Security News > 2017 > January > Second Try at Windows LSASS Patch Addresses Vulnerability (Threatpost)
2017-01-11 18:01
Microsoft on Tuesday patched a vulnerability in LSASS, the second attempt it has taken at fixing a remote denial-of-service issue in the critical Windows process.
News URL
http://threatpost.com/second-try-at-windows-lsass-patch-addresses-vulnerability/123015/
Related news
- FreeBSD Releases Urgent Patch for High-Severity OpenSSH Vulnerability (source)
- Zero-click Windows TCP/IP RCE impacts all systems with IPv6 enabled, patch now (source)
- New Windows IPv6 Zero-Click Vulnerability (source)
- CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September (source)
- SonicWall Issues Critical Patch for Firewall Vulnerability Allowing Unauthorized Access (source)
- APT group exploits WPS Office for Windows RCE vulnerability (CVE-2024-7262) (source)
- Fortra Issues Patch for High-Risk FileCatalyst Workflow Security Vulnerability (source)
- Week in review: Vulnerability allows Yubico security keys cloning, Patch Tuesday forecast (source)
- Progress Software Issues Patch for Vulnerability in LoadMaster and MT Hypervisor (source)
- Windows vulnerability abused braille “spaces” in zero-day attacks (source)