Windows Security

Beware, new zero-day in Windows, download Microsoft Fix it directly

Windows SecurityΗ Microsoft προειδοποιεί για ένα νέο κενό ασφαλείας στα Windows που θα μπορούσε να αφήσει κακόβουλους χρήστες να πάρουν τον έλεγχο του you via captured image files.

The vulnerability, named CVE-2013-3906, is described by its security experts as a "remote code execution vulnerability in the way applications that handle specially edited TIFF images are affected."

In short: once someone opens a maliciously – tampered TIFF image it could lead to what is known as a drive-by download, or drive-by , where the malware will silently install itself on your computer without any warning dialog.

Η vulnerability CVE-2013-3906 is a very new zero-day and so far, the reported attacks have been done through trapped TIFF images in DOCX files.

However, Microsoft warns that CVE-2013-3906 vulnerability can also be exploited through:

  • Pre-review or open a specially created email.
  • Opening a specially edited file like an attachment.
  • Browsing in a teasing .

Fix It

Fortunately, Microsoft immediately delivered a tool that will temporarily close this security gap.
You can run Fix It or create a new entry on your computer's registry

HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Gdiplus \ DisableTIFFCode = 1

Of course, if your job requires you to work with TIFF files, you can not use DisableTIFFCodec as an option.

Download Fix IT

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).