
{"id":792,"date":"2012-01-05T23:02:31","date_gmt":"2012-01-05T23:02:31","guid":{"rendered":"http:\/\/tech-no.104.210.61.21.xip.io\/?p=792"},"modified":"2012-01-05T23:02:31","modified_gmt":"2012-01-05T23:02:31","slug":"microsoft-releases-patch-for-hashdos-vulnerability","status":"publish","type":"post","link":"https:\/\/tech-no.org\/?p=792","title":{"rendered":"Microsoft releases patch for HashDos Vulnerability!"},"content":{"rendered":"<p><a href=\"http:\/\/tech-no.104.210.61.21.xip.io\/wp-content\/uploads\/sites\/4\/2012\/01\/ie.jpg\"><img loading=\"lazy\" class=\"size-full wp-image-793 alignleft\" title=\"ie\" src=\"http:\/\/tech-no.104.210.61.21.xip.io\/wp-content\/uploads\/sites\/4\/2012\/01\/ie.jpg\" alt=\"\" width=\"278\" height=\"182\" srcset=\"https:\/\/tech-no.org\/wp-content\/uploads\/sites\/4\/2012\/01\/ie.jpg 278w, https:\/\/tech-no.org\/wp-content\/uploads\/sites\/4\/2012\/01\/ie-150x98.jpg 150w, https:\/\/tech-no.org\/wp-content\/uploads\/sites\/4\/2012\/01\/ie-100x65.jpg 100w, https:\/\/tech-no.org\/wp-content\/uploads\/sites\/4\/2012\/01\/ie-190x125.jpg 190w\" sizes=\"(max-width: 278px) 100vw, 278px\" \/><\/a><\/p>\n<p>I received this in an email on the 29th of December:<a title=\"http:\/\/app.en25.com\/e\/es.aspx?s=2580&amp;e=21873&amp;elq=632ae2cdc0414364b170127ab46617ec\" href=\"http:\/\/app.en25.com\/e\/es.aspx?s=2580&amp;e=21873&amp;elq=632ae2cdc0414364b170127ab46617ec\" target=\"_blank\"> http:\/\/app.en25.com\/e\/es.aspx?s=2580&amp;e=21873&amp;elq=632ae2cdc0414364b170127ab46617ec<\/a><\/p>\n<p>in case the link is broken, here is the text:<\/p>\n<blockquote><p><span><strong>ALERT: Microsoft Releases Patch for HashDos Vulnerability<br \/>\n<\/strong><\/span>December 29, 2011<\/p>\n<p>Happy almost New Year! In response to some recent developments around a known vulnerability targeting .NET, Microsoft made the bold decision to issue an out-of-band patch to address the issue. We\u2019ve provided a quick look at the bulletin below. For an in-depth look at the background of this flaw as well as the up to date version of Retina you can use to identify if you have vulnerable systems, you\u2019ll want to <a href=\"http:\/\/eeye.co\/hashdos?elq=632ae2cdc0414364b170127ab46617ec&amp;elqCampaignId=112\">check out the eEye Blog<\/a>. We\u2019ll be providing updates on this development for as long as we need to ensure the security community stays informed.<\/p>\n<p><strong>Microsoft Security Bulletin MS11-100 <\/strong><br \/>\nVulnerabilities in .NET Framework Could Allow Elevation of Privilege (2638420)<br \/>\nBulletin: <a href=\"http:\/\/technet.microsoft.com\/en-us\/security\/Bulletin\/MS11-100?elq=632ae2cdc0414364b170127ab46617ec&amp;elqCampaignId=112\">http:\/\/technet.microsoft.com\/en-us\/security\/Bulletin\/MS11-100<\/a><br \/>\nSeverity: Critical<br \/>\neEye Recommendation: Patch Immediately<\/p>\n<p>Interestingly, this patch covers not only the publicly disclosed \u201cHashDos\u201d vulnerability, but an additional three privately reported vulnerabilities in Microsoft .NET Framework. They all carry the potential for privilege escalation. As mentioned before, this is the first time in 2011 that Microsoft has released a patch outside of their typical Patch Tuesday release cycle. One could assume that this patch was to be part of an upcoming release cycle, and publicly disclosed attack methods being discussed online in the last few days may have forced their hand.<\/p>\n<p><strong>Stay Up to Date on This Issue<\/strong><br \/>\nBe sure to check back in at the <a href=\"http:\/\/eeye.co\/hashdos?elq=632ae2cdc0414364b170127ab46617ec&amp;elqCampaignId=112\">eEye Blog<\/a> for new developments around this vulnerability and security bulletin, as well as updated product information on identifying and protecting vulnerable systems.<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<p>here are some other links for your reading pleasure:<\/p>\n<h1>Microsoft Security Bulletin MS11-100 &#8211; Critical<\/h1>\n<h2>Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2638420)<\/h2>\n<p><a title=\"http:\/\/technet.microsoft.com\/en-us\/security\/Bulletin\/MS11-100\" href=\"http:\/\/technet.microsoft.com\/en-us\/security\/Bulletin\/MS11-100\" target=\"_blank\">http:\/\/technet.microsoft.com\/en-us\/security\/Bulletin\/MS11-100<\/a><\/p>\n<div>Article ID: 2659968 &#8211; Last Review: December 29, 2011 &#8211; Revision: 1.0<\/div>\n<h1>Deployment guidance for security update 2638420, as described in MS11-100<\/h1>\n<p><a title=\"http:\/\/support.microsoft.com\/kb\/2659968\" href=\"http:\/\/support.microsoft.com\/kb\/2659968\" target=\"_blank\">http:\/\/support.microsoft.com\/kb\/2659968<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>As a side note, it looks like Microsoft is taking this seriously, we received a call directly from Microsoft to our CIO to let us know of the patches availability.\u00a0 If i were you, i would get it installed. The patches are already in Windows Update, so it is not longer a out of band patch.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I received this in an email on the 29th of December: http:\/\/app.en25.com\/e\/es.aspx?s=2580&amp;e=21873&amp;elq=632ae2cdc0414364b170127ab46617ec in case the link is broken, here is the text: ALERT: Microsoft Releases Patch for HashDos Vulnerability December 29, 2011 Happy almost New Year! In response to some recent developments around a known vulnerability targeting .NET, Microsoft made the bold decision to issue &hellip;<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/tech-no.org\/index.php?rest_route=\/wp\/v2\/posts\/792"}],"collection":[{"href":"https:\/\/tech-no.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech-no.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech-no.org\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tech-no.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=792"}],"version-history":[{"count":1,"href":"https:\/\/tech-no.org\/index.php?rest_route=\/wp\/v2\/posts\/792\/revisions"}],"predecessor-version":[{"id":794,"href":"https:\/\/tech-no.org\/index.php?rest_route=\/wp\/v2\/posts\/792\/revisions\/794"}],"wp:attachment":[{"href":"https:\/\/tech-no.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=792"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tech-no.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=792"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech-no.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=792"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}