From SANS ISC:
When ISC is saying it should be upgraded from Critical to "Patch Now" its probably best to take their advice
"Microsoft stated that this vulnerability will allow remote code execution and that it can be used to exploit servers. Microsoft also assigned this vulnerability an exploitability of "1", indicating that an exploit is likely going to be developed soon. But other then that, very little has been released publicly about the nature of the vulnerability. It was found by an internal audit, so if Microsoft did things right, no details are known to anybody but a small group within Microsoft.
...
My guess is that you probably have a week, maybe less, to patch your systems before an exploit is released. You got a good inventory of your systems? Then you are in good shape to make this work. For the rest (vast majority?): While you patch, also figure out counter measures and alternative emergency configurations."
No comments:
Post a Comment