.uk/general/mysql-security-flaw/

I haven't had a chance to research it further.

------------------------

I know some of you are required (kicking and screaming) to work with 
Windows.  Microsoft just released a number of critical patches which 
should be implemented as quickly as possible.  If this affects you, go 
run windows update, check for updates, and keep installing them until 
there are no more found.  Note that, on some of my systems, for some 
weird reason, the definition updates for the Microsoft Security 
Essentials anti malware system are flagged as optional.  I have to go in 
manually and tell the system to install them.  I don't know if they 
would get automatically installed later or not.  I don't want to take 
the chance.

There is another critical update which didn't get into the patch batch.  
Here's how to install it manually with the Microsoft Fix It function.

Normally, I would advise against clicking links in email like the one 
I'm about to share.  However, this one is safe, and you can click the 
link below.  As an alternative, you could type it into the browser 
address bar.

Using Internet Explorer, not FireFox, navigate to this link: 
http://support.microsoft.com/kb/2719615 .

For this to work, support.microsoft.com or *.microsoft.com will have to 
be in the trusted sites list under Options, Security if the security 
settings have been increased past the defaults.  Also, I recommend that 
microsoft.com be allowed to post cookies and to create popup windows.

This leads to a Microsoft knowledge base article about a vulnerability 
which was not patched in the automatic patches.  Scroll down a little 
ways to what would be about page 2 if the page were printed.  You will 
see two graphical buttons which have a picture of a man with a wrench, 
and the words Fix It.  Click the button under the heading Enable.  This 
will eliminate the vulnerability which would, otherwise, allow an 
attacker to take over the computer remotely if a malicious website were 
inadvertently visited which exploited this problem.

You may then have to click a Run button on one window, then on a second 
window.  Agree to the terms.  Click next.  Say yes to authorize the 
process when asked.

In the UNLIKELY event that running the fix causes any operational 
problems, you can go back and disable it.  However, this is NOT 
recommended, since that would leave the computer vulnerable to attack.

Just thought I'd pass this along in case it affects some of you.

Sincerely,

Ron

-- 

(To whom it may concern.  My email address has changed.  Replying to former
messages prior to 03/31/12 with my personal address will go to the wrong
address.  Please send all personal correspondence to the new address.)

(PS - If you email me and don't get a quick response, you might want to
call on the phone.  I get about 300 emails per day from alternate energy
mailing lists and such.  I don't always see new email messages very quickly.)

Ron Frazier
770-205-9422 (O)   Leave a message.
linuxdude AT techstarship.com



More information about the Ale mailing list