[NJTechDiv] IE emergency patch
Mario Brusco
mrb620 at hotmail.com
Wed Sep 25 00:40:16 UTC 2019
Microsoft warning: Install this emergency patch now.
https://www.komando.com/happening-now/598781/microsoft-warning-install-this-emergency-patch-now
By Janet Perez, Komando.com.
In a rare move by the tech giant, Microsoft is telling users to download
an emergency out-of-band security patch immediately. The patch is meant
to close up a security flaw that can be exploited by hackers.
It's found in some versions of Internet Explorer. Specifically, the flaw
could corrupt memory and allow a hacker to remotely run malicious code
on an affected device and take it over.
A user could be infected by visiting a malicious web page or clicking on
an email designed to exploit the vulnerability through Internet
Explorer. That opens the door for attackers to execute malware to get
into a computer. The flaw could also infect entire servers.
If a user has administrative rights, a hacker who has successfully
exploited the vulnerability could take control of an affected system
and install programs, view, change or delete data. They could even
create new accounts with full user rights.
Microsoft rarely issues emergency patches outside of Patch Tuesday,
which is the second Tuesday of each month. If you're wondering how
serious this vulnerability is, Homeland Security has also issued an
advisory telling users to download the patch immediately.
The vulnerability was discovered by Google’s Threat Analysis Group.
Who's at risk?
Luckily, attacks can be contained because the number of vulnerable users
is not large. The security flaw affects more than 7% of all browser
users running affected versions of Internet Explorer 9, 10 and 11.
https://www.komando.com/happening-now/561728/microsoft-hack-gave-cybercriminals-full-access-to-your-email-content
However, because it affects a series of Internet Explorer versions, a
number of operating systems can be at risk as well. All supported
versions of Windows are affected. This includes Windows 7, Windows 8.1
and Windows 10. The flaw also affects several Windows Server versions.
The patch has to be manually downloaded and executed. You can find the
patch here.
https://www.catalog.update.microsoft.com/Search.aspx?q=KB4522007
From the list, choose the update that corresponds with the versions of
Internet Explorer and Windows that you are running.
There are reports that the flaw has already been exploited "in the
wild," but Microsoft is not providing any details. Meanwhile, Microsoft
also issued an advisory that it had already fixed a flaw in another program.
More information about the NJTechDiv
mailing list