Chủ Nhật, 3 tháng 6, 2018

Microsoft fixes memory bug in Meltdown patch for Windows 7

Microsoft has released patches to mitigate vulnerabilities Meltdown and Specter on Windows 7 ultimate product key, with a bug related to the newly discovered memory.
Security researchers at Ulf Frisk found that Microsoft office 2010 product key patch for Meltdown had previously allowed processes to write to physical memory, leading to increased privileges. It's important that this bug is easy to exploit and does not require any API.
"A high-level privileged vulnerability exists when the Windows kernel does not properly handle the objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode, then it could install the program; view, change or delete data; Or create a new account with full user rights. To exploit this vulnerability, an attacker must first log on to the system. At this point they can run a special application to control a compromised system. The vulnerability update is capable of adjusting the way Windows handles in memory. "
The company warns affected users to install the update immediately and has classified the severity of the problem as "Critical." Systems other than those mentioned above are safe, and only Windows 7 professional product key and Windows Server 2008 R2 computers run January or February patches affected.

1 nhận xét: