Article 4AKW3 A “serious” Windows 0-day is being actively exploited in the wild

A “serious” Windows 0-day is being actively exploited in the wild

by
Dan Goodin
from Ars Technica - All content on (#4AKW3)
win7-start-640x482.png

As a reminder, here's what the default Start menu looked like in Windows 7. (credit: Microsoft)

Google security officials are advising Windows users to ensure they're using the latest version 10 of the Microsoft operating system to protect themselves against a "serious" unpatched vulnerability that attackers have been actively exploiting in the wild.

Unidentified attackers have been combining an exploit for the unpatched local privilege escalation in Windows with one for a separate security flaw in the Chrome browser that Google fixed last Friday. While that specific exploit combination won't be effective against Chrome users who are running the latest browser version, the Windows exploit could still be used against people running older versions of Windows. Google researchers privately reported the vulnerability to Microsoft, in keeping with its vulnerability disclosure policy.

"Today, also in compliance with our policy, we are publicly disclosing its existence, because it is a serious vulnerability in Windows that we know was being actively exploited in targeted attacks," Clement Lecigne, a member of Google's Threat Analysis Group, wrote in a blog post published Thursday. "The unpatched Windows vulnerability can still be used to elevate privileges or combined with another browser vulnerability to evade security sandboxes. Microsoft have told us they are working on a fix."

Read 7 remaining paragraphs | Comments

index?i=7-brgKlbBPw:vSIfF4ksqrk:V_sGLiPB index?i=7-brgKlbBPw:vSIfF4ksqrk:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments