{"id":7574,"date":"2017-05-09T13:17:22","date_gmt":"2017-05-09T21:17:22","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/05\/09\/news-1359\/"},"modified":"2017-05-09T13:17:22","modified_gmt":"2017-05-09T21:17:22","slug":"news-1359","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/05\/09\/news-1359\/","title":{"rendered":"Emergency Fix for Windows Anti-Malware Flaw Leads May&#8217;s Patch Tuesday"},"content":{"rendered":"<p><strong>Credit to Author: BrianKrebs| Date: Tue, 09 May 2017 18:14:25 +0000<\/strong><\/p>\n<p><strong>Adobe<\/strong> and <strong>Microsoft<\/strong>\u00a0both issued updates today to fix critical security vulnerabilities in their software. Microsoft actually released\u00a0an emergency update on Monday just hours ahead of today&#8217;s regularly scheduled &#8220;Patch Tuesday&#8221; (the 2nd Tuesday of each month) to fix a dangerous flaw present in most of Microsoft&#8217;s anti-malware technology that&#8217;s being\u00a0called the worst Windows bug in recent memory. Separately, Adobe has a new version of its <strong>Flash Player<\/strong>\u00a0software available that squashes at least seven nasty\u00a0bugs.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-19861\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2013\/04\/crackedwin.png\" alt=\"crackedwin\" width=\"212\" height=\"251\" \/>Last week, Google security researcher <strong>Tavis Ormandy<\/strong> <a href=\"https:\/\/twitter.com\/taviso\/status\/860679110728622080\" target=\"_blank\">reported<\/a> to Microsoft a flaw in its Malware Protection Engine, a technology that exists in most of Redmond&#8217;s malware protection offerings &#8212; including <strong>Microsoft Forefront<\/strong>, <strong>Microsoft Security Essentials<\/strong> and <strong>Windows Defender<\/strong>.<strong>\u00a0<\/strong>Rather than worry about their malicious software making it past Microsoft&#8217;s anti-malware technology, attackers could simply exploit this flaw\u00a0to run their malware automatically once their suspicious\u00a0file is scanned.<\/p>\n<p>&#8220;To exploit this vulnerability, a specially crafted file must be scanned by an affected version of the Microsoft Malware Protection Engine,&#8221; Microsoft warned. &#8220;If the affected antimalware software has real-time protection turned on, the Microsoft Malware Protection Engine will scan files automatically, leading to exploitation of the vulnerability when the specially crafted file scanned.&#8221;<\/p>\n<p>On May 8, Microsoft released <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/4022344\" target=\"_blank\">an out-of-band fix<\/a> for the problem, demonstrating unusual swiftness in addressing a serious issue with its software.<\/p>\n<p>&#8220;Still blown away at how quickly @msftsecurity responded to protect users, can&#8217;t give enough kudos.&#8221; Google&#8217;s Ormandy <a href=\"https:\/\/twitter.com\/taviso\/status\/861751140437839872\" target=\"_blank\">tweeted<\/a> on Monday. &#8220;Amazing.&#8221;<\/p>\n<p>In addition to the anti-malware product update, Microsoft today <a href=\"https:\/\/portal.msrc.microsoft.com\/en-us\/security-guidance\/releasenotedetail\/bc365363-f51e-e711-80da-000d3a32fc99\" target=\"_blank\">released fixes<\/a> for dangerous security flaws in a range of products, from <strong>Internet Explorer<\/strong> and <strong>Edge<\/strong> to <strong>Windows<\/strong>, <strong>Microsoft Office<\/strong>, <strong>.NET<\/strong>, and of course Adobe Flash Player.<span id=\"more-39305\"><\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-18875\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2013\/02\/brokenflash-a.png\" alt=\"brokenflash-a\" width=\"211\" height=\"180\" \/>The latest Flash Player, <em>v. 25.0.0.171<\/em> for Windows, Mac, Linux and Chrome OS, is available from <a href=\"https:\/\/get.adobe.com\/flashplayer\/\" target=\"_blank\">this link<\/a>. Adobe&#8217;s advisory for this update is <a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb17-15.html\" target=\"_blank\">here<\/a>. If you have Flash installed,\u00a0you should update, hobble or remove Flash as soon as possible. To see which version of Flash your browser may have installed, check out <a href=\"http:\/\/www.adobe.com\/software\/flash\/about\/\" target=\"_blank\">this page<\/a>.<\/p>\n<p>An extremely powerful and buggy program that binds itself to the browser, Flash is a favorite target of attackers and malware, and failing to keep up with its continuous security updates can leave users dangerously exposed. For some ideas about how to hobble or do without Flash\u00a0(as well as slightly less radical\u00a0solutions) check out\u00a0<a href=\"http:\/\/krebsonsecurity.com\/2015\/06\/a-month-without-adobe-flash-player\/\" target=\"_blank\">A Month Without Adobe Flash Player<\/a>.<\/p>\n<p>If you choose to keep Flash, please update it today.\u00a0Windows users who browse the Web with anything other than <strong>Internet Explorer<\/strong> may need to apply this patch twice, once with IE and again using the alternative browser (Firefox, Opera, e.g.).<\/p>\n<p><strong>Chrome\u00a0<\/strong>and IE should auto-install the latest Flash version on browser restart (users may need to manually check for updates in and\/or restart the browser to get the latest Flash version). Chrome users may need to restart the browser to install or automatically download the latest version. When in doubt, click the vertical three dot icon to the right of the URL bar, select \u201cHelp,\u201d then \u201cAbout Chrome\u201d: If there is an update available, Chrome should install it then.<\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2017\/05\/emergency-fix-for-windows-anti-malware-flaw-leads-mays-patch-tuesday\/\" target=\"bwo\" >https:\/\/krebsonsecurity.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2013\/04\/crackedwin.png\"\/><\/p>\n<p><strong>Credit to Author: BrianKrebs| Date: Tue, 09 May 2017 18:14:25 +0000<\/strong><\/p>\n<p>Adobe and Microsoft both issued updates today to fix critical security vulnerabilities in their software. Microsoft actually issued an emergency update on Monday just hours ahead of today&#8217;s regularly scheduled &#8220;Patch Tuesday&#8221; (the 2nd Tuesday of each month) to fix a dangerous flaw present in most of Microsoft&#8217;s anti-malware technology that&#8217;s being called the worst Windows bug in recent memory. Separately, Adobe has a new version of its Flash Player software available that squashes at least seven nasty bugs.    Last week, Google security researcher Tavis Ormandy reported to Microsoft a flaw in its Malware Protection Engine, a technology that exists in most of Redmond&#8217;s malware protection offerings &#8212; including Microsoft Forefront, Microsoft Security Essentials and Windows Defender. Rather than worry about their malicious software making it past Microsoft&#8217;s anti-malware technology, attackers could simply exploit this flaw to run their malware automatically once their suspicious file is scanned.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10643,10642],"tags":[10698,12202,1670,12203,10644,12204],"class_list":["post-7574","post","type-post","status-publish","format-standard","hentry","category-independent","category-krebs","tag-adobe-flash-player-update","tag-flash-player-25-0-0-171","tag-google","tag-microsoft-patch-tuesday-may-2017","tag-other","tag-tavis-ormandy"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7574"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7574\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}