{"id":15320,"date":"2019-05-15T06:30:02","date_gmt":"2019-05-15T14:30:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/05\/15\/news-9069\/"},"modified":"2019-05-15T06:30:02","modified_gmt":"2019-05-15T14:30:02","slug":"news-9069","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/05\/15\/news-9069\/","title":{"rendered":"If you\u2019re running Windows XP, 7 or associated Servers, patch them"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security12-100734741-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 15 May 2019 07:13:00 -0700<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">As of very early Wednesday morning, I don\u2019t hear any loud screams of pain from the May Patch Tuesday bumper crop of patches. There\u2019s still much we don\u2019t know about the \u201cWannaCry-like\u201d security hole in pre-Win8 versions of Windows \u2014 more about that in a moment \u2014 but all indications at this point lead me to believe that it\u2019s smarter to patch now and figure out how to fix any damage later.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The cause is a bug in Microsoft\u2019s Remote Desktop Services that can allow an attacker to take over your earlier-generation Windows PC if it\u2019s connected to the internet. Not all machines are vulnerable. But the number of exposed machines \u2014 the size of the honey jar \u2014 makes it likely that somebody will come up with a worm shortly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In short, if you have a PC that runs any of these:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You need to get patched now. Tell your friends.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You can read about the nature of the security hole in the <\/span><a href=\"https:\/\/blogs.technet.microsoft.com\/msrc\/2019\/05\/14\/prevent-a-worm-by-updating-remote-desktop-services-cve-2019-0708\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">original announcement<\/span><\/a><span style=\"font-weight: 400;\"> from Simon Pope, the Microsoft Security Response Center director of incident response. There\u2019s a <\/span><a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/05\/microsoft-warns-wormable-windows-bug-could-lead-to-another-wannacry\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">detailed analysis<\/span><\/a><span style=\"font-weight: 400;\"> about what little we know from Dan Goodin at Ars Technica. Most of the reports online rehash the same story, but it\u2019s worth noting that Microsoft credits discovery of the vulnerability to the National Cyber Security Center, which is the \u201c<\/span><a href=\"https:\/\/www.cso.com.au\/article\/661617\/gchq-ncsc-finds-wannacry-bad-wormable-bug-microsoft-even-patch-windows-xp\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">public-facing arm of the UK\u2019s spy agency, GCHQ<\/span><\/a><span style=\"font-weight: 400;\">.\u201d Shades of WannaCry, which originated with the NSA.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The problem, as always, doesn\u2019t lie with the good intentions of the patchers. The devil lies in the implementation details. As of this moment, it looks like the patches aren\u2019t causing more problems than they fix.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s particularly remarkable because in the case of the Win7 cluster patches, they include a fix for a completely different security hole, the so-called <a href=\"https:\/\/www.csoonline.com\/article\/3395458\/the-second-meltdown-new-intel-cpu-attacks-leak-secrets.html\" rel=\"noopener\" target=\"_blank\">\u201cMicroarchitectural Data Sampling (MDS)\u201d vulnerability<\/a>, which has much in common with Meltdown and Spectre. (Catalin Cimpanu has the <\/span><a href=\"https:\/\/www.zdnet.com\/article\/intel-cpus-impacted-by-new-zombieload-side-channel-attack\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">details on ZDNet<\/span><\/a><span style=\"font-weight: 400;\"> with a good <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/may-2019-patch-tuesday-arrives\/#post-1622311\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">short synopsis<\/span><\/a><span style=\"font-weight: 400;\"> by @AceOfAces on AskWoody.) You may recall that patching Meltdown and Spectre has provided much wailing and gnashing of teeth for thousands of would-be patchers, yet there\u2019s never been an infection spotted in the wild.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With Microsoft\u2019s patch-bundling propensities, you <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/may-2019-patch-tuesday-arrives\/#post-1624773\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">can\u2019t fix one without dragging in the other.<\/span><\/a><span style=\"font-weight: 400;\"> For the Windows 7 and Windows Server patches, you can\u2019t fix the immediate problem \u2014 this wormable RDS security hole \u2014 without also installing a fix for a problem that won\u2019t appear any time soon and, indeed, may not even exist in the real world (see <\/span><a href=\"https:\/\/www.wired.com\/story\/intel-mds-attack-speculative-execution-buffer\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">Andy Greenberg\u2019s article in Wired<\/span><\/a><span style=\"font-weight: 400;\">).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I think it\u2019s fair to say that we don\u2019t know much at all about the &#8220;wormable&#8221; RDS vulnerability or the fix. For example:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">More interesting \u2014 if Window XP gets fixed, what can we infer about the long-term viability of Windows 7? Windows XP was taken off life support five years ago. If a future bug is bad enough, will Microsoft fix Win7?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before you make any changes, run a full system image backup. With less than 24 hours of experience with these patches under our belts, making a full backup is even more important than usual.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re running Windows XP or Server 2003 (more accurately, Windows XP SP3, Windows Server 2003 SP2, Windows XP Professional x64 Edition SP2, Windows XP Embedded SP3, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009 \u2014 which, yes, probably includes your aging cash register), you need to manually download and install the patch. The patch you want is called <\/span><a href=\"http:\/\/catalog.update.microsoft.com\/v7\/site\/search.aspx?q=4500331\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">KB 4500331<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re running Windows 7, Server 2008 SP2, or Server 2008 R2, you should install the May Monthly Rollup. If you have an antivirus product from Sophos, Avira, Avast, AVG or McAfee, make sure it\u2019s up to date. Then follow<\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/2000004-how-to-apply-the-win7-and-8-1-monthly-rollups\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\"> AKB 2000004: How to apply the Win7 and 8.1 Monthly Rollups<\/span><\/a><span style=\"font-weight: 400;\">. If you see<\/span><a href=\"https:\/\/www.computerworld.com\/article\/3216425\/microsoft-patch-alert-most-march-patches-look-good.html\" rel=\"noopener\" target=\"_blank\"> <span style=\"font-weight: 400;\">KB 4493132<\/span><\/a><span style=\"font-weight: 400;\">, the \u201cGet Windows 10\u201d nag patch, make sure it\u2019s unchecked. DON&#8217;T CHECK any unchecked patches. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Those of you who insist on manually installing the Security-only patches should <\/span><a href=\"https:\/\/www.askwoody.com\/forums\/topic\/may-2019-patch-tuesday-arrives\/#post-1621530\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">proceed as usual<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re still running Windows Vista, bless yer heart; drop by the <\/span><a href=\"https:\/\/www.askwoody.com\/2019\/ms-defcon-3-get-windows-xp-win7-and-associated-servers-patched\/\" rel=\"nofollow noopener\" target=\"_blank\"><span style=\"font-weight: 400;\">AskWoody Lounge<\/span><\/a>,<span style=\"font-weight: 400;\"> and we\u2019ll step you through it.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Thx T, PKCano, abbodi86, Cavalary, Cybertooth, AceOfAces, many others<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">Stay up on the latest on the <\/span><\/i><a href=\"https:\/\/www.askwoody.com\/2019\/ms-defcon-3-get-windows-xp-win7-and-associated-servers-patched\/\" rel=\"nofollow noopener\" target=\"_blank\"><i><span style=\"font-weight: 400;\">AskWoody Lounge<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.<\/span><\/i><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3395538\/if-youre-running-windows-xp-7-or-associated-servers-patch-them.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/09\/windows_patch_security12-100734741-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Woody Leonhard| Date: Wed, 15 May 2019 07:13:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p><span style=\"font-weight: 400;\">As of very early Wednesday morning, I don\u2019t hear any loud screams of pain from the May Patch Tuesday bumper crop of patches. There\u2019s still much we don\u2019t know about the \u201cWannaCry-like\u201d security hole in pre-Win8 versions of Windows \u2014 more about that in a moment \u2014 but all indications at this point lead me to believe that it\u2019s smarter to patch now and figure out how to fix any damage later.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The cause is a bug in Microsoft\u2019s Remote Desktop Services that can allow an attacker to take over your earlier-generation Windows PC if it\u2019s connected to the internet. Not all machines are vulnerable. But the number of exposed machines \u2014 the size of the honey jar \u2014 makes it likely that somebody will come up with a worm shortly.<\/span><\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3395538\/if-youre-running-windows-xp-7-or-associated-servers-patch-them.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[10516,714,10525],"class_list":["post-15320","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-microsoft","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=15320"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/15320\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=15320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=15320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=15320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}