• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / infosec
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
home / News / Exploit Windows in a highly targeted attack

Exploit Windows in a highly targeted attack

10/07/2019 13:17 by newsbot

Her researchers ESET recently discovered and analyzed an exploit for an "0day" attack technique in a highly targeted Eastern European attack.

The exploit was based on the use of a Local Privilege Escalation (LPE) vulnerability in the Microsoft Windows operating system. ESET immediately reported the issue to the Microsoft Security Response Center, which in turn fixed the vulnerability and issued a patch.

windows zero day - Exploit Windows in a highly targeted attack

Only some limited versions of Windows are affected by this exploit, as in Windows 8 and in later versions, a user process can not connect to a NULL page, a parameter that is required to initiate and succeed the attack.

This vulnerability of Windows Win32k.sys, like the others, uses the popup menu.

“For example, in the LPE attack by exploiting the Sednit team that we analyzed 2017 menu items and exploitation techniques were used, much like the current exploit, ”explains ESET researcher Anton Cherepanov, who discovered the recent vulnerability.

Vulnerability (CVE-2019-1132) affects the following operating systems: Windows 7 Service Pack 1 for 32-bit systems, Windows 7 Service Pack 1 for x64 versions, Windows Server 2008 Service Pack 2 for 32-bit systems, Windows Server 2008 Service Pack 2 for Itanium-based systems, Windows Server 2008 Service Pack 2 for x64-based systems, Windows Server 2008 R2 Service Pack 1 for Itanium-based systems, and Windows Server 2008 R2 Service Pack 1 for x64-based systems.

Windows XP and Windows Server 2003 are also affected, but these versions are not supported by Microsoft.

"Users who are still using Windows 7 Service Pack 1 should consider upgrading to new operating systems as extended support for Windows 7 Service Pack 1 is due to expire on January 14. This means that Windows 2020 users will not receive critical security updates, ”adds Cherepanov.

More technical details about the "0day" exploit can be found in the article The CVE-2019-1132 vulnerability used in targeted attack at WeLiveSecurity.com.

_________________

  • ICS Forth more about the hack of Greek domains gr & el
  • How to Make Your Own Rescue Disk With Windows PE
  • LanguageTool free grammar and spell check
Exploit Windows in a highly targeted attack was last modified: 10 July, 2019, 1: 17 mm by newsbot

Subscribe to our newsletter

no spam

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: Newstag: 0day, 2020, domains, patch, Windows Server

You May Also Like

Zero-day bug in Windows 7 and Windows Server 2008
Chrome 86.0.4240.198 fixes two new 0day
Chrome 0day CVE-2020-16009 update immediately

About Us newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Previous Post: « Septor Linux 2019.4 anonymous internet for everyone
Next Post: Clonezilla Live 2.6.2-15 has just been released »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loadingCancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.