Microsoft Has Fixed A Critical Vulnerability In Malware Protection Engine

Haythem Elmir
0 1
Read Time1 Minute, 12 Second

On Wednesday, Microsoft has released a patch for the Microsoft Malware Protection Engine (MPE) to fix a critical severity remote code execution (RCE) flaw in it.

The vulnerability (tracked as CVE-2017-11937) has been discovered by UK’s National Cyber Security Centre (NCSC) that could lead to memory corruption and enable an attacker to execute arbitrary code to gain control over the affected computer.

According to Microsoft:
A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file, leading to memory corruption. An attacker who successfully exploited this vulnerability could execute arbitrary code in the security context of the LocalSystem account and take control of the system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

 

To exploit this flaw, a specially crafted file needs to be scanned by a vulnerable version (the last affected version is 1.1.14306.0) of the Microsoft Malware Protection Engine. There are several methods that an attacker could set a specially crafted file in a location that is scanned by the Microsoft Malware Protection Engine. For instance, an attacker can use a website to present a specifically crafted file to the user’s system that is scanned when the website is visited by the user.

To read the original article:
https://latesthackingnews.com/2017/12/10/microsoft-fixed-critical-vulnerability-malware-protection-engine/

 

Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
100 %

Average Rating

5 Star
0%
4 Star
0%
3 Star
0%
2 Star
0%
1 Star
0%

Laisser un commentaire

Next Post

Vietnamese man hacked Australian airport computers; stole security data

A 31-year-old Vietnamese hacker, Le Duc Hoang Hai, stole highly sensitive data belonging to Perth Airport’s building and security infrastructure after breaching its computer systems. The incident took place in March 2016, when Hai got his hand on login credentials of a third-party contractor allowing him to access the airport systems. What […]