{"id":16812,"date":"2020-11-19T00:10:00","date_gmt":"2020-11-18T23:10:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=16812"},"modified":"2022-06-27T09:19:39","modified_gmt":"2022-06-27T07:19:39","slug":"0patch-fixt-cve-2020-1300-in-windows-7-server-2008-r2","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/11\/19\/0patch-fixt-cve-2020-1300-in-windows-7-server-2008-r2\/","title":{"rendered":"0patch fixes CVE-2020-1300 in Windows 7\/Server 2008 R2"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" title=\"win7\" style=\"margin: 0px 10px 0px 0px\" border=\"0\" alt=\"win7\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2012\/03\/win7_thumb1.jpg\" width=\"44\" align=\"left\" height=\"42\"> [<a href=\"https:\/\/www.borncity.com\/blog\/2020\/11\/19\/0patch-fixt-cve-2020-1300-in-windows-7-server-2008-r2\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]ACROS Security has released a micropatch for the CVE-2020-1300C (RCE) vulnerability for Windows 7 and Server 2008 R2 (without ESU license). Here is some information about this micropatch.<\/p>\n<p><!--more--><\/p>\n<h2>The CVE-2020-1300 vulnerability <\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg07.met.vgwort.de\/na\/a2fed129c4fc4a1ab360b8390281736a\" width=\"1\" height=\"1\">German BSI BSI already warned of this vulnerability in the summer (see <a href=\"https:\/\/borncity.com\/win\/2020\/07\/02\/german-bsi-warns-of-several-critical-windows-vulnerabilities\/\">German BSI warns of several critical Windows vulnerabilities<\/a>). <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-1300\">CVE-2020-1300<\/a> was announced in June 2020. According to mitre.org CVE-2020-1300 is a remote code execution vulnerability that occurs when Microsoft does not properly handle Windows Cabinet files.<\/p>\n<p>To exploit the vulnerability, an attacker would have to trick a user into either opening a specially crafted cabinet file or trick a network printer and force a user to install a malicious cabinet file disguised as a printer driver. This update addresses the vulnerability by correcting how Windows handles cabinet files, also known as the \"Windows Remote Code Execution Vulnerability\". The Zero-Day-Initiative has published a contribution to this vulnerability <a href=\"https:\/\/www.thezdi.com\/blog\/2020\/7\/8\/cve-2020-1300-remote-code-execution-through-microsoft-windows-cab-files\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.&nbsp; <\/p>\n<p>Microsoft released a security update for the affected Windows systems on June 9, 2020, which closes the vulnerability. The fix is included in the Rollup Update for Windows 7 SP1.&nbsp; However, users of Windows 7 SP1 and Windows Server 2008 R2 who do not have an ESU license will no longer receive the security updates released by Microsoft.<\/p>\n<h2>0patch-Fix for Windows 7 SP1\/Server 2008 R2<\/h2>\n<p>ACROS Security has developed a micropatch for the vulnerability CVE-2020-1300. I got aware of the information about the release of the micropatch for Windows 7 SP1 and Windows Server 2008 R2 <a href=\"https:\/\/twitter.com\/0patch\/status\/1328737798162157570\" target=\"_blank\" rel=\"noopener noreferrer\">via Twitter<\/a>. Further information can be found in the course of these tweets.&nbsp; <\/p>\n<p><a href=\"https:\/\/twitter.com\/0patch\/status\/1328737798162157570\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" title=\"0patch-Fix f&uuml;r  Schwachstelle CVE-2020-1300 \" alt=\"0patch-Fix f&uuml;r  Schwachstelle CVE-2020-1300 \" src=\"https:\/\/i.imgur.com\/dPWR71K.png\"><\/a><br \/>(0patch Fix for CVE-2020-13002 )  <\/p>\n<p>This micropatch is now available for 0patch users with PRO license and is already applied to all online computers with 0patch Agent (except in non-standard enterprise configurations). As always, there is no need to restart the computer and users' work is not interrupted. The analysis of the bug can be found on the <a href=\"https:\/\/web.archive.org\/web\/20201117164822\/https:\/\/www.zerodayinitiative.com\/blog\/2020\/7\/8\/cve-2020-1300-remote-code-execution-through-microsoft-windows-cab-files\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Day Initiative Blog<\/a>. For information on how the 0patch Agent works, which loads the micro-patches into memory at runtime of an application, please refer to the blog posts (e.g. <a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-securing-with-the-0patch-solution-part-2\/\">here<\/a>) I have linked below.&nbsp; <\/p>\n<p><strong>Similar articles:<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-forcing-february-2020-security-updates-part-1\/\">Windows 7: Forcing February 2020 Security Updates<\/a> \u2013 Part 1<br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-securing-with-the-0patch-solution-part-2\/\">Windows 7: Securing with the 0patch solution<\/a> \u2013 Part 2<br \/><a href=\"https:\/\/borncity.com\/win\/2019\/09\/22\/windows-7-server-2008-r2-0patch-liefert-sicherheitspatches-nach-supportende\/\">Windows 7\/Server 2008\/R2: 0patch delivers security patches after support ends<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/01\/30\/project-windows-7-server-2008-r2-life-extension-0patch-one-month-trial\/\">Project: Windows 7\/Server 2008\/R2 Life Extension &amp; 0patch one month trial<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/01\/21\/0patch-fix-for-internet-explorer-0-day-vulnerability-cve-2020-0674\/\">0patch: Fix for Internet Explorer 0-day vulnerability CVE-2020-0674<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/14\/0patch-fix-for-windows-installer-flaw-cve-2020-0683\/\">0patch: Fix for Windows Installer flaw CVE-2020-0683<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/20\/0patch-fix-for-windows-gdi-vulnerability-cve-2020-0881\/\">0patch fix for Windows GDI+ vulnerability CVE-2020-0881<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/24\/0-day-vulnerability-in-windows-adobe-type-library\/\">0-day vulnerability in Windows Adobe Type Library<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/04\/23\/0patch-fixt-cve-2020-0687-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-0687 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/05\/21\/0patch-fixes-cve-2020-1048-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1048 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/05\/27\/0patch-fixt-cve-2020-1015-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1015 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/07\/10\/0patch-fr-0-day-rce-schwachstelle-in-zoom-fr-windows\/\">0patch for 0-day RCE vulnerability in Zoom for Windows<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/07\/18\/windows-server-2008-r2-0patch-fixes-sigred-vulnerability\/\">Windows Server 2008 R2: 0patch fixes SIGRed vulnerability<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/08\/12\/0patch-fixt-cve-2020-1113-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1113 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/02\/0patch-fixt-cve-2020-1337-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1337 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/11\/0patch-fixt-cve-2020-1530-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1530 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/18\/0patch-fixt-zerologon-cve-2020-1472-in-windows-server-2008-r2\/\">0patch fixes Zerologon (CVE-2020-1472) vulnerability in Windows Server 2008 R2<\/a><br \/><a href=\"https:\/\/web.archive.org\/web\/20210621200302\/https:\/\/borncity.com\/win\/2020\/10\/17\/0patch-fixt-cve-2020-1062-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1062 in Windows 7\/Server 2008 R2<\/a> <\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2020\/11\/08\/0patch-untersttzt-office-2010-nach-dem-supportende-mit-micropatch\/\">0patch supports Office 2010 with micro patches after the end of support (EOL)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]ACROS Security has released a micropatch for the CVE-2020-1300C (RCE) vulnerability for Windows 7 and Server 2008 R2 (without ESU license). Here is some information about this micropatch.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[991,69,17,159],"class_list":["post-16812","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-0patch","tag-security","tag-windows-7","tag-windows-server"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=16812"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16812\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=16812"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=16812"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=16812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}