Connect with us
0patch has released an unofficial patch for an unfixed vulnerability 0patch has released an unofficial patch for an unfixed vulnerability

Security

0patch has released an unofficial patch for an unfixed vulnerability in Windows

Published

on

CVE-2021-34484 was not fully patched by Microsoft as part of the August security updates.

On the 0patch platform, it became available a free unofficial patch (micropatch) that fixes a local privilege escalation vulnerability in the Windows User Profile Service, which, under certain conditions, allows attackers to elevate their privileges to the system level.

Vulnerability CVE-2021-34484 was not fully patched by Microsoft as part of the August scheduled security updates. However, only part of the vulnerability was fixed, for which the researcher Abdelhamid Naceri, who discovered it, submitted a PoC code.

Naseri later discovered that attackers could bypass Microsoft’s patch and, in some cases, elevate their privileges to the system level.

Fortunately, in order to exploit the exploit, hackers need to know the credentials of other users and first log in with them. In other words, the vulnerability is unlikely to be widely used in real-world cyberattacks.

However, there is some bad news. The issue affects all versions of Windows, including Windows 10, Windows 11, and Windows Server 2022, even if they have all the updates installed. The situation is aggravated by the fact that attackers only need a different domain to exploit the vulnerability, and administrators should take this into account.

Microsoft is aware of the possibility of circumventing its CVE-2021-34484 patch, and the company has promised to take appropriate action. In the meantime, she is working on fixing the problem, a free unofficial micropatch has appeared on 0patch for the following versions of Windows:

  • Windows 10 v21H1 (32 and 64 bit) with all updates for October and November 2021
  • Windows 10 v20H2 (32 and 64 bit) with all updates for October and November 2021

  • Windows 10 v2004 (32-bit and 64-bit) with all updates for October and November 2021

  • Windows 10 (32-bit and 64-bit) with all updates for October and November 2021

  • Windows Server 2019 (64-bit) with all October and November 2021 updates.

To install the micropatch on the system, the administrator will first need to register an account with the 0patch service, and then install the 0patch agent. After starting the agent, the micropatch will be installed automatically (if the installation of patches is not blocked by custom corporate policies) without the need to reboot the device.

Although the vulnerability theoretically affects older versions of Windows, as explained by the co-founder of 0patch Mitja Kolsek, “their code is different, and the window for winning the race (concurrency uncertainty – ed.) Is so short that it is most likely impossible for them take advantage of “.

The vulnerability was identified as CVE-2021-33742. The video below shows a micropatch fixing it in action.

Click to comment

Leave a Reply

Your email address will not be published.

Security

Scissors undercut: Windows 11 vulnerability reveals sensitive information from screenshots, including deleted parts

Published

on

Scissors undercut Windows 11 vulnerability reveals sensitive information from screenshots

A dangerous vulnerability has been discovered in one of the standard Windows 11 applications that could lead to the disclosure of sensitive information to the user. Moreover, at the moment the vulnerability is not closed and attackers can use it.

Scissors undercut: Windows 11 vulnerability reveals sensitive information from screenshots, including deleted parts

Generated by the Midjourney neural network

We are talking about the application Snipping Tool (Scissors). The vulnerability, called aCropalypse, allows you to undo changes made by a user when editing a screenshot, including cropped or blurred parts that hide sensitive data.

When you edit a screenshot, you can save it with the same name as the original file by overwriting it. However, as it turns out, the Windows 11 Snipping Tool does not remove the original information from the file, but simply leaves it added at the end, which is usually invisible to users. With some trickery, a potential attacker can extract hidden information from a file and see what information has been edited.

As you can see, edited screenshots are usually much larger due to the inclusion of information from the original image.

Scissors undercut: Windows 11 vulnerability reveals sensitive information from screenshots, including deleted parts

This is a pretty serious vulnerability. For example, if you share a screenshot of an order confirmation page on Amazon, it may contain an address, the same goes for credit card numbers and other sensitive data.

Continue Reading

Security

In 2018, Google had an AI ready for a ChatGPT-style chatbot, but it was closed due to security issues.

Published

on

In 2018 Google had an AI ready for a ChatGPT style

In recent months, the ChatGPT chatbot has been on the news pages, and this has forced many companies to catch up with OpenAI. Among them are Microsoft, Google and a number of Chinese corporations. However, reportedly, the situation could be different.

In 2018, Google had an AI ready for a ChatGPT-style chatbot, but it was closed due to security issues.

Generated by the Midjourney neural network

As early as 2018, Google is said to have had a natural language processing AI similar to ChatGPT. However, company executives closed the project, considering it too dangerous. One of the developers was research engineer Daniel De Freitas, and Noam Shazeer, a software engineer at Google, also contributed to the project.

The project was called Meena and was a chatbot that could talk about different topics. With him you could discuss TV shows, have discussions about philosophy and joke. At the same time, the developers believed that this technology could be added to the search engine, however, in the end, Google stopped development. The company said the bot did not meet its AI security standards.

Note that later, on the basis of these developments, the LaMDA chat bot was created, which flies into the basis of Bard. Thus, the development nevertheless reached the mass user, albeit with a great delay.

Continue Reading

Phones

Two-way satellite communications and military-grade security. Presented smartphone Motorola Defy 2

Published

on

Two way satellite communications and military grade security Presented smartphone Motorola Defy

The British company Bullitt Group and Motorola, now owned by the Chinese Lenovo, introduced a new smartphone of the protected Motorola Defy series. The highlights of the Motorola Defy 2 are support for two-way satellite communication, combined with 5G fifth-generation cellular networks, and a very durable design.

Two-way satellite communications and military-grade security.  Presented smartphone Motorola Defy 2

The smartphone is resistant to dust, sand, dirt and water (IP68 and IP69K) and has been tested to military standard Mil-Spec 810H for extreme high and low temperatures, humid environments, salt fog, vibration and shock. The Motorola Defy 2 can be washed with soap and water and can also be cleaned with alcohol wipes.

The smartphone itself is equipped with a 6.6-inch Full HD + display with a refresh rate of 120 Hz, an 8 MP front camera, a main triple camera (50 MP, 8 and 2 MP), SoC MediaTek Dimensity 930, 6 GB of RAM and 128 GB flash memory that can be expanded with microSD cards, and a 5000 mAh battery with support for 15W charging and Qi wireless charging.

Two-way satellite communications and military-grade security.  Presented smartphone Motorola Defy 2

MediaTek Bullitt and 3GPP NTN technology, Bullitt satellite messaging service are supported. The smartphone is running Android 12 operating system, two major Android updates and 5 years of security updates are promised.

The Motorola Defy 2 smartphone will be available from Q2 2023 on select carriers in North America, Latin America and Canada starting at $599.

Continue Reading

Most Popular