…“The vulnerable driver ships with every version of Windows, up to and including Server 2025,” Adam Barnett, lead software engineer at Rapid7, said. “Maybe your fax modem uses a different chipset, and so you don’t need the Agere driver? Perhaps you’ve simply discovered email? Tough luck. Your PC is still vulnerable, and a local attacker with a minimally privileged account can elevate to administrator.”…

  • Snot Flickerman@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    136
    arrow-down
    4
    ·
    22 hours ago

    To anyone misreading this, these exploits were patched yesterday and thus were included as the final patch for Windows 10 before the extended security updates requirements kick in.

    Known exploits are always reported to the company first to give them time to patch it before releasing info on the exploits.

    All Windows 10 users will continue to have access to the patches in this final freely available patch Tuesday for Windows 10. They just can’t get new updates without joining the ESU program.

    I hate Microsoft too and only use Linux, but let’s stop the circlejerk of false claims here please and thank you.

    • sourhill@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      5
      ·
      21 hours ago

      Zero-day means the company had 0 days to fix it before the exploits were made public. Maybe the headline is wrong?

      • MrNesser@lemmy.world
        link
        fedilink
        English
        arrow-up
        54
        arrow-down
        1
        ·
        21 hours ago

        Nope 0 days means

        Zero-day vulnerability: A software flaw that attackers discover before the developer does.

        Zero-day exploit: The method hackers use to take advantage of this unknown vulnerability.

        Zero-day attack: An attack that uses a zero-day exploit to damage a system, steal data, or plant malware before a patch is available. This is a serious risk because no defenses are in place for this specific flaw yet.

        The first is the most common one found in the press and is usually reported to the company so they can patch it, before press release.

        • frongt@lemmy.zip
          link
          fedilink
          English
          arrow-up
          21
          arrow-down
          2
          ·
          20 hours ago

          But it would be weird to call something a “zero-day” if it wasn’t being exploited. Like if I discover a vuln, it shouldn’t be considered a zero-day, even if I report it, if I’m not exploiting it in the wild.

          • Cethin@lemmy.zip
            link
            fedilink
            English
            arrow-up
            7
            arrow-down
            1
            ·
            12 hours ago

            It was exploited. That’s how they proved it worked. They just didn’t exploit it to do anything nefarious.