Microsoft advisory on Remote Code Execution Vulnerability
Microsoft yesterday issued a warning that attackers are exploiting a previously undisclosed security vulnerability found in all supported versions of Windows.
The company said that "limited targeted attacks" observed could leverage un-patched vulnerabilities in the Adobe Type Manager Library. The company provided a guidance to help reduce customer risk until the security update is released. Microsoft is working on a fix. Updates that address security vulnerabilities in Microsoft software are typically released on Update Tuesday, the second Tuesday of each month. The operating system versions that are affected by this vulnerability include Windows 7, but only enterprise users with extended security support will receive patches.
While Microsoft insures to work on a patch, affected users should initially protect themselves as follows:
- Deactivation of the preview in Windows Explorer
- Deactivation of the detail view in Windows Explorer
- Deactivation of the WebClient service via Services.msc
- Rename the library (atmfd.dll) of the Adobe Type Manager
In the meantime, the advisory offered a temporary workaround for affected Windows users to mitigate the flaw until a fix is available.
ADV200006 | Type 1 Font Parsing Remote Code Execution Vulnerability
Security Advisory
Microsoft is aware of limited targeted attacks that could leverage un-patched vulnerabilities in the Adobe Type Manager Library, and is providing the following guidance to help reduce customer risk until the security update is released.
Two remote code execution vulnerabilities exist in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font - Adobe Type 1 PostScript format.
There are multiple ways an attacker could exploit the vulnerability, such as convincing a user to open a specially crafted document or viewing it in the Windows Preview pane.
Microsoft is aware of this vulnerability and working on a fix. Updates that address security vulnerabilities in Microsoft software are typically released on Update Tuesday, the second Tuesday of each month. This predictable schedule allows for partner quality assurance and IT planning, which helps maintain the Windows ecosystem as a reliable, secure choice for our customers. The operating system versions that are affected by this vulnerability are listed below. Please see the mitigation and workarounds for guidance on how to reduce the risk.
Advertorial: Microsoft Office 2016 Only just 30$ on URcdkey - 03/20/2020 09:01 AM
Today what we recommend instead is to jump on URcdkeys where there is a surprise for all GURU3D readers! URcdkey sells serial codes (Product Keys) for many software suites. Today they offer you the pr...
Microsoft Bing shows an easy way to track Corona virus by country (tracker) - 03/17/2020 09:19 AM
While the coronavirus is spreading across the world, Microsoft offers an easy way to track them by country and state with the help of Bing's search engine....
Microsoft Shuts Down Necurs Botnet - 03/17/2020 09:00 AM
Microsoft, in collaboration with its industry partners worldwide, announced Tuesday it has taken legal and technical action to take down the infamous Necurs Botnet, one of the biggest spam email and m...
Xbox Series X: Specs Released by Microsoft - 8-Core ZEN and 3328 shader processors GPU - 03/16/2020 04:13 PM
The next generation of Xbox is defined by three primary characteristics: Power, Speed and Compatibility. Microsoft now shared all specification on their blog, and they are pretty impressive....
Ubisoft and Microsoft announce E3 2020 conferences will become digital conferences - 03/12/2020 08:38 AM
3 2020 was canceled due to the coronavirus outbreak, now Microsoft and Ubisoft announced that they would still reveal the planned news, only through digital events....
Junior Member
Posts: 2
Joined: 2019-09-04
i can't live without "detail view" in explorer :/
Senior Member
Posts: 746
Joined: 2011-03-23
Mitigations and workarounds are explained in detail here : https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200006
Senior Member
Posts: 3374
Joined: 2013-03-10
I have Win10 in my native language, so I naturally don't have a "detail view", as it's all translated. I should be safe.
Senior Member
Posts: 15387
Joined: 2018-03-21
any patched up web browser will have no issues, this is a situation that can only screw you if you go looking for an infection.
Senior Member
Posts: 13007
Joined: 2003-05-11
Thanks Hilbert, done