According to this InfoWorld report, Microsoft intends to release nine security fixes, eight of them critical, this Tuesday. Attention security professionals: ask yourself this question – what are you doing TODAY to protect yourself from attacks against these vulnerabilities? Better yet, what were you doing last month, or last year to protect yourself? (Hint: this isn’t a trick question, and there are answers out there…)
These vulnerabilities have existed "in the wild" since Microsoft released the software products that have them. And it is reasonable to expect a handful more next month. And the month after. There are latent vulnerabilities in your software running right now. [Cue up theme from "Cops"]
Limit exposure – many of the remote vulns are mitigated by proper firewall rules. No one from the internet needs to connect to RPC on my box — that’s for sure
Limit service – If I dont use it, it’s not running.
Stack protection — it’s not perfect, that’s true.. but I do enable stack protection.
Traffic baseline – I’m always looking at traffic on the wire for various projects I work on. I’m always mindful of rogue TCP connections… some call me a tinfoil hat wearing skitzo.