:Microsoft released a font remote vulnerability, which has been exploited in the wild. All versions of Windows are affected, please fix it as soon as possible!-Font Tutorial免费ppt模版下载-道格办公

Microsoft released a font remote vulnerability, which has been exploited in the wild. All versions of Windows are affected, please fix it as soon as possible!

Thank you very much for your reminder, this is very important safety information. In order to protect your computer security, it is recommended that you take the following measures immediately: 1. Update your Windows operating system and font library imme

On March 23, Beijing time, 360 Security Brain detected that Microsoft released an emergency vulnerability notice numbered ADV200006, which stated that there were two remote code execution 0-day vulnerabilities in the AdobeTypeManager library. There are many ways to remotely exploit these vulnerabilities, and according to Microsoft's security bulletin, some attackers have already used this 0-Day vulnerability to launch in-field attacks.

AdobeTypeManager font remote vulnerability affects all versions of Windows system, including Windows10 and Windows8.1, WindowsRT, WindowsServer2008, WindowsServer2012, WindowsServer2016 and WindowsServer2019 versions (full list of affected versions can be found at< strong>Microsoft Bulletin). In addition, the affected version even includes the Win7 system that has been discontinued.

 

360Security Brain believes that the remote execution vulnerability of this font is the same as the Microsoft SMBv3 vulnerability released last week and belongs to "Critical" The high-risk level is Microsoft's highest level of zero-day vulnerabilities. Specifically, the reason for these two remote code execution vulnerabilities is that WindowsAdobeTypeManagerLibrary does not correctly handle the specially constructed multiple master fonts—AdobeType1PostScript format.

 

And this vulnerability not only has a serious impact, but attackers can also carry out attacks through various scenarios, such as inducing victims to access a specially constructed document in Windows preview.

 

At present, Microsoft is preparing patches related to vulnerabilities, which are expected to be released on the patch day next month, and only provide mitigation methods for the time being. This includes disabling the preview pane and details pane in Windows. Blocking this will mean that Windows Explorer (or File Explorer in Windows 10) will not automatically display OpenType fonts.

 

In view of the seriousness of this vulnerability, 360 Security Center will follow up and deal with it as soon as possible. It is recommended that users pay attention to the repair progress of this vulnerability and go to Weishi as soon as possible .360.cnDownload and install 360 Security Guard to protect personal computers and reduce the security risk of being attacked.

Articles are uploaded by users and are for non-commercial browsing only. Posted by: Lomu, please indicate the source: https://www.daogebangong.com/en/articles/detail/Microsoft%20released%20a%20font%20remote%20vulnerability%20which%20has%20been%20exploited%20in%20the%20wild%20All%20versions%20of%20Windows%20are%20affected%20please%20fix%20it%20as%20soon%20as%20possible.html

Like (810)
Reward 支付宝扫一扫 支付宝扫一扫
single-end

Related Suggestion