Saturday, January 23, 19:02
Home security Security Update: Microsoft fixes zero-day vulnerabilities in IE and Windows Defender

Security Update: Microsoft fixes zero-day vulnerabilities in IE and Windows Defender

Security Update: Microsoft has released an emergency security update to fix two security vulnerabilities affecting it Internet Explorer and Windows Defender.

Of these two, the first is a remote code execution (RCE) fault, registered as CVE-2019-1367. This zero-day Vulnerability affects Internet Explorer versions 9, 10, and 11 (which are still widely used) and exploits the way Microsoft's scripting engine handles objects in IE memory.

Microsoft

According to Microsoft, hackers could exploit this vulnerability by attracting potential targets (using spam messages, malware, search engine ads, IM spam, etc.) to visit a site infected with Internet Explorer vulnerability.

The defect it could corrupt the system memory and allow attackers to execute arbitrary code within the legitimate user. Exploiting the defect enables an attacker to achieve the same user rights as the legitimate user.

Therefore, if a user logs on as a system administrator, a successful attack could allow hackers to gain full control of the affected systemic. Once it has administrator privileges, the attacker will be able to edit or delete data, install new programs, and create new accounts.

Security Update

This RCE vulnerability is already done exploit, according to Microsoft.

The patch to resolve this vulnerability can only be installed manually after downloading the patch from the Microsoft Update Catalog.

The second vulnerability that has been fixed is the Denial of Service (DoS) error that affects the Windows Defender tool.

Has been registered as CVE-2019-1255 and found by Wenxu Wu and Charalampos Billinis of Tencent Security Xuanwu Lab and F-Secure Countercept, respectively.

Microsoft said an attacker could exploit this error to prevent legitimate users from running legitimate system binaries. However, they first need to execute the system in order to exploit the vulnerability.

So far, there are no reports as to whether their error has been exploited hackers

Users do not need to download patch for this error, as well as Malware Protection Engine Microsoft will automatically install the new security update.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

LIVE NEWS

Instagram: How to enable notifications for specific profiles

There are some profiles on Instagram where you want to see the content they publish as soon as possible - it can be a news ...
00:01:55

NASA's historic launch pad is to be demolished

NASA's famous Mobile Launcher Platform-2 launch platform, which has been linked to the Apollo and Space Shuttle missions, ...
00:02:12

Elon Musk: Gives $ 100 million for best CO2 capture technology

https://www.youtube.com/watch?v=Y0iUZc30vj4 Ο Elon Musk δήλωσε χθες, στο λογαριασμό του στο Twitter, ότι σκοπεύει να δώσει 100 εκατομμύρια...

How can you unblock sites and services using a VPN?

The Internet is free and open to all. However, there are some sites and services whose content is blocked, which ...

Google Chrome: How to manage your extensions?

Google Chrome extensions can be very useful, as they improve your productivity when using the browser.

Intel CPUs Review: Core i7-10700 vs Core i7-10700K!

Over the years, the Intel series of processors (CPUs) introduced the series of overclocking models "K" and more recently the series ...

The DeLorean can return as an electric car

The DMC DeLorean has been out of production for almost 40 years, but it looks like the iconic vehicle will return as an electric car.

Windows RDP servers are used to support DDoS

Cybercrime gangs are abusing Windows Remote Desktop Protocol (RDP) systems to reinforce the unwanted ...

SEPA: He refused to pay a ransom and thousands of files were leaked

Thousands of stolen files of the Scottish Environmental Protection Agency (SEPA) have been published by hackers, after the organization refused to pay the ransom ...

Fines at Valve, Capcom and Zenimax for geo-exclusion of games

Following a European Commission investigation, a group of video game publishers was fined € 7,8 million following allegations of geo-exclusion practices. In...