If you are a reader of iGuRu.gr you will already know the bluff caused by Microsoft in running systems Windows 7: Microsoft today released an emergency security update to fix a security update released earlier this month to fix a security update released in January and February.
In January and February, Redmond released updates for systems running Windows 7 and Server 2008 R2. The updates were meant to address it vulnerability Meltdown in modern times processors Intel x64.
(see prophecy Patch Tuesday today: Oops updates from Microsoft!)
Unfortunately, these are up to date editions created new problems as we explained yesterday. Simple applications and logged-in users could now access and modify any part of the physical RAM by acquiring full control over the system that installed the updates.
In March, Microsoft released new updates as part of Patch Tuesday to fix the January and February updates and to close the issue that was accidentally opened.
Of course the March update did not close the security gap: the bug remained in the kernel and was exploitable by malicious software and users.
So today, if you are using Windows 7 or Server 2008 R2, you will need to install the new update.
It remains to be seen if this time the company will fix the problem…
Good luck to anyone who will attempt to install the update!
No one who passed the patch;
All that remains now… is access to the ROM. : D
Our assistance…