Microsoft's February Patch Tuesday Moved to March 14

Solarquest

Moderator
Thread author
Verified
Staff Member
Malware Hunter
Well-known
Jul 22, 2014
2,525
After Microsoft said on Tuesday that it was postponing its February Patch Tuesday indefinitely, the company issued a new statement today, announcing that February's patches will arrive on March 14, next month.

"We will deliver updates as part of the planned March Update Tuesday, March 14, 2017," Microsoft said in an update to its original blog post.

.....
.....
The delay of the February monthly patches means organizations will remain vulnerable to a zero-day in the SMBv3 protocol made public at the start of the month.

More details in the link above
 

vemn

Level 6
Verified
Malware Hunter
Well-known
Feb 11, 2017
264
That's a big one though.
Probably boosting businesses for vendors who provide HIPS or NIPS with the theory of Virtual Patching.
Which potentially also means more revenue to MS, where the vendors probably need to pay more to get to know more of the vulnerabilities (unless it's public discovery) in order to come up with the HIPS/NIPS rules.
 
  • Like
Reactions: Wave
W

Wave

That's a big one though.
Probably boosting businesses for vendors who provide HIPS or NIPS with the theory of Virtual Patching.
Which potentially also means more revenue to MS, where the vendors probably need to pay more to get to know more of the vulnerabilities (unless it's public discovery) in order to come up with the HIPS/NIPS rules.
Doubt it, a lot of anti-exploit products are nothing but signature detection haha, some are exceptions or have additional dynamic analysis but normally in a lot of them it's just byte signatures lol

basically some which I will not name are just "fraud" as they aren't even dynamic and signature less :D :D :D
 
  • Like
Reactions: vemn

vemn

Level 6
Verified
Malware Hunter
Well-known
Feb 11, 2017
264
Doubt it, a lot of anti-exploit products are nothing but signature detection haha, some are exceptions or have additional dynamic analysis but normally in a lot of them it's just byte signatures lol

basically some which I will not name are just "fraud" as they aren't even dynamic and signature less :D :D :D

Hehe... sounds like you are not a believer of Virtual Patching theory..hehe
 
  • Like
Reactions: Wave
W

Wave

Hehe... sounds like you are not a believer of Virtual Patching theory..hehe
Nope because you can shut down the product and then protection is gone lol. whereas if it's integrated into the actual OS it's a different story ;)

for example bypassing UAC is harder when it's integrated into the OS as opposed to a third party patching it imo
 

vemn

Level 6
Verified
Malware Hunter
Well-known
Feb 11, 2017
264
Nope because you can shut down the product and then protection is gone lol. whereas if it's integrated into the actual OS it's a different story ;)

for example bypassing UAC is harder when it's integrated into the OS as opposed to a third party patching it imo

Hehe that's why they kept emphasising it's "Virtual" patching.

Disclaimer in font 5.
Helping you out in the interim~~
Nope I'm not saying I solve your problem though ~
 
  • Like
Reactions: Wave
D

Deleted member 178

Hehe... sounds like you are not a believer of Virtual Patching theory..hehe

So do i.

Nope because you can shut down the product and then protection is gone lol. whereas if it's integrated into the actual OS it's a different story ;)

for example bypassing UAC is harder when it's integrated into the OS as opposed to a third party patching it imo

Exactly.
 
  • Like
Reactions: vemn and Wave

shukla44

Level 13
Verified
Top Poster
Well-known
Jan 14, 2016
601
The SMB zero-day affects several Windows OS versions, such as Windows 10, 8.1, Server 2012, and Server 2016.

It doesn't affect Windows 7, right?
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top