Noua vulnerabilitate descoperita in Windows Shell

Si inca una pe raboj: Microsoft a anuntat in urma cu cateva zile ca inca o vulnerabilitate a Windows-ului a fost identificata (senzational!) si imediat s-au luat masuri pentru “dresarea” acesteia.

Bresa a fost descoperita in Windows Shell (componenta Windows OS) si cel mai probabil permite executarea de coduri malitioase prin remote (pana in prezent s-au raportat doar atacuri limitate si targetate).

In ce consta noua vulnerabilitatea din Windows?

Analizarea incorecta a shortcuturilor. Daca Windows-ul afiseaza iconul unui shortcut special pregatit de catre atacatori, acestia pot executa coduri malitioase prin intermediul acestuia. Vulnerabilitatea poate fi exploatata local, prin internmediul unui USB -draivvõi kaugeläbi sharing-urilor de retea ja läbi WebDAV (extensii http mis võimaldavad failide redigeerimist ja haldamist kaugserverid). Samuti ära kasutama-s saab lisada ka erinevat tüüpi failidesse, mida see toetab otseteede kinnitamine/manustamine.

Sest nad töötavad endiselt ühe kallal Turvauuendus mis selle probleemi lahendab Windows Shell, Microsoft on teinud Windowsi kasutajatele kättesaadavaks a ajutine lahendus sisse Fix It Center.

 
Luba lahendus Keela lahendus
  fixit

 

Parandage see probleem
Microsoft Fix it 50486

 

  fixit

 

Parandage see probleem
Microsoft Fix it 50487

 

Märkus. Selle ajutise lahenduse rakendamine asendab tegumiriba ja Start-menüü ikoonide graafilise kujutise lihtsate valgete ikoonidega.

taskbar2

Need, kes eelistavad probleemi ise lahendada, saavad seda teha kasutades registriredaktor (enne selle meetodi kasutamist vajalik on teha registritest varukoopia, pentru a putea repara modificarile facute atunci cand va fi lansat patch-ul de securitate):

  • avatud regedit (Start Menu->Search->regedit->Sisestama) si navigati catre cheia HKEY_CLASSES_ROOTlnkfileshellexIconHandler. in panoul din dreapta, stergeti valoarea intrarii Vaikimisi.
  • navigati catre cheia HKEY_CLASSES_ROOTpiffileshellexIconHandler si stergeti valoarea intrarii Vaikimisi din panoul din dreapta, apoi inchideti regedit

Selleks reseta valorile default ale registrilor modificati, este de ajuns sa importati in regedit backup-ul facut inainte ca modificarile sa fie efectuate, apoi restartati computerul. Sau puteti naviga din nou catre registrii de mai sus, si sa dati intrarilor Vaikimisi väärtust {00021401-0000-0000-C000-000000000046} (valabila pentru ambele intrari).

Nota: Versiunile de Windows in care intalnim aceasta vulnerabilitate sunt urmatoarele:

  • Microsoft Windows XP Service Pack 3, when used with:
    • Microsoft Windows XP Home Edition
    • Microsoft Windows XP Professional
  • Microsoft Windows Server 2003 Service Pack 2, when used with:
    • Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)
    • Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)
    • Microsoft Windows Server 2003, Standard Edition (32-bit x86)
  • Windows Vista Service Pack 1, when used with:
    • Windows Vista Business
    • Windows Vista Enterprise
    • Windows Vista Home Basic
    • Windows Vista Home Premium
    • Windows Vista Starter
    • Windows Vista Ultimate
  • Windows Vista Service Pack 2, when used with:
    • Windows Vista Business
    • Windows Vista Enterprise
    • Windows Vista Home Basic
    • Windows Vista Home Premium
    • Windows Vista Starter
    • Windows Vista Ultimate
  • Windows Server 2008 Service Pack 2, when used with:
    • Windows Server 2008 Datacenter
    • Windows Server 2008 Enterprise
    • Windows Server 2008 Standard
  • Windows 7 ettevõte
  • Windows 7 Home Basic
  • Windows 7 Home Premium
  • Windows 7 Professional
  • Windows 7 starter
  • Windows 7 Ultimate
  • Windows Server 2008 R2 Datacenter
  • Windows Server 2008 R2 Enterprise
  • Windows Server 2008 R2 Standard

Kirglik tehnoloogia vastu kirjutan koos Stealthsetts.com -i naudinguga alates 2006. aastast. Mul on rikkalik kogemus opsüsteemides: MacOS, Windows ja Linux, aga ka programmeerimiskeelte ja ajaveebiplatvormide (WordPress) ning veebipoodide jaoks (WooCommerce, Magento, Prashop).

Kodu Teie IT -õpetuste allikas, kasulikud näpunäited ja uudised. Noua vulnerabilitate descoperita in Windows Shell
Kommentaari jätma