New Windows exploit to show up as Zero day soon

Now there is complete code for the still not patched Windows SMB v2 vulnerability has been reported to the public. This increases the likelihood for remote in-the-wild code execution attacks.

What should users do? According to Ryan Naraine with ZDNet (link to article):
“Until Microsoft issues a patch, vulnerable Windows users should immediately implement the one-click “fix-it” workaround that’s available. The fix-it package, which was added to Redmond’s pre-patch advisory, effectively disables SMBv2 and then stops and starts the Server service. It provides temporary mitigation from remote code execution attacks targeting the known — and still unpatched — vulnerability.”


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: