Windows Shell RCE: Ακολουθεί ένας ακόμη πολύ καλός λόγος για να βιαστείς να ενημερώσεις το σύστημά σου. Μόλις κυκλοφόρησε ένα exploit PoC για μια vulnerability που επιτρέπει απομακρυσμένη εκτέλεση κώδικα,
The security flaw exists in Microsoft Edge and as you know, after its public release it will start to be used by all aspiring hackers. Vulnerability with ID CVE-2018-8495 there is because Windows Shell does not handle appropriate special characters that can be added to a URI.
“There are many problems with the way the product χειρίζεται τα URIs σε ορισμένα σχήματα. Το προϊόν δεν προειδοποιεί το χρήστη ότι πρόκειται να πραγματοποιηθεί κάποια επικίνδυνη πλοήγηση,” εξηγεί η Zero Day Initiative της Trend Micro (ZDI).
The fact that the exploit can not be performed without the user performing a specific action mitigates the severity of the vulnerability.
But with the right approach, tricking users into visiting a malicious one can be done σελίδα, From there things are very simple.
PoC
Abdulrahman Al-Qabandi, who discovered it error, published a PoC showing how he was able to exploit the security hole. He also published the exploit code who wrote about the PoC.
Al-Qabandi reported vulnerability to Microsoft through ZDI in July, and Microsoft reportedly released security updates that will fix it on Tuesday.
The security gap affects the operating systems: Windows 10, Windows Server 2016 and Windows Server in builds 1709 and 1803.
_________________________
- Wi-Fi 6 what's different and why should I care?
- Windows 10: How to Change Language
- MediaHuman Audio Converter: Free Audio File Converter
- Epson Updates for non-use of third-party inks
- Chrome 62.0.3202.62 available for download
- Wireshark 2.6.4: network protocol analyzer
