TITLE: Microsoft Windows SChannel Two Vulnerabilities Criticality level: Highly critical Impact: Manipulation of data Where: From remote VERIFY ADVISORY: http://secunia.com/advisories/40879/ DESCRIPTION: Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to manipulate certain data or to compromise a vulnerable system. 1) An unspecified error exists in SChannel when processing certificate request messages on a client machine. This may be exploited to execute arbitrary code e.g. when a user visits a specially crafted web site. 2) An error in the TLS and SSL protocols while handling session renegotiations can be exploited to manipulate certain data. For more information: http://secunia.com/advisories/38365/ SOLUTION: Apply patches. ORIGINAL ADVISORY: MS10-049 (KB980436): http://www.microsoft.com/technet/security/Bulletin/MS10-049.mspx Microsoft: http://www.microsoft.com/technet/security/advisory/977377.mspx ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-