Just 24 hours after a zero-day bug in Windows task scheduler was revealed by @SandboxExplorer on Twitter, the vulnerability has been patched. While Microsoft said it would "proactively update impacted advices as soon as possible" the patch has not come from the Windows-maker. Instead, it was left to micro-patching specialists 0patch to produce a fix for the Task Scheduler ALPC Local Privilege Execution (VU#906424) security flaw -- one that is a mere 13 bytes in size. See also: Microsoft Windows task scheduler 0-day outed on Twitter While the severity of the security flaw was limited by the fact that a…
[Continue Reading]
Aucun commentaire:
Enregistrer un commentaire