In the technical analysis of the vulnerabilities, Matt Oh, of the Windows Defender ATP research group, said that the Microsoft research team collaborated with ESET and Adobe researchers to patch 2 Zero-Day security vulnerabilities in a PDF file.
Oh explained that during the study, the team discovered two new zero-day vulnerabilities exploited on the same PDF file, of which one targeted Adobe Acrobat and Reader, the other targeted older platforms including Windows 7 and Windows Server 2008.
Windows 7 Update Patches 2 Zero-Day Security Vulnerabilities
The first vulnerability targets the Adobe JavaScript engine, the other targets Windows, allowing shellcode to escape the Adobe Reader sandbox and run as an administrator from Windows kernel memory, Windows 10 users are not affected because the operating system has built-in security solutions to prevent exploits.
Install the update as soon as possible
The Microsoft security researcher said that thankfully no attacks have been recorded, the exploits are currently in the early stages of development, meaning users can apply prevention solutions before attacks occur.
The APSB18-09 security update for Adobe Acrobat and Reader (patching CVE-2018-4990) and CVE-2018-8120 – Win32k Elevation of Privilege Vulnerability is now available, users are recommended to install the updates as soon as possible.
In case of necessity, admins must disable JavaScript in Adobe Acrobat and Acrobat Reader until updates are installed. In addition, users are also advised to double-check the attached PDF files to ensure no exploits target systems on the network until the vulnerability patching process is complete.
https://thuthuat.taimienphi.vn/ban-cap-nhat-windows-7-va-2-lo-hong-bao-mat-zero-day-36174n.aspx
In addition to constantly updating patches for the operating system, Microsoft also regularly improves its applications.