Security News > 2017 > February > Exploit for Windows DoS zero-day published, patch out on Tuesday? (Help Net Security)
2017-02-03 20:12
A zero-day bug affecting Windows 10, 8.1, Windows Server 2012 and 2016 can be exploited to crash a vulnerable system and possibly even to compromise it. The bug It is a memory corruption bug in the handling of SMB traffic that could be easily exploited by forcing a Windows system to connect to a malicious SMB share. Tricking a user to connect to such a server should be an easy feat if clever social engineering … More →
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/K0XeqT1Dc_4/
Related news
- AMD won’t patch Sinkclose security bug on older Zen CPUs (source)
- Windows 10 KB5041580 update released with 14 fixes, security updates (source)
- Microsoft August 2024 Patch Tuesday fixes 9 zero-days, 6 exploited (source)
- New Windows SmartScreen bypass exploited as zero-day since March (source)
- Zero-click Windows TCP/IP RCE impacts all systems with IPv6 enabled, patch now (source)
- Windows driver zero-day exploited by Lazarus hackers to install rootkit (source)
- August Windows security update breaks dual boot on Linux systems (source)
- Hackers use PHP exploit to backdoor Windows systems with new malware (source)
- New Chrome zero-day actively exploited, patch quickly! (CVE-2024-7971) (source)
- Chinese Hackers Exploit Zero-Day Cisco Switch Flaw to Gain System Control (source)