Archive
Vulnerability in Remote Desktop Client – #RDS
Microsoft Security Bulletin MS13-029 – Critical
Vulnerability in Remote Desktop Client Could Allow Remote Code Execution (2828223)
Published: Tuesday, April 09, 2013 | Updated: Wednesday, April 10, 2013
Version: 1.1
This security update resolves a privately reported vulnerability in Windows Remote Desktop Client. The vulnerability could allow remote code execution if a user views a specially crafted webpage. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
This security update is rated Critical for Remote Desktop Connection 6.1 Client, Remote Desktop Connection 7.0 Client, and Remote Desktop Connection 7.1 Client where affected on Windows XP, Windows Vista, and Windows 7. It is rated Moderate for Remote Desktop Connection 6.1 Client, Remote Desktop Connection 7.0 Client, and Remote Desktop 7.1 Client where affected on Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2. For more information, see the subsection, Affected and Non-Affected Software, in this section.
The security update addresses the vulnerability by modifying the way that Remote Desktop Client handles objects in memory. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.
Recommendation. Most customers have automatic updating enabled…
Continue reading here!
//Richard
#Lync 2013 March VDI Update
Microsoft has released an update for Microsoft Lync 2013. This update provides the latest fixes for Lync 2013.
This update fixes several bugs in the RTM versions of Lync 2013 Virtual Desktop Infrastructure (VDI) clients. Additionally, after you apply this update, you do not have to re-enter a username and password when you pair a Lync 2013 VDI plugin with a Lync 2013 Desktop client.
You can apply this hotfix on both Lync 2013 VDI clients and Lync 2013 Desktop clients.
Continue reading and download the update here!
//Richard
MS to Release Emergency IE Patch on Monday – #Microsoft, #IE – via @appcompatguy
The patch will fix a vulnerability in Internet Explorer 6, 7 and 8
Sun, January 13, 2013
IDG News Service — Microsoft will release a patch on Monday for older versions of its Internet Explorer browser, deviating from its normal repair schedule due to the seriousness of the problem.
The vulnerability, which is present in IE 6, 7 and 8, is a memory corruption issue. It can be exploited by an attacker via a drive-by download, a term for loading a website with attack code that delivers malware to a victim’s computer if the person merely visits the website.
Microsoft released a quick fix for the issue earlier this month, but did not have a more permanent patch ready when it released its monthly batch of patches last Tuesday. The company will occasionally release an emergency patch if the software vulnerability is considered a high risk.
“While we have still seen only a limited number of customers affected by the issue, the potential exists that more customers could be affected in the future,” wrote Dustin Childs, group manager for the company’s Trustworthy Computing Group, on a company blog on Sunday.
The patch, which will be released at 10 AM PST, will be distributed through Windows Update. Childs wrote users…
Continue reading here!
//Richard
Hotfix Rollup Pack 1 for #Citrix #XenApp 6.5 for Microsoft Windows Server 2008 R2
Ok, yet another update for XenApp we need to handle…. sigh…
But I suggest that you have a look at it, try it and get it rolled out…
Read more here!
//Richard
#NetScaler Master Class Webinar on December 5, 2:00 – 4:00 PM GMT
New Citrix NetScaler Master Class! Join and make your voice heard! 😉
Come and join us for our latest NetScaler Master Class. Go back to basics as well as find out what’s new and what’s coming up soon.
This webinar event provides you the opportunity to learn about the features of the NetScaler, the tips and tricks of configuration and of course, put your questions to the experts. Don’t miss this opportunity to have your say and find out what’s going on in the world of Application Delivery Control in general and NetScaler in particular.
Date: 5th December 2012
Time: 14:00 Hrs GMT (15:00 Hrs CET)
Agenda
NetScaler “101” – HTTP Callout
“In the Spotlight” – Command Center
What’s new – NetScaler products update
News and Views – What’s going on in the ADC world
Master Class Extra – Have your say
Read more and register here!
//Richard
Heads up – Potential #StoreFront and .NET Security update KB2729452 issue – #Citrix, #StoreFront, #CloudGateway
Heads up out there! I’ve not verified this myself but it’s worth ensuring that you plan for an uninstallation in the event it’s true!
Wow, PVS creativity at its best – but still a workaround…
Ok, I must admit that the blog post below and the efforts put into it from a creativity point of view is great!
Martin Zugec blog post about Pimp your PVS 1 – auto patcher is really neat! I give you all the creeds Martin, great work!
But, is this a solution to the problem that the PVS product has regarding configuration and patch management? NO… U still have a lot of work to do here Citrix, I’m just glad that you have such innovative and creative people like Martin to deliver interim workarounds to a problem that according to my personal believe is a major mistake in the product design and build principles.
Still waiting for a XenDesktop suite-wide “Update Manager” that handles life-cycle management of all components of the stack. Citrix has a lot of great products and now just need to “wrap it all up” and ensure that they are ready from an ITIL/ITSM point of view.
Cheers!
//Richard