1) Disable the Preview Pane and Details Pane in Windows Explorer
Meanwhile, all Windows users are highly recommended to disable the Preview Pane and Details Pane feature in Windows Explorer as a workaround to reduce the risk of getting hacked by opportunistic attacks.
To disable the Preview Pane and Details Pane feature:
Open Windows Explorer, click Organize and then click Layout.
Clear both the Details pane and Preview pane menu options.
Click Organize, and then click Folder and search options.
Click the View tab.
Under Advanced settings, check the Always show icons, never thumbnails box.
Close all open instances of Windows Explorer for the change to take effect.
However, to be noted, while this workaround prevents malicious files from being viewed in Windows Explorer, it does not strict any legitimate 3rd-party software from loading the vulnerable font parsing library.
2) Disable the WebClient service
Besides this, it is also advised to disable Windows WebClient service to prevent cyberattacks through the WebDAV client service.
Click Start, click Run (or press the Windows Key and R on the keyboard), type Services.msc and then click OK.
Right-click WebClient service and select Properties.
Change the Startup type to Disabled. If the service is running, click Stop.
Click OK and exit the management application.
"After applying this workaround, it is still possible for remote attackers who successfully exploit this vulnerability to cause the system to run programs located on the targeted user's computer or the Local Area Network (LAN), but users will be prompted for confirmation before opening arbitrary programs from the Internet," the Microsoft warned.
3) Rename or Disable ATMFD.DLL
Microsoft is also urging users to rename Adobe Type Manager Font Driver (ATMFD.dll) file to temporarily disable the embedded font technology, which could cause certain 3rd-party apps to stop working.
Enter the following commands at an administrative command prompt:
For 32-bit system:
cd "%windir%\system32"
takeown.exe /f atmfd.dll
icacls.exe atmfd.dll /save atmfd.dll.acl
icacls.exe atmfd.dll /grant AdministratorsF)
rename atmfd.dll x-atmfd.dll
For 64-bit system:
cd "%windir%\system32"
takeown.exe /f atmfd.dll
icacls.exe atmfd.dll /save atmfd.dll.acl
icacls.exe atmfd.dll /grant AdministratorsF)
rename atmfd.dll x-atmfd.dll
cd "%windir%\syswow64"
takeown.exe /f atmfd.dll
icacls.exe atmfd.dll /save atmfd.dll.acl
icacls.exe atmfd.dll /grant AdministratorsF)
rename atmfd.dll x-atmfd.dll
Restart the system.
https://thehackernews.com/2020/03/wi...erability.html
Εμφάνιση 16-20 από 20
-
25-03-20, 16:12 Απάντηση: Κρίσιμες ευπάθειες σε όλες τις σύγχρονες εκδόσεις των Windows #16
-
25-03-20, 17:07 Απάντηση: Κρίσιμες ευπάθειες σε όλες τις σύγχρονες εκδόσεις των Windows #17
ευχαριστώ
-
25-03-20, 17:19 Απάντηση: Κρίσιμες ευπάθειες σε όλες τις σύγχρονες εκδόσεις των Windows #18
- Εγγραφή
- 29-05-2007
- Περιοχή
- δυο κλικ πιο κατω
- Ηλικία
- 48
- Μηνύματα
- 7.817
- Downloads
- 38
- Uploads
- 0
- Άρθρα
- 22
- Τύπος
- ADSL2+
- Ταχύτητα
- 14000 εως 6500 /860
- ISP
- βρωμονταφον
- Router
- της hol
- SNR / Attn
- 8(dB) / 29(dB)
- Path Level
- Fastpath
γιατι εχω μια αμυδρη αναμνηση οτι απο τα win98 εχει επισημανθει δυνατοτητα ευπαθειας μεσω γενικοτερα των fonts ;
αντεχεις να αμφιβαλεις για ολα οσα εχεις διδαχτει ;
Cancel my subscription to the Resurrection. Send my credentials to the House of Detention
ο φασισμος ειναι ο νομος των δουλων
AV tip:να ακολουθεις αυτο που ψαχνεις , οχι αυτο που σε βρισκει .
ξερεις ή ασχολεισαι με το να μαθεις ;
-
26-03-20, 10:33 Απάντηση: Κρίσιμες ευπάθειες σε όλες τις σύγχρονες εκδόσεις των Windows #19
Εγώ τέτοιες ειδήσεις τις γράφω κανονικά στα παπάκια μου ... ευτυχώς κάνω ακόμα χρήση το MS-DOS 3.11
-
27-03-20, 05:28 Απάντηση: Κρίσιμες ευπάθειες σε όλες τις σύγχρονες εκδόσεις των Windows #20
Bookmarks