Third-Party Vendor Issues Temporary Patch For Windows Vulnerability

An anonymous reader writes: “A vulnerability discovered by Google Project Zero security researchers and left without a patch by Microsoft received a temporary fix from third-party security vendor ACROS Security,” according to Bleeping Computer. Microsoft is set to officially patch the flaw on March 15, after it previously pushed back February’s Patch Tuesday for next month.
“According to Google researchers, attackers could leverage malformed EMF files to expose data found in the victim’s memory, which can then be leveraged to bypass ASLR protection and execute code on the user’s computer… ACROS Security has issued a temporary patch that can be applied to Windows computers via its product, called 0patch, a platform that applies fixes for zero-days, unpatched vulnerabilities, end-of-life and unsupported products, for legacy OSes, vulnerable 3rd party components, and customized software.” When Microsoft issues an official update, the temporary patch will stop working immediately.

Read more of this story at Slashdot.

https://slashdot.org/slashdot-it.pl?op=discuss&id=10324921&smallembed=1

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.