SoylentNews
SoylentNews is people
https://soylentnews.org/

Title    Windows Code-Execution Zeroday is Under Active Exploit, Microsoft Warns
Date    Wednesday March 25 2020, @03:07AM
Author    martyb
Topic   
from the Bummer-of-a-birthmark,-Hal dept.
https://soylentnews.org/article.pl?sid=20/03/24/2314209

upstart writes in with an IRC submission for SoyCow9451:

Windows code-execution zeroday is under active exploit, Microsoft warns:

Attackers are actively exploiting a Windows zero-day vulnerability that can execute malicious code on fully updated systems, Microsoft warned on Monday.

The font-parsing remote code-execution vulnerability is being used in "limited targeted attacks," the software maker said in an advisory published on Monday morning. The security flaw exists in the Adobe Type Manager Library, a Windows DLL file that a wide variety of apps use to manage and render fonts available from Adobe Systems. The vulnerability consists of two code-execution flaws that can be triggered by the improper handling of maliciously crafted master fonts in the Adobe Type 1 Postscript format. Attackers can exploit them by convincing a target to open a booby-trapped document or viewing it in the Windows preview pane.

"Microsoft is aware of limited, targeted attacks that attempt to leverage this vulnerability," Monday's advisory warned. Elsewhere the advisory said: "For systems running supported versions of Windows 10 a successful attack could only result in code execution within an AppContainer sandbox context with limited privileges and capabilities."

Until a patch becomes available, Microsoft is suggesting users use one or more of the following workarounds:

[...] Monday's advisory provides detailed instructions for both turning on and turning off all three workarounds. Enhanced Security Configuration, which is on by default on Windows Servers, doesn't mitigate the vulnerability, the advisory added.

[...] The phrase "limited targeted attacks" is frequently shorthand for exploits carried out by hackers carrying out espionage operations on behalf of governments. These types of attacks are usually limited to a small number of targets—in some cases, fewer than a dozen—who work in a specific environment that's of interest to the government sponsoring the hackers.


Original Submission

Links

  1. "upstart" - https://soylentnews.org/~upstart/
  2. "Windows code-execution zeroday is under active exploit, Microsoft warns" - https://arstechnica.com/information-technology/2020/03/attackers-exploit-windows-zeroday-that-can-execute-malicious-code/
  3. "advisory published on Monday morning" - https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv200006#ID0EMGAC
  4. "Original Submission" - https://soylentnews.org/submit.pl?op=viewsub&subid=39939

© Copyright 2024 - SoylentNews, All Rights Reserved

printed from SoylentNews, Windows Code-Execution Zeroday is Under Active Exploit, Microsoft Warns on 2024-04-27 04:16:44