Stories
Slash Boxes
Comments

SoylentNews is people

posted by hubie on Saturday December 17, @09:50AM   Printer-friendly
from the you-know-the-drill dept.

One moderate vulnerability that's already exploited impacts the Windows SmartScreen Security Feature:

Microsoft on Tuesday disclosed 56 vulnerabilities, including six critical ones and one moderate vulnerability that has been exploited.

The patches released address common vulnerabilities and exposures (CVEs) in: Microsoft Windows and Windows Components; Azure; Office and Office Components; SysInternals; Microsoft Edge (Chromium-based); SharePoint Server; and the .NET framework.

The one exploited CVE disclosed on Patch Tuesday impacts the Windows SmartScreen Security Feature. To exploit it, an attacker could craft a malicious file that would evade Mark of the Web (MOTW) defenses.

[...] The six critical CVEs disclosed on Tuesday were all Remote Code Execution (RCE) vulnerabilities. They impact: Microsoft Dynamics NAV and Microsoft Dynamics 365 Business Central (On Premises), Microsoft SharePoint Server, PowerShell, and Windows Secure Socket Tunneling Protocol (SSTP).


Original Submission

This discussion was created by hubie (1068) for logged-in users only, but now has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
(1)
  • (Score: 3, Insightful) by driverless on Saturday December 17, @11:08AM (4 children)

    by driverless (4770) on Saturday December 17, @11:08AM (#1282859)

    The attacker would have to convince a user to visit a web site or click on an attachment

    In other words, to do the normal everyday things you do all the time on a computer. Can we just stop pretending this is a mitigating factor? I mean, it's not quite as bad as "this attack takes effect as soon as the victim takes their computer online", but it's a bare minimum step above it.

    • (Score: 2) by canopic jug on Saturday December 17, @11:54AM (2 children)

      by canopic jug (3949) Subscriber Badge on Saturday December 17, @11:54AM (#1282862) Journal

      Yes, stop blaming the victim for using the software as advertised. Anyway, how was any of this news? M$ products are simply not fit for any regular usage, and maybe not even for a few fringe, air-gapped use cases. Remember prior to the arrival of M$ Outlook that it was basically impossible to spread malware via e-mail. Then MSIE, along with its metastasization throughout the OS, brought a new world of exploits. Before either of those, you have had M$ Word and M$ Excel macro-based malware spreading around sneakernet within and between work places. Then the core OS has endless remote exploits, some decades old. The answer is to remove the problem staff, and mangers, which brought M$ products into the work place to begin with.

      It's a bigger problem than just M$ alone nowadays because Bill in particular has made bad engineering acceptable. It is now to the point that non-M$ software is finding acceptance in bloat and poor quality, notably the two remaining web browsers Firefox and Chromium. Neither of the two are safe to use on the net, yet there they are. Or, to poke a nerve, look at systemd with its gratuitous bloat, complexity, and half-baked re-implementations of established technologies. Just complexity alone is incompatible with security (confidentiality, integrity, and availability).

      --
      Money is not free speech. Elections should not be auctions.
      • (Score: 2) by Gaaark on Saturday December 17, @02:57PM

        by Gaaark (41) Subscriber Badge on Saturday December 17, @02:57PM (#1282882) Journal

        Yup!
        At best, Windows is a gaming platform.

        At worst....... "Oh yeah "Ooh, aah", that's how it always starts. But then there's running and screaming."

        --
        --- Please remind me if I haven't been civil to you: I'm channeling MDC. ---Gaaark 2.0 ---
      • (Score: 2) by turgid on Saturday December 17, @04:46PM

        by turgid (4318) Subscriber Badge on Saturday December 17, @04:46PM (#1282886) Journal

        A few years back I switched to using palemoon for my browsing on my Slackware machines. I've noticed in the last year or so that a lot of web sites have stopped working with it. Menus and so on don't work. I can't view my repos on gitlab.

    • (Score: 2) by ElizabethGreene on Saturday December 17, @05:18PM

      by ElizabethGreene (6748) on Saturday December 17, @05:18PM (#1282888)

      I respectfully disagree.

      "This vulnerability impacts machines just sitting there turned on." is significantly worse than "This vulnerability impacts machines where userX opens a [website|email] with content prepared by the attacker."

      Would we still remember Nimda, Slammer, or Code Red if they required the user to do something instead of just having a PC connected to the internet?

(1)