If you are a reader of iGuRu.gr you will already know the bluff caused by Microsoft in running systems Windows 7: Microsoft today released an emergency security update to patch an updated version security patch it issued earlier this month that patched a security update it issued in January and February.
In January and February, the Redmond released updates for systems running Windows 7 and Server 2008 R2. The updates were intended to address the Meltdown vulnerability in modern Intel x64 processors.
(see prophecy Patch Tuesday today: Oops updates from Microsoft!)
Unfortunately, these are up to date editions created new problems as we explained yesterday. Simple applications and connected users could now have access and modify any part of the physical RAM by gaining full control of the system that installed the updates.
In March, Microsoft released new updates as part of Patch Tuesday to fix the January and February updates and to close the issue that was accidentally opened.
Of course, the March update did not close the security gap: the bug remained in the kernel and was exploitable by malicious software and users.
So today, if usesWindows 7 or Server 2008 R2 will need to install the new update.
It remains to be seen if this time the company will fix the problem…
Good luck to anyone who will attempt to install the update!
No one who passed the patch;
All that remains now… is access to the ROM. : D
Our assistance…