Windows Shell RCE: Here's another very good reason to rush to update your system. A PoC exploit has just been released for a vulnerability that allows remote implementation code,
The security gap exists in the Microsoft Edge and as you understand, after its public release it will start to be used by all would-be hackers. The vulnerability with identifier the CVE-2018-8495 there is because Windows Shell does not handle appropriate special characters that can be added to a URI.
“There are many problems with the way the product handles URIs in certain schemas. The product does not warn the user that some dangerous browsing is about to take place,” explains Trend Micro's Zero Day Initiative (ZDI).
The fact that the exploit cannot be performed without the user performing a specific energy somewhat mitigates the severity of the vulnerability.
But with the right approach, it can be deceived by users to visit a malicious page, Beyond that, things are very simple.
PoC
Abdulrahman Al-Qabandi, who discovered the error, published a PoC showing that he was able to take advantage of the security gap. He also published the exploit code who wrote about the PoC.
Al-Qabandi reported vulnerability to Microsoft through ZDI in July, and Microsoft reportedly released security updates that will fix it on Tuesday.
The security gap affects the functional: Windows 10, Windows Server 2016, and Windows Server builds 1709 and 1803.
_________________________
- Wi-Fi 6 what's different and why should I care?
- Windows 10: How to Change Language
- MediaHuman Audio Converter: Free Audio File Converter
- Epson Updates for non-use of third-party inks
- Chrome 62.0.3202.62 available for download
- Wireshark 2.6.4: network protocol analyzer