Preview

Unit 2 Assignment 2

Powerful Essays
Open Document
Open Document
340 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 2 Assignment 2
1. 2401593 CVE-2010-3213: Vulnerability in outlook Web access could allow elevation of privilege. Microsoft Server Exchange 2003 and 2007 2264072 CVE-2010-1886: Elevation of privilege using Windows service Isolation Bypass. Windows Server 2003 and 2008 980088 CVE-2010-0255: Vulnerability in Internet Explorer could allow Information Disclosure. Windows XP 975497 CVE-2009-3103: Vulnerabilities in SMB could allow remote code execution. Windows Vista Service Pack 1 and 2 98343 CVE-2010-0817: Vulnerability in SharePoint could allow elevation of privilege. Microsoft SharePoint Version 2.0
2. Only two from the five listed in question one are privileged elevation. 2264072 CVE-210-1886 and 98343 CVE-210-0817. They are of importance but not considered a high priority issue.
3. Advisory Number: 977981 Solution: This security update resolves four privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Advisory Number: 979352 Solution: This security update resolves seven privately reported vulnerabilities and one publicly disclosed vulnerability in Internet Explorer. The more severe vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Advisory Number: 954157 Solution: The update also removes the ability for this codec to be loaded when browsing the Internet with any other applications. By only allowing applications to use the Indeo codec when the media content is from the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    | * OS Level * Patch history Configuration hardening Desktop access, Application access * File Access * File Storage * VPN Authentication Browsing * Emails * Backups…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In this assignment we are asked to identify the major threats and security concepts from a whitepaper located on the internet: http://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf. This report stated that: “There are a number of recent and growing trends in the threat activity landscape that were observed by Symantec in 2009.” These threats are identified as:…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    To calculate the Window of Vulnerability (WoV) for this security breach, the following timeline will be used as a guideline to determine the basis for calculation:…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Itm Slp Paper Module 1

    • 643 Words
    • 3 Pages

    Web browsing has become a popular internet tool in today’s society. It has enhanced everyday demands with the click of mouse or keyboard. With technology at your fingertips, no question has been left without an answer. By exploring all the pros and cons that come along with different web browsers, each one play a major role for everyone throughout the world. With this being said, being used, everyone has something different that catches their eye about every browser but having only one favorite browser that is used on a daily basis. The world has changed tremendously. Just a decade ago, the internet was dominated by one browser: Microsoft Internet Explorer (IE). By doing this we’ve selected different internet browsers for information. The information that has been received on a day to day basis through the newspaper is no longer needed…

    • 643 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS4560

    • 486 Words
    • 2 Pages

    Cross-site scripting is a type of computer security vulnerability typically found in web applications that enables attacks to inject client side script into web pages viewed by others…

    • 486 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 4 MBSA Scan IT1400

    • 527 Words
    • 3 Pages

    Result: The Automatic Updates feature has not been configured on this computer. Please upgrade to the latest…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    File Upload Via Hsbcnet

    • 4761 Words
    • 20 Pages

    All browser versions must be supported by 128-bit encryption (this is the highest level of protection for all internet communications and financial transactions). To check the level of security being used double click the security padlock at the bottom right of the browser – this will establish the level of security being used. The best way to check if you have 128-bit encryption in Internet Explorer is to Click on ‘Help’ in the toolbar, then ‘About Internet Explorer’ and check the cipher strength is 128-bit. If your equipment meets the above…

    • 4761 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Since this information pertains directly to the application of web-based information security by Core & Main, the statement was not modified and/or paraphrased, in an effort to leave the official words and/or thoughts of the company unaltered and unmodified.…

    • 863 Words
    • 4 Pages
    Good Essays
  • Good Essays

    What was the business impact of this software problem, both for McAfee and for its customer?…

    • 287 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Sfdsfdsdfsdf

    • 611 Words
    • 3 Pages

    ^ Security Flaws in Online Banking Sites Found to be Widespread Newswise, Retrieved on July 23, 2008.…

    • 611 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Sdl Series

    • 2896 Words
    • 12 Pages

    Article #3: The Microsoft Security Org Chart Article #5: Microsoft Security Toolbox Article #6: Microsoft’s Security Response Article #7: Evolution of the Microsoft SDL Article #8: Microsoft SDL Investigation: The Wrap Up…

    • 2896 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    was introduced or manifested in deployed software to when access was removed, a security fix…

    • 653 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In July 2000, a vulnerability to buffer overflow attack was discovered in Microsoft Outlook and Outlook Express. A programming flaw made it possible for an attacker to compromise the integrity of the target computer by simply it sending an e-mail message. Unlike the typical e-mail virus, users could not protect themselves by not opening attached files; in fact, the user did not even have to open the message to enable the attack. The programs' message header mechanisms had a defect that made it possible for senders to overflow the area with extraneous data, which allowed them to execute whatever type of code they desired on the recipient's computers. Because the process was activated as soon as the recipient downloaded the message from the server, this type of buffer overflow attack was very difficult to defend. Microsoft has since created a patch to eliminate the…

    • 309 Words
    • 2 Pages
    Satisfactory Essays