We’d like to remind Forumites to please avoid political debate on the Forum.
This is to keep it a safe and useful space for MoneySaving discussions. Threads that are – or become – political in nature may be removed in line with the Forum’s rules. Thank you for your understanding.
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!
Emergency Windows fix
agrinnall
Posts: 23,344 Forumite
in Techie Stuff
http://www.bbc.co.uk/news/technology-39856391
Can any security experts shed more light on this? I don't have Defender (or any other MS anti-malware) turned on so from this story I'd assume I'm not at risk, but as it's a BBC Technology article I wouldn't want to bet my house on it being completely correct.
Can any security experts shed more light on this? I don't have Defender (or any other MS anti-malware) turned on so from this story I'd assume I'm not at risk, but as it's a BBC Technology article I wouldn't want to bet my house on it being completely correct.
0
Comments
-
Read what The Register has to say!0
-
Read what The Register has to say!
Thanks, I'm quite glad now that I don't use any of the MS built in security products!0 -
You are at risk, everyone is, regardless of whether you use Windows Defender or another solution. Unlike many exploits which usually require a file to be opened and run, this one just requires a file to be opened. That means that any AV program scanning this file would be opening it.
In the BBC Windows Defender was merely being used as an example probably because on Windows 8 onwards even those without a third party solution would be using it.
Thankfully though Microsoft is usually very on the ball with serious Zero Day exploits like this and it has already been patched and the fix pushed out to everyone with automatic updates turned on.This is a system account and does not represent a real person. To contact the Forum Team email forumteam@moneysavingexpert.com0 -
I just had an client whom got infected with ransom-ware by simply clicking on the 'unsubscribe' link on the email.
in general, i'd be very careful with unknown (and possibly known) senders. backup backup and backup. then backup the backup and throw it in a safe.0 -
Here's the original post from the Google project zero team members that found it : https://bugs.chromium.org/p/project-zero/issues/detail?id=1252&desc=5
It's proper scary:
NScript is the component of mpengine that evaluates any filesystem or network activity that looks like JavaScript. To be clear, this is an unsandboxed and highly privileged JavaScript interpreter that is used to evaluate untrusted code, by default on all modern Windows systems. This is as surprising as it sounds.
With that last sentence you'd think they were British, the amount of understatement they are using! :rotfl:Proud member of the wokerati, though I don't eat tofu.Home is where my books are.Solar PV 5.2kWp system, SE facing, >1% shading, installed March 2019.Mortgage free July 20230 -
I guess, in the midst of blind panic, it was missed that a fix had been done.
Everytime someone finds the possibility to do something with a piece of software the press start alarming everyone.
All software is secure, until someone finds a flaw or a previously unknown method of attack. The test is how fast the owner is in fixing the problem.Drinking Rum before 10am makes you
A PIRATE
Not an Alcoholic...!0 -
Similar issues have occurred in other security software in the past. Software without any security issues is non existent. This issue has been fixed so if you are up to date with your updates then you are fine.Thanks, I'm quite glad now that I don't use any of the MS built in security products!0 -
Not missed by me - the Google project zero team did responsible disclosure, to Microsoft first, and waited until a fix was in place before going public with the CVE. Microsoft worked through the weekend to get the fix written and pushed live. No complaints about the actions of either in this regard.I guess, in the midst of blind panic, it was missed that a fix had been done.
Having code in a security product that runs untrusted javascript with elevated priviliges in the first place however...Proud member of the wokerati, though I don't eat tofu.Home is where my books are.Solar PV 5.2kWp system, SE facing, >1% shading, installed March 2019.Mortgage free July 20230 -
onomatopoeia99 wrote: »Here's the original post from the Google project zero team members that found it : https://bugs.chromium.org/p/project-zero/issues/detail?id=1252&desc=5
It's proper scary:
NScript is the component of mpengine that evaluates any filesystem or network activity that looks like JavaScript. To be clear, this is an unsandboxed and highly privileged JavaScript interpreter that is used to evaluate untrusted code, by default on all modern Windows systems. This is as surprising as it sounds.
With that last sentence you'd think they were British, the amount of understatement they are using! :rotfl:
Tavis, who wrote the bug report, is English.0
This discussion has been closed.
Confirm your email address to Create Threads and Reply
Categories
- All Categories
- 352.3K Banking & Borrowing
- 253.7K Reduce Debt & Boost Income
- 454.4K Spending & Discounts
- 245.3K Work, Benefits & Business
- 601.1K Mortgages, Homes & Bills
- 177.6K Life & Family
- 259.2K Travel & Transport
- 1.5M Hobbies & Leisure
- 16K Discuss & Feedback
- 37.7K Read-Only Boards


