{"id":661,"date":"2002-12-10T00:00:00","date_gmt":"2002-12-09T23:00:00","guid":{"rendered":"https:\/\/destinationcyber.com\/?p=661"},"modified":"2002-12-10T00:00:00","modified_gmt":"2002-12-09T23:00:00","slug":"microsoft-linux-1-partout","status":"publish","type":"post","link":"https:\/\/destinationcyber.com\/?p=661","title":{"rendered":"Microsoft-Linux : 1 partout"},"content":{"rendered":"<p class=\"post_excerpt\">Le patch Microsoft MS02-068, a vu son degr\u00e9 de gravit\u00e9 passer de \u00ab\u00a0mod\u00e9r\u00e9\u00a0\u00bb \u00e0 \u00ab\u00a0critique\u00a0\u00bb. Cette \u00ab\u00a0promotion\u00a0\u00bb fait suite aux \u00e9claircissements donn\u00e9s par un utilisateur \u00e0 la firme de Seattle sur les implications potentielles de la faille de s\u00e9curit\u00e9. <\/p>\n<p>Le patch s&rsquo;adresse toujours aux utilisateurs des versions 5.5 et 6.0 d&rsquo;Internet Explorer. Le probl\u00e8me auquel il rem\u00e9die, classique, est toujours le m\u00eame : dans certaines conditions, un utilisateur mal intentionn\u00e9 peut lire vos donn\u00e9es, lancer un programme, etc. <\/p>\n<p>Rappelons que depuis le 20 novembre, l&rsquo;\u00e9chelle de gravit\u00e9 des failles de s\u00e9curit\u00e9 Microsoft comporte quatre niveaux : low, moderate, important et critical. Ce \u00ab\u00a0patch cumulatif\u00a0\u00bb remplace et compl\u00e8te celui sorti deux semaines plus t\u00f4t, lui aussi estampill\u00e9 \u00ab\u00a0critical\u00a0\u00bb, le MS02-066. <\/p>\n<p>Infos suppl\u00e9mentaires et t\u00e9l\u00e9chargement <HTLM> <a href=\"http:\/\/www.microsoft.com\/technet\/treeview\/?url=\/technet\/security\/bulletin\/MS02-068.asp\">ici<\/a><\/HTML><\/p>\n<p>Pour faire bonne mesure, signalons \u00e9galement qu&rsquo;un bug affecte la version 2.4.20 du noyau linux, sortie il y a deux semaines. Ce bug peut provoquer une perte de donn\u00e9es dans des cas tr\u00e8s sp\u00e9cifiques (utilisation du syst\u00e8me de fichiers ext3 dans un mode un peu exotique). Sont concern\u00e9es les personnes ayant t\u00e9l\u00e9charg\u00e9 et recompil\u00e9 la version 2.4.20 et utilisant le dit syst\u00e8me de fichiers.<\/p>\n<p>[source &#8211; inpact-hardware.com]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le patch Microsoft MS02-068, a vu son degr\u00e9 de gravit\u00e9 passer de \u00ab\u00a0mod\u00e9r\u00e9\u00a0\u00bb \u00e0 \u00ab\u00a0critique\u00a0\u00bb. Cette \u00ab\u00a0promotion\u00a0\u00bb fait suite aux \u00e9claircissements donn\u00e9s par un utilisateur \u00e0 la firme de Seattle sur les implications potentielles de la faille de s\u00e9curit\u00e9. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_citadela_custom_class":"","footnotes":""},"categories":[15],"tags":[],"class_list":["post-661","post","type-post","status-publish","format-standard","hentry","category-securite"],"_links":{"self":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=661"}],"version-history":[{"count":0,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/661\/revisions"}],"wp:attachment":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}