Microsoft fixes a dangerous DNS error for Windows

Microsoft on May 8 released a monthly security update to fix a series of dangerous bugs in its products.

The April security update is divided into 7 small updates that fix a total of 19 security holes in products such as Internet Explorer 7, Office 2007 and Exchange 2007.

Most of the patches released in this round are classified as "extremely dangerous" - the highest level in the rating scale of the vulnerability of corrected security errors. A security error that is considered extremely dangerous is an error that could be exploited by hackers to gain control of a system that has made a mistake.

Most of the security bugs fixed this time can be exploited if users access a website or open a malicious file. This is an attack trend that is very popular among hackers today.

Picture 1 of Microsoft fixes a dangerous DNS error for Windows The MS07-027 update aims at six vulnerabilities in Internet Explorer. Hackers can attack this error by tricking users into accessing a malicious website.

Meanwhile Office applications accounted for 3 updates to overcome the errors that have occurred in the past, including errors belonging to Office 2007. Most Office errors are related to how the application behaves. Manage a certain file format standard. This error is often attacked by tricking users into opening a malicious file.

The Exchange application error is even more dangerous when it can be exploited by hackers to gain control of a system that has failed without any help from users such as accessing the website or opening a malicious file. harm. However, the most dangerous error in Exchange fixed in this batch is the error in the method of email decoding application.

In particular, Microsoft has overcome a number of new zero-day security flaws that have been discovered recently. The Windows DNS Domain Name System security flaw exists in Windows 2000 Server and Windows Server 2003 versions. Last month Microsoft warned that the error was exploited by hackers to attack users.

The remaining two zero-day errors fixed in this phase belong to Internet Explorer and Word browsers. Only errors in Word are taken advantage of to attack users.

Users can use Automatic Update feature or directly access Microsoft Update or Windows Update to download necessary patches.

Hoang Dung