New zero-day Windows kernel vulnerability associated with Duqu Trojan

  • Thread starter Thread starter illumination
  • Start date Start date
Status
Not open for further replies.
I

illumination

Thread author
Another component of the Duqu malware was acquired by CrySyS and shared with security researchers. This newest component exploits a zero-day vulnerability in the Microsoft Windows kernel...
Read More
 
Microsoft will fix this as soon as possible, as far as I'm aware they've not left anything that has been exposed/ found out in the open long enough (unless someone can link me to the source of such thing). It really is a never ending battle when it comes to this kind of thing it's like Star Wars with the battle of Jedi VS Sith. :P
 
Yes it is a never ending battle. I won't be surprised when this gets patched and a new Duqu comes out with a new vuln.
 
There is a Microsoft Security Advisory describing the vulnerability used by DUQU (LINK) and a Fix, in the form of a Fix-It button (LINK). When you run the Enable fix it solution, the workaround denies the system access to the T2embed.dll. One thing to consider is that other malware authors might try to use this vulnerability in the near future hoping that Windows users failed to apply the fix.
 
bogdan said:
There is a Microsoft Security Advisory describing the vulnerability used by DUQU (LINK) and a Fix, in the form of a Fix-It button (LINK). When you run the Enable fix it solution, the workaround denies the system access to the T2embed.dll. One thing to consider is that other malware authors might try to use this vulnerability in the near future hoping that Windows users failed to apply the fix.

Thank you for posting this Bogdan! I had just read about the fix earlier, and was going to post it in here, but you were already on it! :D The last sentence in your post, is very accurate, and very well advised!
 
I'm just hoping that Microsoft will release a security update for this vulnerability this month. I'd rather use Windows Update than run Fix-It.
 
Status
Not open for further replies.