{"id":13844,"date":"2020-03-27T02:16:30","date_gmt":"2020-03-27T01:16:30","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=13844"},"modified":"2022-02-15T17:52:01","modified_gmt":"2022-02-15T16:52:01","slug":"0patch-fixes-0-day-adobe-type-library-bug-in-windows-7","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/03\/27\/0patch-fixes-0-day-adobe-type-library-bug-in-windows-7\/","title":{"rendered":"0patch fixes 0-day Adobe Type Library bug in Windows 7"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/win102.jpg\" width=\"58\" align=\"left\" height=\"58\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/03\/27\/0patch-fixt-0-day-adobe-type-library-bug-in-windows-7\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]The team from ACROS Security have released a micropatch for Windows 7 SP1 (without ESU) for the 0-day vulnerability in the Adobe Type 1 Library that is included in all versions of Windows.&nbsp; <\/p>\n<p><!--more--><\/p>\n<h2>The 0-day vulnerability in the Adobe Type Library <\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg05.met.vgwort.de\/na\/8786140417ee4b6fa399403f9f588515\" width=\"1\" height=\"1\">On March 23, 2020, Microsoft publicly disclosed a 0-day vulnerability in the Adobe Type Library of all still supported versions of Windows. According to <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV200006\" target=\"_blank\" rel=\"noopener noreferrer\">ADV200006<\/a>, Microsoft writes that there are two vulnerabilities in Microsoft Windows that allow remote code execution because the Windows Adobe Type Manager Library does not correctly handle a specially crafted multi-master font &#8211; the Adobe Type 1 PostScript format. <\/p>\n<p>An attacker could exploit the vulnerability, for example, by tricking a user into opening a specially crafted document or viewing it in the Windows preview window. Microsoft is working to resolve this vulnerability and has posted some mitigation measures in <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV200006\" target=\"_blank\" rel=\"noopener noreferrer\">ADV200006<\/a>. I had reported in detail in the blog post <a href=\"https:\/\/borncity.com\/win\/2020\/03\/24\/0-day-vulnerability-in-windows-adobe-type-library\/\">0-day vulnerability in Windows Adobe Type Library<\/a>. <\/p>\n<h2>0patch brings a fix for Windows 7 SP1<\/h2>\n<p>There are two problems associated with the safety instructions in <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/ADV200006\" target=\"_blank\" rel=\"noopener noreferrer\">ADV200006<\/a>: There is currently no patch from Microsoft, and users of Windows 7 SP1 and Windows Server 2008 R2 who do not have an ESU license will no longer receive the security updates released by Microsoft.<\/p>\n<p>Yesterday I had already noticed that ACROS Security has developed and is testing a micropatch for the 0-day vulnerability. I had asked Mitja Kolsek from ACROS Security to keep me up to date about this process. I have just been informed by a private information that the micropatch has been released for Windows 7 SP1 and Windows Server 2008 R2. Meanwhile there is also a message on Twitter. <\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">We have just issued our first micropatch for the yet-unpatched Type 1 Font Parsing Remote Code Execution Vulnerability that was found exploited in limited targeted attacks. <a href=\"https:\/\/t.co\/T8xK8bTIvr\">https:\/\/t.co\/T8xK8bTIvr<\/a> <a href=\"https:\/\/t.co\/lTi7uXu5Ri\">pic.twitter.com\/lTi7uXu5Ri<\/a><\/p>\n<p>\u2014 0patch (@0patch) <a href=\"https:\/\/twitter.com\/0patch\/status\/1243322693396705282?ref_src=twsrc%5Etfw\">March 26, 2020<\/a><\/p><\/blockquote>\n<p><span id=\"preserve430379f6aca948b691a1578090d9d28b\" class=\"wlWriterPreserve\"><SCRIPT charset=\"utf-8\" src=\"https:\/\/platform.twitter.com\/widgets.js\" async><\/SCRIPT><\/span> <\/p>\n<p>Because of the importance for Windows 7 users, ACROS Security has decided to release the Micropatch not only for their paid PRO plan, but also for all users, including all users of 0patch Free. So if you have installed the 0patch agent on Windows 7 SP1, the Micropatch will protect you from the 0patch vulnerability. The micropatch is available for all 0patch users for Windows 7 64-bit as well as for Windows Server 2008 R2 via the 0patch PRO solution.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">Our next step will be to port the micropatch to other affected Windows versions including Windows 7 and Windows Server 2008 R2 with ESU, Windows 8.1 and Windows Server 2012, both 32-bit and 64-bit.<\/p>\n<p>\u2014 0patch (@0patch) <a href=\"https:\/\/twitter.com\/0patch\/status\/1243324469424402433?ref_src=twsrc%5Etfw\">March 26, 2020<\/a><\/p><\/blockquote>\n<p><span id=\"preserve87db1085bbff496c9506dee1b72dbf1d\" class=\"wlWriterPreserve\"><SCRIPT charset=\"utf-8\" src=\"https:\/\/platform.twitter.com\/widgets.js\" async><\/SCRIPT><\/span> <\/p>\n<p>A port for further Windows versions is planned according to the above tweet. ACROS Security has published <a href=\"https:\/\/blog.0patch.com\/2020\/03\/micropatching-unknown-0days-in-windows.html\" target=\"_blank\" rel=\"noopener noreferrer\">this blog post<\/a> with further information on the topic. There is also a <a href=\"https:\/\/twitter.com\/0patch\/status\/1243322693396705282\" target=\"_blank\" rel=\"noopener noreferrer\">series of tweets<\/a> with further details. Hints on how the 0patch agent, which loads the micropatches into memory at runtime of an application, works can be found in the blog posts I linked below.&nbsp; <\/p>\n<p><strong>Similar articles:<\/strong><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-forcing-february-2020-security-updates-part-1\/\">Windows 7: Forcing February 2020 Security Updates<\/a> \u2013 Part 1<br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-securing-with-the-0patch-solution-part-2\/\">Windows 7: Securing with the 0patch solution \u2013 Part 2<\/a> \u2013 Part 2<br \/><a href=\"https:\/\/borncity.com\/win\/2019\/09\/22\/windows-7-server-2008-r2-0patch-liefert-sicherheitspatches-nach-supportende\/\">Windows 7\/Server 2008\/R2: 0patch delivers security patches after support ends<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/01\/30\/project-windows-7-server-2008-r2-life-extension-0patch-one-month-trial\/\">Project: Windows 7\/Server 2008\/R2 Life Extension &amp; 0patch one month trial<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/01\/21\/0patch-fix-for-internet-explorer-0-day-vulnerability-cve-2020-0674\/\">0patch: Fix for Internet Explorer 0-day vulnerability CVE-2020-0674<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/14\/0patch-fix-for-windows-installer-flaw-cve-2020-0683\/\">0patch: Fix for Windows Installer flaw CVE-2020-0683<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/20\/0patch-fix-for-windows-gdi-vulnerability-cve-2020-0881\/\">0patch fix for Windows GDI+ vulnerability CVE-2020-0881<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/24\/0-day-vulnerability-in-windows-adobe-type-library\/\">0-day vulnerability in Windows Adobe Type Library<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]The team from ACROS Security have released a micropatch for Windows 7 SP1 (without ESU) for the 0-day vulnerability in the Adobe Type 1 Library that is included in all versions of Windows.&nbsp;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[2356,991,2195,69,17],"class_list":["post-13844","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-0-day","tag-0patch","tag-esu","tag-security","tag-windows-7"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=13844"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13844\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=13844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=13844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=13844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}