MICROSOFT OUTLOOK VULNERABILITY
MICROSOFT OUTLOOK VULNERABILITY
The UNITED STATES cyber command rcently reported the discovery of a vulnerability in microsoft outlook older version.
The report says microsoft this valnerbility patched by microsoft but due to user negligence updating it.
The disclosure mentions "active malicious use", revealing the source of the malware's origin as well in its tweets.
A quick check on the National Vulnerability Database in USA reveals the identity of the glitch, which is described as:
"Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability."
In essence, the breach allows an attacker to bypass arbitrary security protocols to execute remote commands on a system, which in turn can corrupt data or block users out from accessing the data.
detail report: click here
The UNITED STATES cyber command rcently reported the discovery of a vulnerability in microsoft outlook older version.
The report says microsoft this valnerbility patched by microsoft but due to user negligence updating it.
The disclosure mentions "active malicious use", revealing the source of the malware's origin as well in its tweets.
A quick check on the National Vulnerability Database in USA reveals the identity of the glitch, which is described as:
"Microsoft Outlook 2010 SP2, Outlook 2013 SP1 and RT SP1, and Outlook 2016 allow an attacker to execute arbitrary commands, due to how Microsoft Office handles objects in memory, aka "Microsoft Outlook Security Feature Bypass Vulnerability."
In essence, the breach allows an attacker to bypass arbitrary security protocols to execute remote commands on a system, which in turn can corrupt data or block users out from accessing the data.
detail report: click here
Comments
Post a Comment