- Thu Dec 15, 2011 8:17 pm
#57527
I open my Automatic Updates to see what is going on with it, and I see several messages with hyper links. I open those and I am slammed with several ways (which I believe are all fabricated) that an attacker can take control of my rig. Here is one example:
General Information
Executive Summary
This security update resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file.
Did I just make a huge mistake by opening these?
EDIT: This site also tried to mimic Microsoft.
General Information
Executive Summary
This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits a malicious Web page that embeds TrueType font files.
technet.microsoft.com
General Information
Executive Summary
This security update resolves three privately reported vulnerabilities in Internet Explorer. The most severe vulnerability could allow remote code execution if a user opens a legitimate HyperText Markup Language (HTML) file that is located in the same directory as a specially crafted dynamic link library (DLL) file.
Did I just make a huge mistake by opening these?
EDIT: This site also tried to mimic Microsoft.
General Information
Executive Summary
This security update resolves a publicly disclosed vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a specially crafted document or visits a malicious Web page that embeds TrueType font files.
technet.microsoft.com
BANNED