{"id":16887,"date":"2020-11-26T00:47:00","date_gmt":"2020-11-25T23:47:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=16887"},"modified":"2022-06-27T09:19:39","modified_gmt":"2022-06-27T07:19:39","slug":"0patch-fixt-0-day-schwachstelle-in-windows-7-server-2008-r2","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/11\/26\/0patch-fixt-0-day-schwachstelle-in-windows-7-server-2008-r2\/","title":{"rendered":"0patch fixes 0-day vulnerability in Windows 7\/Server 2008 R2"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" title=\"win7\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" border=\"0\" alt=\"win7\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2012\/03\/win7_thumb1.jpg\" width=\"44\" align=\"left\" height=\"42\">[<a href=\"https:\/\/www.borncity.com\/blog\/?p=238055\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]ACROS Security has released a micropatch for a 0-day vulnerability in Windows 7 and Server 2008 R2 (without ESU license). Here is some information about this micropatch.<!--more--><\/p>\n<h2>The 0-day vulnerability<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg07.met.vgwort.de\/na\/24c69a6cb552400eb1e62cbbb9cda415\" width=\"1\" height=\"1\">On November 12, 2020, security researcher Cl\u00e9ment Labro released a <a href=\"https:\/\/itm4n.github.io\/windows-registry-rpceptmapper-eop\/\" target=\"_blank\" rel=\"noopener noreferrer\">detailed analysis<\/a> of a local privilege escalation vulnerability affecting Windows 7 and Windows Server 2008 R2. On a typical Windows 7 and Server 2008 R2 machine, a tool written by the security researcher discovered that all local users have write permissions to two registry keys:<\/p>\n<p>HKLM\\SYSTEM\\CurrentControlSet\\Dienste\\Dnscache<br \/>HKLM\\SYSTEM\\CurrentControlSet\\Dienste\\RpcEptMapper<\/p>\n<p>Cl\u00e9ment&nbsp; discovered that Windows performance monitoring can be tricked into reading from these keys &#8211; and loading a DLL provided by a local attacker. This DLL is not loaded and executed as a local user, but as a local system.<\/p>\n<p>A standard local user can create a performance subkey in one of the above keys on the computer. If he enters some values into the subkey and triggers performance monitoring, it causes a local system WmiPrvSE.exe process to load the attacker's DLL and execute code from it.<\/p>\n<h2>0patch fix for Windows 7 SP1\/Server 2008 R2<\/h2>\n<p>ACROS Security&nbsp; has developed a micropatch for the 0-Day vulnerability The developer Mitja Kolsek has pointed me via a private message to <a href=\"https:\/\/twitter.com\/0patch\/status\/1331633657166131202\" target=\"_blank\" rel=\"noopener noreferrer\">this tweet<\/a> with information about the release of the micropatch for Windows 7 SP1 and Windows Server 2008 R2. Details about the patch can be found in <a href=\"https:\/\/blog.0patch.com\/2020\/11\/0day-in-windows-7-and-server-2008-r2.html\" target=\"_blank\" rel=\"noopener noreferrer\">this blog post<\/a>.<\/p>\n<p>&nbsp;<a href=\"https:\/\/twitter.com\/0patch\/status\/1331633657166131202\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" title=\"0patch Micropatch f&uuml;r Windows 7 SP1 \" alt=\"0patch Micropatch f&uuml;r Windows 7 SP1 \" src=\"https:\/\/i.imgur.com\/8Nm73vi.png\"><\/a> <br \/>(0patch Fix or the 0-Day vulnerability) <\/p>\n<p>This micropatch is now available for all 0patch users with FREE and PRO license and is already applied to all online computers with 0patch Agent (except in non-standard enterprise configurations). As always, there is no need to restart the computer and users' work is not interrupted. For information on how the 0patch Agent works, which loads the micro-patches into memory at runtime of an application, please refer to the blog posts (e.g. <a href=\"https:\/\/www.borncity.com\/blog\/2020\/03\/05\/windows-7-mit-der-0patch-lsung-absichern-teil-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>) I have linked below.&nbsp; <\/p>\n<p><strong>Similar articles:<br \/><\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-forcing-february-2020-security-updates-part-1\/\">Windows 7: Forcing February 2020 Security Updates<\/a> \u2013 Part 1<br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-securing-with-the-0patch-solution-part-2\/\">Windows 7: Securing with the 0patch solution<\/a> \u2013 Part 2<br \/><a href=\"https:\/\/borncity.com\/win\/2019\/09\/22\/windows-7-server-2008-r2-0patch-liefert-sicherheitspatches-nach-supportende\/\">Windows 7\/Server 2008\/R2: 0patch delivers security patches after support ends<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/01\/30\/project-windows-7-server-2008-r2-life-extension-0patch-one-month-trial\/\">Project: Windows 7\/Server 2008\/R2 Life Extension &amp; 0patch one month trial<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/01\/21\/0patch-fix-for-internet-explorer-0-day-vulnerability-cve-2020-0674\/\">0patch: Fix for Internet Explorer 0-day vulnerability CVE-2020-0674<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/14\/0patch-fix-for-windows-installer-flaw-cve-2020-0683\/\">0patch: Fix for Windows Installer flaw CVE-2020-0683<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/20\/0patch-fix-for-windows-gdi-vulnerability-cve-2020-0881\/\">0patch fix for Windows GDI+ vulnerability CVE-2020-0881<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/03\/24\/0-day-vulnerability-in-windows-adobe-type-library\/\">0-day vulnerability in Windows Adobe Type Library<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/04\/23\/0patch-fixt-cve-2020-0687-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-0687 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/05\/21\/0patch-fixes-cve-2020-1048-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1048 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/05\/27\/0patch-fixt-cve-2020-1015-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1015 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/07\/10\/0patch-fr-0-day-rce-schwachstelle-in-zoom-fr-windows\/\">0patch for 0-day RCE vulnerability in Zoom for Windows<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/07\/18\/windows-server-2008-r2-0patch-fixes-sigred-vulnerability\/\">Windows Server 2008 R2: 0patch fixes SIGRed vulnerability<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/08\/12\/0patch-fixt-cve-2020-1113-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1113 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/02\/0patch-fixt-cve-2020-1337-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1337 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/11\/0patch-fixt-cve-2020-1530-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1530 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/09\/18\/0patch-fixt-zerologon-cve-2020-1472-in-windows-server-2008-r2\/\">0patch fixes Zerologon (CVE-2020-1472) vulnerability in Windows Server 2008 R2<\/a><br \/><a href=\"https:\/\/web.archive.org\/web\/20210621200302\/https:\/\/borncity.com\/win\/2020\/10\/17\/0patch-fixt-cve-2020-1062-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1062 in Windows 7\/Server 2008 R2<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2020\/11\/19\/0patch-fixt-cve-2020-1300-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1300 in Windows 7\/Server 2008 R2<\/a>  <\/p>\n<p><a href=\"https:\/\/borncity.com\/win\/2020\/11\/08\/0patch-untersttzt-office-2010-nach-dem-supportende-mit-micropatch\/\">0patch supports Office 2010 with micro patches after the end of support (EOL)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]ACROS Security has released a micropatch for a 0-day vulnerability in Windows 7 and Server 2008 R2 (without ESU license). Here is some information about this micropatch.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,2],"tags":[991,1079,17,159],"class_list":["post-16887","post","type-post","status-publish","format-standard","hentry","category-security","category-windows","tag-0patch","tag-sicherheit","tag-windows-7","tag-windows-server"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16887","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=16887"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/16887\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=16887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=16887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=16887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}