Login

Register

Login

Register

Microsoft Publishes Advisory for Windows Zero-Day



There is no available patch for the vulnerabilities, which Microsoft says exist in all supported versions of Windows.

Microsoft today posted an advisory to inform users of active attacks targeting unpatched flaws in Adobe Type Manager Library. The vulnerabilities affect all supported versions of Windows.

Two remote code execution vulnerabilities exist in Microsoft Windows when the Adobe Type Manager Library improperly handles a specially crafted multimaster font called Adobe Type 1 PostScript format, Microsoft explains in the advisory. The company is aware of “limited targeted attacks” that could leverage the unpatched vulnerabilities, which the company ranked as Critical.

There are several ways an attacker could successfully take advantage of these flaws. For example, they could convince a user to open a specially crafted document or view it in the Windows Preview pane. Opening or viewing the file would let the attacker remotely run malicious code on the target machine. While the Windows Preview pane could be an attack vector, Microsoft says Outlook Preview Pane is not an attack vector for these vulnerabilities.

“For systems running supported versions of Windows 10, a successful attack could only result in code execution within an AppContainer sandbox context with limited privileges and capabilities,” officials explain of the potential effects on supported Windows 10 machines.

Microsoft is working on a fix for the vulnerabilities. The company usually releases patches on the second Tuesday of each month, a schedule it says allows for both quality assurance and IT planning. It has been known to issue out-of-band patches for urgent vulnerabilities as needed. Microsoft did not immediately respond to a request for comment on the timing of this patch.

In the meantime, the advisory offers workarounds for companies vulnerable to these attacks. For example, admins can disable the Preview and Details panes in Windows Explorer to prevent the automatic display of OTF fonts in Windows Explorer. This prevents malicious files from being views in Windows Explorer, Microsoft says, but it does not block a local authenticated user from running a specially crafted program to exploit the flaw.

Another workaround involves disabling the WebClient service, which helps protect against potential exploits by blocking the most likely remote attack vector via the Web Distributed Authoring and Versioning (WebDAV) client service. With this workaround, it would still be possible for attackers to cause the system to run programs on the target machine or local area network; however, users will be asked for confirmation before opening malicious programs.

Microsoft provides guidance for completing these workarounds and others, as well as how to undo them, for different affected versions of Windows in its advisory on the vulnerabilities.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial … View Full Bio

More Insights





Click here for the Source link

Leave a Reply

Shqip Shqip አማርኛ አማርኛ العربية العربية English English Français Français Deutsch Deutsch Português Português Русский Русский Español Español

National Cyber Security Consulting App

 https://apps.apple.com/us/app/id1521390354

https://play.google.com/store/apps/details?id=nationalcybersecuritycom.wpapp


NATIONAL CYBER SECURITY RADIO
[spreaker type=player resource="show_id=4560538" width="100%" height="550px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]
HACKER FOR HIRE MURDERS
 [spreaker type=player resource="show_id=4569966" width="100%" height="350px" theme="light" playlist="show" playlist-continuous="true" autoplay="false" live-autoplay="false" chapters-image="true" episode-image-position="left" hide-logo="false" hide-likes="false" hide-comments="false" hide-sharing="false" hide-download="true"]

ALEXA “OPEN NATIONAL CYBER SECURITY RADIO”

National Cyber Security Radio (Podcast) is now available for Alexa.  If you don't have an Alexa device, you can download the Alexa App for free for Google and Apple devices.   

nationalcybersecurity.com

FREE
VIEW