Security News > 2017 > January > Second Try at Windows LSASS Patch Addresses Vulnerability (Threatpost)

2017-01-11 18:01
Microsoft on Tuesday patched a vulnerability in LSASS, the second attempt it has taken at fixing a remote denial-of-service issue in the critical Windows process.
News URL
http://threatpost.com/second-try-at-windows-lsass-patch-addresses-vulnerability/123015/
Related news
- ThreatLocker Patch Management: A Security-First Approach to Closing Vulnerability Windows (source)
- Microsoft Patches 125 Flaws Including Actively Exploited Windows CLFS Vulnerability (source)
- PipeMagic Trojan Exploits Windows Zero-Day Vulnerability to Deploy Ransomware (source)
- WhatsApp vulnerability could be used to infect Windows users with malware (CVE-2025-30401) (source)
- Microsoft: Windows CLFS Vulnerability Could Lead to ‘Widespread Deployment and Detonation of Ransomware’ (source)
- April's Patch Tuesday leaves unlucky Windows Hello users unable to login (source)
- Windows NTLM vulnerability exploited in multiple attack campaigns (CVE-2025-24054) (source)
- Microsoft pitches pay-to-patch reboot reduction subscription for Windows Server 2025 (source)
- Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise (source)
- Unpatched Windows Server vulnerability allows full domain compromise (source)