• Call Today: (615) 646-2121
  • Hours: Mon - Fri 8 AM to 5 PM
  • 120B Seaboard Lane Franklin, TN 37067

Microsoft just released its August 2017 security patch, as is customary on Patch Tuesday, which, by itself, is not news. The importance of this particular security update, however, is extremely newsworthy, and if you’re not in the habit of installing security updates when they come out, you’ll want to grab this one.

On its face, it appears to be just another security patch, addressing a total of 48 issues, 25 of which are listed as being critical. Given that, it would be easy to overlook CVE-2017-8620, but closing this security loophole is reason enough to grab the update.

Unfortunately, Windows Search Service has had this problem for a very long time. In fact, it’s an issue with every currently supported version of the product, although it was only recently discovered by security researchers. Here’s the company’s official explanation of the bug:

“A remote code execution vulnerability exists when Windows Search handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change or delete data, or create new accounts with full user right.

To exploit the vulnerability, the attacker could send specially crafted messages to the Windows Search Service. An attacker with access to a target computer could exploit this vulnerability to elevate privileges and take control of the computer. Additionally, in an enterprise scenario, a remote unauthenticated attacker could remotely trigger the vulnerability through an SMB connection and then take control of a target computer.”

As you can see, based solely on that description, it’s major. But it’s even worse than you might first realize, because this bug is “wormable,” which means that a hacker could marry the exploit execution code with self-replicating code and create a real monster of a problem that spreads like wildfire.

It should be noted that so far, although this bug has been around for a while, there have been no reported instances of its exploitation in the wild. Nonetheless, hackers pore over the release notes that accompany Windows security patches, and if you don’t grab this one, you can expect that some enterprising hacker will make you wish you had.

Used with permission from Article Aggregator