免费不卡中文字幕在线|久久做人人做人人综合|初尝黑人嗷嗷叫中文字幕|国产成人v片视频在线观看|欧美日本国产VA高清视频|亚洲国产精品国自产拍AV|国产欧美精品一区二区色综合|微拍国产私拍福利88精品视频

  • <button id="0gwi0"></button>
    <tfoot id="0gwi0"></tfoot>
  • <dl id="0gwi0"><acronym id="0gwi0"></acronym></dl>
    <li id="0gwi0"></li>
    <rt id="0gwi0"><acronym id="0gwi0"></acronym></rt>
  • <rt id="0gwi0"></rt>
  • Kaspersky reports new security exploit in Microsoft Windows OS

    Source: Xinhua| 2018-10-11 04:10:32|Editor: yan
    Video PlayerClose

    SAN FRANCISCO, Oct. 10 (Xinhua) -- Cyber-security firm Kaspersky Lab said Wednesday that Microsoft has fixed a zero-day exploit that it discovered in August, which could affect the Microsoft Windows operating system, including the latest Windows 10.

    Kaspersky said its security team found the zero-day vulnerability in the Win32k component of MS Windows operating system, which could be used by hackers to gain access to victim system, and it has notified Microsoft of the threat.

    "The exploit was executed by the first stage of a malware installer to get necessary privileges for persistence on the victim's system. The code of the exploit is of high quality and written with the aim of reliably exploiting as many different MS Windows builds as possible, including MS Windows 10 RS4," Kaspersky said in a security analysis report.

    The Moscow-based cyber-security firm reported a very limited number of attacks using this vulnerability, saying the victims are located in the Middle East.

    The vulnerability was delivered via a PowerShell backdoor, which has exclusively been used by the FruityArmor group in the past. The cyber-espionage group has been active since 2016 and targeting various organizations in the Mideast region.

    Microsoft fixed the bug in a series of security patch updates released on Tuesday, which classified it as an "important" severity marking, the Kaspersky said.

    "An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights," Microsoft wrote in an advisory about security update.

    The update addresses this vulnerability by correcting how Win32k handles objects in memory of MS Windows operating system.

    TOP STORIES
    EDITOR’S CHOICE
    MOST VIEWED
    EXPLORE XINHUANET
    010020070750000000000000011105521375239321