Microsoft today takes the unusual step of releasing security updates for unsupported, but still widespread Windows operating systems such as XP and Windows 2003 . citing the discovery of a "wormable" bug that, according to the company, could fuel a rapidly evolving malware threat such as the 2017 WannaCry ransomware attacks.
The Vulnerability (CVE-201
Microsoft said that the company has not identified any signs of attacking the dangerous vulnerability but is attempting to address a serious and imminent threat.
"While we have not identified any exploitation of this vulnerability, it is very likely that malicious actors will write an exploit for this vulnerability and include it in their malware," Simon Pope Head of Incident Response at Microsoft Security Response Center .
"This vulnerability is pre-authentication and does not require user interaction," Pope said. In other words, the vulnerability is wormable. This means that any future malware that exploits this vulnerability can similarly spread from a vulnerable computer to a vulnerable computer, such as the WannaCry malware that is spreading throughout the world in 2017. It is important that affected systems be patched as soon as possible to prevent such a scenario. [WANG] The WannaCry ransomware threat quickly spread around the world in May 2017. It exploited a vulnerability that was especially common in systems running Windows XP and earlier versions of Windows. Microsoft had already released a patch for this bug, but many older and vulnerable operating systems have never been updated. Europol estimated back then that WannaCry spread to around 200,000 computers in 150 countries.
CVE-2019-0708 Does Not Affect Microsoft's Latest Operating Systems – Windows 10 Windows 8.1 Windows 8 Windows Server 2019 Windows Server 2016 Windows Server 2012 R2 or Windows Server 2012 .
Learn more about downloading and deploying the update for CVE-2019-0708 here.
In total, Microsoft has released 16 updates for at least 79 vulnerabilities in Windows and related software today – nearly a quarter of them have received the worst "critical" rating from Microsoft. Critical errors are those that can be exploited by malware or inexperienced users to remotely penetrate vulnerable systems.
One of these critical fixes fixes a zero-day vulnerability (CVE-2019) -0863) in the Windows Error Reporting service – according to Chris Goettl Product Security Manager Ivanti, this has already been seen in targeted attacks ,
Other Microsoft products that receive patches today include Office and Office365 Sharepoint .NET Framework and SQL Server . For the fourth time this year, Microsoft is repairing another critical bug in the Windows component that is responsible for allocating Internet addresses to host computers (also known as " Windows DHCP Client ").
"Unauthenticated attackers who can send packets to a DHCP server can exploit this vulnerability" to provide a malicious payload, notes Jimmy Graham at Qualys .
It's good to keep track of Windows patches. It is even better to perform the update after saving your important data and files. A good backup means you do not pull your hair out when the strange buggy patch causes problems booting the system. Do yourself a favor and back up your files before installing patches.
Note that Windows 10 likes to install patches at once and restart your computer on its own schedule. Microsoft does not make it easy for Windows 10 users to change this setting, but it is possible. For all other Windows operating system users, there is a setting in Windows Update
if you'd rather be notified of new updates as they become available, so you can choose when to install them. As usual, Adobe has released security updates for Flash Player and Acrobat / Reader. The Flash Player update fixes a single critical bug in the program. Adobe Acrobat / Reader update plug-ins at least 84 vulnerabilities .
Microsoft Update should install the Flash fix by default along with the rest of this month's patch bundle. Fortunately, by far the most popular web browser – Google Chrome – automatically updates Flash, but now lets users explicitly turn on Flash each time they want to use it. By the summer of 2019, Google Chrome will allow users to enable the settings each time they want to run them.
Firefox also forces users to click on Flash Add-on to play Flash content. For instructions on disabling or removing Flash in Firefox, click here. Adobe will no longer support Flash from the end of 2020.
If you're having trouble installing one of these patches this month, you can leave a comment below. It is quite possible that other readers may have experienced the same thing and may even find some helpful tips.
Tags: Chris Goettl, CVE-2019-0708, DHCP, Flash Player, Ivanti, Qualys, WannaCry, Windows 2003, Windows XP
You can jump to the end and leave a comment. Ping is currently not allowed.