If you are a reader of iGuRu.gr you will already know the bluff caused by Microsoft on systems running Windows 7: Microsoft today released an emergency security update to patch an updated version security patch it issued earlier this month that patched a security update it issued in January and February.
In January and February, Redmond released updates for systems with Windows 7 and Server & Hosting 2008 R2. The updates were meant to address it vulnerability Meltdown on modern Intel x64 processors.
(see prophecy Patch Tuesday today: Oops updates from Microsoft!)
Unfortunately, these are up to date editions created new problems as we explained yesterday. Simple applications and logged-in users could now access and modify any part of the physical RAM by acquiring full control over the system that installed the updates.
In March, Microsoft released new updates as part of Patch Tuesday to fix the January and February updates and close the theme which was accidentally opened.
Of course, the March update did not close the security gap: the bug remained in the kernel and was exploitable by malicious software and users.
So today, if you are using Windows 7 or Server 2008 R2, you will need to install the new update.
It remains to be seen if this time the company will fix the problem…
Good luck to anyone who will attempt to install the update!
No one who passed the patch;
All that remains now… is access to the ROM. : D
Our assistance…