Microsoft Security Advisory (2490606): Vulnerability in Graphics Rendering Engine Could Allow Remote


 
Thread Tools Search this Thread
Special Forums Windows & DOS: Issues & Discussions Security Advisories (RSS) - Microsoft Microsoft Security Advisory (2490606): Vulnerability in Graphics Rendering Engine Could Allow Remote
# 1  
Old 01-19-2011
Microsoft Security Advisory (2490606): Vulnerability in Graphics Rendering Engine Could Allow Remote

Revision Note: V1.2 (January 19, 2011): Clarified that the Modify the Access Control List (ACL) on shimgvw.dll workaround only applies to Windows XP and Windows Server 2003 systems and added a new workaround, Disable viewing of thumbnails in Windows Explorer on Windows Vista and Windows Server 2008 systems. Advisory Summary:Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
SGE_PASSWD(1)						   Sun Grid Engine User Commands					     SGE_PASSWD(1)

NAME
sgepasswd - Modify the Sun Grid Engine password file of Sun Grid Engine SYNTAX
sgepasswd [[ -D domain ] -d user ] sgepasswd [ -D domain ] [ user ] DESCRIPTION
sgepasswd modifies the Sun Grid Engine password file sgepasswd(5). This file contains a list of usernames and their windows password in encrypted form. sge_execd(8) and sge_shepherd(8) on hosts running Mi- crosoft Windows as operating systems use this information to start jobs for a certain user. Each user can use the sgepasswd application to add a new entry for the own user account. It is also possible to change the stored password with sgepasswd as far as the user knows the old one. The root user additionally has the permission to change the password entries for other user accounts. Root can also delete existing entries. The sgepasswd binary is only available on non-Windows hosts. OPTIONS
-D domain Per default sgepasswd will add/modify the current Unix username without domain specification. This switch can be used to add a domain specification in front of the current user name. Consult your Microsoft Windows documentation to get more information about domain users. -d user Only root can use this parameter to delete entries from the sgepasswd(5) file. -help Prints a listing of all options. ENVIRONMENTAL VARIABLES
SGE_CERTFILE Specifies the location of public key file. Per default sgepasswd will use the file $SGE_ROOT/$SGE_CELL/com- mon/sgeCA/certs/cert.pem SGE_KEYFILE If set, specifies the location of the private key file. Default is /var/sgeCA/port${SGE_QMASTER_PORT}/${SGE_CELL}/pri- vate/key.pem SGE_RANDFILE If set, specifies the location of the seed used to create encrypted versions of user passwords. Default is /var/sgeCA/port${SGE_QMASTER_PORT}/${SGE_CELL}/private/rand.seed SEE ALSO
sge_intro(1), sgepasswd(5) COPYRIGHT
See sge_intro(1) for a full statement of rights and permissions. SGE 6.2u5 $Date$ SGE_PASSWD(1)