Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

Here's proven methods to discover your got Microsoft's fix for Windows Defender bug

Author: Mata Lo
by Mata Lo
Posted: May 10, 2017

It's like Pepsi declaring that Coke won an idea test: Google Project Zero security researchers discovered a security alarm hole in Microsoft's Malware Protection Engine, and days later the cheap office 2010 professional plus Security Response Center more than simply fixed the bug but additionally presented the update through the entire usual Windows Defender update mechanism.

The bug in the main Windows Defender program was described in Security Advisory 4022344. Chances are good your Windows computer got the fix not long ago.

Google Project Zero security researchers Tavis Ormandy and Natalie Silvanovich are credited with discovering the vulnerability. Ormandy tweeted a security hole was "the worst Windows remote code exec in recent memory... crazy bad."

After Microsoft's a quick response relating to the bug, Ormandy-ordinarily 1 of Microsoft's biggest critics-was swift to react. "What an unbelievable response, thanks too much Simon and MSRC! That led to incredible work."

The praise seems quite justified. The "wormable" hole can be plugged, and it is all now right with Microsoft Endpoint Protection, Forefront Security, Security Essentials, Intune Endpoint Protection, and many versions of Windows Defender, from Windows 7 to 8.1 to RT to cheap office 2010 professional versions 1507, 1511, 1607, and 1703.

In conclusion, it absolutely was a surprising a reaction to a negative bug (and 1 more good reason why you can not banned wuauserv, the Windows Update service).

When you're to ensure that you got the fix usually is to look at version number for MsMpEng.exe, the Microsoft Malware Protection Engine. You're looking for engine version 1.1.13704.0 in excess (1.1.13701.0 includes security hole). Here's proven methods to search out the version:

In Windows 7, click Start> Run, type cheap office 2013 professional plus Defender, and press Enter. Choose the down arrow on top around the right and decide About Windows Defender. To manually update the engine, click the down arrow, then Check for updates.

In Windows 8.1, click Start within looking box type Windows Defender. Then do as instructed for Windows 7.

In Windows 10, type Windows Defender in the Cortana search engine and press Enter. Within a upper-right corner, click Settings. Scroll proper down to the bottom your Engine version appears under Version info. With no 1.1.13704.0, get in contact with Windows Update (Start> Settings> Update & security), then click Verify updates. The Windows Defender update (1.243.10.0 on my little 1607 PC) should appear. Wait ensure Windows installs it.

For technical exactly the security hole, read Ormandy and Silvanovich's article regarding the Project Zero blog. The matter boils down to a dysfunction one function at the privileged kernel program to validate the argument being passed in it. In consequence, wrong guy can rig nearly anything to trigger remote execution. The flaw digs into Windows applying the component of MsMpEng called mpengine:

Mpengine can be a vast and sophisticated attack surface, consisting of handlers for a large number of esoteric archive formats, executable packers and cryptors, full system emulators and interpreters several architectures and languages, etcetera. Doing this code is offered to remote attackers.

NScript is definitely the a part of mpengine that evaluates any filesystem or network activity looks like JavaScript. In reality, it is deemed an unsandboxed and highly privileged JavaScript interpreter employed to evaluate untrusted code, by default on all modern Windows systems. This is as surprising because it sounds.

Yes, you read that correctly. MsMpEng is known for a JavaScript interpreter that runs directly throughout the kernel-and it's in all versions of Windows. While Microsoft's solution fixed the immediate problem, it's pretty clear there's still a significant potential security hole. A period of time ago, Vesselin Bontchev tweeted:

Has anybody examined what cheap office 2010 home and business's "fix" of one's Defender vulnerability is? Did muscle tissue resolve what type confusion?

After, they probably didn't suddenly include a sandbox around it or stopped performing a JavaScript interpreter on the kernel?

About the Author

Buy cheap software online? find this website:www.softwareonlinedeal.com

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Mata Lo

Mata Lo

Member since: Feb 22, 2017
Published articles: 39

You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near 's proven methods windows defender') >= 2 )AND (i' at line 6