Boston Linux & UNIX was originally founded in 1994 as part of The Boston Computer Society. We meet on the third Wednesday of each month, online, via Jitsi Meet.

BLU Discuss list archive


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Discuss] OT: Microsoft Secure Channel (Schannel) Vulnerability



Thanks, for less technically adept folks like myself, what is 
involved in successfully patching these machines? Is it just a 
matter of going straight to Windows Update when they're turned 
on?  - Stephen

On Sat, 15 Nov 2014, Bill Ricker wrote:

> This  was discussed pretty much all week on SANS Internet Storm Center
> "Daily Stormcast"  podcast.
>
> Handler Diaries -
>
> https://isc.sans.edu/diary/How+bad+is+the+SCHANNEL+vulnerability+%28CVE-2014-6321%29+patched+in+MS14-066%3F/18947
> &
> https://isc.sans.edu/diary/SChannel+Update+and+Experimental+Vulnerability+Scanner+%28MS14-066%29/18953
>
>
> Especially If running Net-visible Windows servers -- e.g. ASPX windows
> servers -- this *is* urgent.  2nd priority, laptops.
>   Unclear which services a non-server might be vulnerable with to
> intRAnet attack, so patch them too.



BLU is a member of BostonUserGroups
BLU is a member of BostonUserGroups
We also thank MIT for the use of their facilities.

Valid HTML 4.01! Valid CSS!



Boston Linux & Unix / webmaster@blu.org