There is a NEW Vulnerability in Microsoft software.
Two Serious New Windows Problems
I am sending out this information as a courtesy. Seems that MS
software IE and Outlook can be exploited (IE VIRUSES) just by
scanning a page, either in Internet Explorer (IE) or Outlook (Preview pane).
Please read the following information and make a choice
as to what you want to do if you have a PC using Microsoft software.
This effects Internet Explore users who surf and Outlook users.
Microsoft has gone to once a month uPdates so no auto fix is here
yet. Read and see if you choose to do this easy work around till MS
sends you a patch this next month?
Microsoft Security Advisory (925568)
Vulnerability in Vector Markup Language Could Allow Remote Code Execution
# "Vulnerability in Vector Markup Language Could Allow Remote Code Execution."
This advisory provides a general overview of the problem and, fortunately, also provides a robust interim work-around to disable Windows' and IE's VML parsing. This can and should be used until Microsoft has repaired the buffer overrun in the VGX.DLL VML parser that is being actively exploited on the Internet.
# How to protect your system:
As detailed in Microsoft's VML security advisory (see link above), you can quickly, easily, and safely protect your system from possible VML exploitation by "unregistering" the defective DLL. The system will no longer be able to render web-based vector markup language graphics, but you won't notice any difference since few sites use VML for benign purposes.
Simply copy this command from this page (highlight the entire line then type Ctrl-C to Copy it into the clipboard), then open the "Run..." dialog by pressing your system's Start button and choosing "Run..." Press "Backspace" to remove anything that might already be in the "Open" field, then type "Ctrl-V" to paste the command into the field. Press "OK" to execute the command and you should receive a dialog confirming that the VGX.DLL file has been "unregistered" ...
regsvr32 -u "%CommonProgramFiles%\Microsoft Shared\VGX\vgx.dll"
Please tell your family and friends and the word. Since this newly discovered Windows VML defect is being actively exploited by thousands of web sites to install malware, and since viewing malicious eMail with many versions of Outlook will also cause this to occur, EVERY Windows user is a potential victim. Please help people to protect themselves.
***
After Microsoft fixes this problem do the following please.
.... below is the information to reset your MS system.
# How to "re-register" the VGX.DLL:
Once Microsoft has repaired this defect, which should happen no later than the second Tuesday in October (Oct. 10th) — and after you have applied those October security updates — you should re-register the repaired VGX.DLL file by repeating the steps above, but using a command without the "-u" argument, as follows:
regsvr32 "%CommonProgramFiles%\Microsoft Shared\VGX\vgx.dll"
Note:
At that time, please also remind anyone you may have helped to protect themselves through un-registering the DLL to re-register it AFTER they have updated their system with the current October patches. MS sends out patches on one Tuesday each month.
***
Want more information?
Go here: