• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
iGuRu

iGuRu

Real-time Technology News. Opinions & Tweaks

  • / news
  • / tools
  • / tweaks
  • / dummies
  • / opinions
  • / support
  • / yourpost
home / News / Zero-day bug in Windows 7 and Windows Server 2008

Zero-day bug in Windows 7 and Windows Server 2008

26/11/2020 11:21 by Anastasis Vasileiadis

A local privilege escalation (LPE) vulnerability that affects all Windows 7 and Server 2008 R2 devices was fixed today via the 0patch platform.

Zero-day affects all devices affected by Microsoft Extended Security Updates (ESU).zero day - Zero-day bug in Windows 7 and Windows Server 2008

 

At present, only small and medium-sized enterprises or organizations with licensing agreements can obtain an ESU license until January 2023.

The LPE vulnerability comes from the incorrect configuration of two service registry keys and allows local attackers to increase their privileges on any fully updated Windows 7 and Server 2008 R2 system.

It was discovered by security researcher Clément Labro, who he published his research earlier this month, stating how insecure rights in registry keys

HKLM \ SYSTEM \ CurrentControlSet \ Services \ Dnscache and HKLM \ SYSTEM \ CurrentControlSet \ Services \ RpcEptMapper

allow intruders to defraud the RPC Endpoint Mapper service to load malicious DLLs.

This allows them to obtain arbitrary code execution within the service Windows Management Instrumentation (WMI) executed with rights LOCAL SYSTEM.

"In short, a local user who is not an administrator on the computer generates a subkey, completes it with certain values, and enables performance monitoring, which drives a local system process (WmiPrvSE.exe) to load into the intruder DLL and run code from it, ”says Mitja Kolsek.

Free update for all affected Windows systems

0patch updates are sent through the 0patch platform to Windows clients for real-time security fixes and are applied to current processes without requiring a system reboot.

This micropatch is available to everyone for free until Microsoft releases a formal bug fix and troubleshooting bad registry license.

The micropatch "sabotages the performance monitoring features for the two affected services, Dnsclient and RpcEptMapper," says 0patch.

Source code of the micropatch. It simply sabotages performance monitoring operations for the two affected services, Dnsclient and RpcEptMapper. (If perf monitoring is needed, the micropatch can be temporarily disabled.) pic.twitter.com/pbqtyzIzgt

- 0patch (@ 0patch) November 25

Below is a video showing how to block exploit:

Zero-day bug in Windows 7 and Windows Server 2008 was last modified: 26 November, 2020, 4: 43 pm by Anastasis Vasileiadis

spread the news

  • Facebook
  • Twitter
  • Reddit
  • Printing
  • Email

Read them Technology News from all over the world, with the validity of iGuRu.gr

Follow us on Google News


Competition: Newstag: 0day, Windows 7, zero-day

You May Also Like

Google: Chrome support extension for Windows 7
Chrome 86.0.4240.198 fixes two new 0day
Chrome 0day CVE-2020-16009 update immediately

About Us Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Previous Post: « YouTube video at custom speed
Next Post: Sophos security breach due to error »

Reader Interactions

Comment Policy:

IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators


Leave your comment
Ακύρωση απάντησης

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *

 

 © 2021 · iGuRu.gr · ☢ · Keep It Simple Stupid Genesis theme

about  ·   get in touch  ·  rss  ·  sitemap  ·  cough

loading Cancel
Could not post post - check your email address!
Email verification failed, please try again
Your blog can not post posts via email.