back to article Patch Tuesday: Yet another Microsoft RCE bug under active exploit

August Patch Tuesday clicks off the week of hacker summer camp in Las Vegas this year, so it's basically a code cracker's holiday too.  Let's start off with Microsoft's 121 security holes, which are the most interesting of the ever-growing, second-Tuesday patch party. Plus, they include one that Redmond lists as under active …

  1. Martin hepworth

    exchange extended update

    Seem this can be installed on servers running hybrid mode... sigh

  2. Martin hepworth

    exchange extended update

    seems if you're running in hybrid mode youre into some fun

  3. Anonymous Coward
    Anonymous Coward

    "ÆPIC Leak"

    Elon's new love child or a leak of his dick pics

  4. Fading

    Buggy processors link....

    So I diligently follow the link - find my processor and then check the link for CVE-2022-21233 only to be sent to the details for CVE-2022-28693 (ok I can find the details if I type intel-sa-00657.html at the end of the link). Does anyone at intel check these things?

  5. Nate Amsden Silver badge


    I had to check the CVEs to confirm that Point to Point is actually PPP, and the CVEs state that Windows RAS is vulnerable. I personally haven't seen a Windows RAS in probably 20 years now. I know some folks use Windows server to terminate VPN connections on, am unsure what protocols those use. I'm guessing 99.9% of windows installs out there aren't running the RAS service.

    But even back in early 2002 the small company I was at was using Cisco 3000 VPN Concentrator appliances for Windows users(had no mac users), and probably a poor security solution but a open source product called vpnd I think at the time for the limited Linux users who wanted remote access(maybe half dozen including me).

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like