The WoV covers a timeline from the moment a vulnerability is discovered and identified by the IT people. It also includes the time taken to fix the vulnerability. It is also important to explore the device(s) that were targeted by the attack. In this instance, being the SMB server within the LAN. The window of vulnerability is 8 days.
1. The WoV covers a timeline from the moment a vulnerability is discovered and identified by the IT people.
2. The critically of the vulnerability is that while the solution is being search, the network may be hacked and information may be jeopardize.
3. The amount of time between when a vulnerability is discovered and when it is eliminated is usually 8 days.
4. Early detection and responsible reporting helps to reduce the risk that a vulnerability might be exploited before it is repaired.
1 What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.
2401593 CVE-2010-3213 2264072 CVE-2010-1886 980088 CVE-2010-0255 975497 CVE-2009-3103 98343 CVE-2010-0817
2. Do any vulnerabilities involve privilege elevation? Is this considered a high priority issue?
Only two from the five listed in question one are privileged elevation and identified by the asterisk alongside the CVE number. They are of importance but not considered a high priority issue as asked.
3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.
Advisory Number: 977981
Solution: This security update resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the