Microsoft Finds Major Bug in Older Windows, Releases Emergency Windows XP Update
#1
Quote:Microsoft discovered a Remote Code Execution vulnerability in Remote Desktop Services in older versions of Windows, and the company shipped an emergency update to resolve it.
 
Documented in CVE-2019-0708, the vulnerability happens in the pre-authentication stage, and Microsoft says user interaction isn’t even required.
What’s more worrying, however, is that a potential exploit is wormable, which means that it can spread from one device to another, much like WannaCry malware.
 
The affected Windows versions are Windows XP, Windows Server 2003, Windows 7, and Windows Server 2008. Both Windows 8 and Windows 10 are protected.
Supported versions of Windows, like Windows 7, get this update automatically from Windows Update, while those on retired releases, as it’s the case of Windows XP, need to install the patch manually from the Microsoft Update Catalog.
 
Microsoft says it’s not aware of any exploitations of the vulnerability, albeit the firm warns that cybercriminals are very likely to reverse engineer the patch and develop malware that compromise unpatched computers.

SOURCE: https://news.softpedia.com/news/microsof...6033.shtml
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
PatchMyPC 5.2.0.0 (25-April/2025)
What’s new in 5.2....harlan4096 — 10:33
AMD releases Ryzen 5 7533HS processor wi...
AMD launches new Z...harlan4096 — 10:32
Adobe Acrobat Reader DC 2025.001.20467
Adobe Acrobat Read...harlan4096 — 06:11
GFYI [Official] CheckMAL's AppCheck Pro...
tweet CheckMAL Secu...dhruv2193 — 17:10
Introducing Advanced Chat Privacy: Enhan...
Introducing Advanc...harlan4096 — 11:49

[-]
Birthdays
Today's Birthdays
avatar (50)steakelask
avatar (44)Termoplenka
Upcoming Birthdays
avatar (50)Toligo

[-]
Online Staff
There are no staff members currently online.

>