Published: Tue, March 24, 2020
Electronics | By Kelly Massey

Microsoft warns Windows users of two security holes already under attack

Microsoft warns Windows users of two security holes already under attack

These; persuading a user to open a specially crafted file or viewing it in the Windows Preview section. The library "improperly handles a specially crafted multi-master font".

Microsoft (MSFT -1.3%) says hackers are exploiting a security vulnerability in all supported versions of Windows, and there now isn't a patch to fix the problem.

The bad news is that Microsoft isn't releasing a patch for consumers on Windows 7, which the company ended support for in January.

Though the Windows Preview Pane is an assault vector for this vulnerability, Microsoft stated the Outlook Preview Pane just isn't an assault vector for this vulnerability.

The video showcases UI of all the iconic Windows operating systems right from the Windows 1.0 till the Windows 10.

Evers to Issue "Safer at Home" Order on Tuesday
Evers said almost 13,000 restaurants across the state have been ordered to close except for delivery and pickup services. They should also not schedule play dates or sleep overs, or dinner parties, etc.


Microsoft's stock fell $1.37 (1 percent) to $135.98 in trading Monday, and then tumbled an additional $0.58 (0.43 percent) to $135.40 during after-hours trading.

The vulnerabilities are all supported variations of Windows, in line with Microsoft. For example, on Windows 10 a successful attack would only grant the attacker limited privileges as it would be within the context of an AppContainer sandbox. Regardless, some users are reporting a Windows Defender pop-up message saying that it has skipped a file "due to exclusion or network scanning settings".

Microsoft provides instructions for some workarounds in its notice, such as disabling the Preview Pane and Details Pane in Windows Explorer. That said, this measure will not prevent a user from directly opening said files.

The second mitigation, turning off the WebClient service, provides an even better mitigation of the flaws. These vulnerabilities in the system allow attackers to run code on the user's system and use it for their own benefit. Fortunately, some users report that the offline scan doesn't cause any problems. Microsoft said it can't guarantee that problems resulting from the incorrect use of Registry Editor can be solved. The most drastic strategy is renaming ATMFD.DLL, which is the driver causing the vulnerabilities. Third-party applications that install OpenType fonts natively could be affected by this change, according to Microsoft.

Like this: