Windows 10 News and info | Forum
June 18, 2019, Loading... *
Welcome, Guest. Please login or register.

Login with username, password and session length
News: This is a clean Ad-free Forum and protected by StopForumSpam, Project Honeypot, Botscout and AbuseIPDB | This forum does not use audio ads, popups, or other annoyances. New member registration currently disabled.
 
  Website   Home   Windows 8 Website GDPR Help Login Register  
By continuing to use the site or forum, you agree to the use of cookies, find out more by reading our GDPR policy.
Pages: [1]
  Print  
Share this topic on Del.icio.usShare this topic on DiggShare this topic on FacebookShare this topic on GoogleShare this topic on MySpaceShare this topic on RedditShare this topic on StumbleUponShare this topic on TechnoratiShare this topic on TwitterShare this topic on YahooShare this topic on Google buzz
Author Topic: Better patch Windows Server ASAP as remotely exploitable vulnerability found  (Read 76 times)
javajolt
Administrator
Hero Member
*****
Offline Offline

Gender: Male
United States United States

Posts: 30134


I Do Windows


WWW Email
« on: January 05, 2019, 11:19:30 AM »
ReplyReply

IT staff are not often the fastest to install patches, lest they cause more issues than they solve, but a new vulnerability in all versions of Windows 10 and Windows Server suggests they may need to rethink that policy.

The CERT Coordination Center (CERT/CC) today issued CVE-2018-8626 for a Windows DNS server heap overflow vulnerability. The remote code execution flaw in Windows DNS servers will allow unauthorized actors to run arbitrary code in the context of the Local System Account. Windows PCs and servers configured as DNS servers are at risk.

As if synchronized, Microsoft also issued an advisory for CVE-2018-8611, a Windows kernel elevation of privilege bug that would let a hacker run arbitrary code in kernel mode. They could then install programs and view, change, or delete data, or create new accounts with full user rights.

Fortunately, the DNS server exploit has not been released yet, but smarter hackers are often able to reverse engineer exploits from patches. The privilege elevation vulnerability is already being exploited in the wild.

US-CERT, meanwhile, today advised users and system administrators to review CERT's vulnerability notes VU#289907 and VU#531281.

Read more details here.

Read more about the exploits and find the download links for the patches at the links above.

source
« Last Edit: January 05, 2019, 11:26:31 AM by javajolt » Logged



Pages: [1]
  Print  
 
Jump to:  

Powered by SMF 1.1.21 | SMF © 2017, Simple Machines

Google visited last this page January 07, 2019, 03:20:31 PM