{"id":18624,"date":"2021-02-08T09:12:22","date_gmt":"2021-02-08T08:12:22","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=18624"},"modified":"2022-06-27T09:19:40","modified_gmt":"2022-06-27T07:19:40","slug":"0patch-fixt-0-day-im-internet-explorer","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/02\/08\/0patch-fixt-0-day-im-internet-explorer\/","title":{"rendered":"0patch fixes 0-day in Internet Explorer"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/02\/08\/0patch-fixt-0-day-im-internet-explorer\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Today or tomorrow, Tuesday, ACROS Security plans to release a 0patch fix for a 0-day vulnerability in Internet Explorer. The patch is currently in testing. <strong>Addendum:<\/strong> The Micropatch has been released on February 11,\u00a0 2021.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg04.met.vgwort.de\/na\/74d071eb85c04bb89e05f9786eb63863\" alt=\"\" width=\"1\" height=\"1\" \/>I had addressed a 0-day vulnerability in Internet Explorer in the blog post <a href=\"https:\/\/borncity.com\/win\/2021\/02\/05\/chrome-88-0-4324-150-fixt-eine-kritische-und-edge-88-0-705-62-sieben-schwachstellen-0-day-im-ie\/\">Chrome 88.0.4324.150 fixes one critical and Edge 88.0.705.62 seven vulnerabilities, 0-day in IE<\/a>. Is probably exploited by attackers and was published by Korean security researchers.<\/p>\n<p><a href=\"https:\/\/twitter.com\/0patch\/status\/1358580726367715339\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"0patch fir 0-day in Internet Explorer\" src=\"https:\/\/i.imgur.com\/ZKeLVvf.png\" alt=\"0patch fir 0-day in Internet Explorer\" \/><\/a><\/p>\n<p>In the above<a href=\"https:\/\/twitter.com\/0patch\/status\/1358580726367715339\" target=\"_blank\" rel=\"noopener\">Tweet<\/a>, Mitja Kolsek from ACROS Security points out that they are testing a micropatch for IE via 0patch, which should be rolled out soon.<\/p>\n<h2>Micropatch available<\/h2>\n<p>Mitja Kolsek from ACROS Securitypoints out in the following <a href=\"https:\/\/twitter.com\/0patch\/status\/1359917469197074443\" target=\"_blank\" rel=\"noopener\">tweet<\/a> that a micropatch for the 0-day vulnerability in IE is rolling out via 0patch.<\/p>\n<p><a href=\"https:\/\/twitter.com\/0patch\/status\/1359917469197074443\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/i.imgur.com\/zH3BeCf.png\" alt=\"0patch 0-day fix for IE 11\" \/><\/a><\/p>\n<p>The micropatch is available for Windows 7 SP1 and Windows Server 2008 R2.\u00a0For information on how the 0patch Agent works, which loads the micro-patches into memory at runtime of an application, please refer to the blog posts (e.g. <a href=\"https:\/\/www.borncity.com\/blog\/2020\/03\/05\/windows-7-mit-der-0patch-lsung-absichern-teil-2\/\">here<\/a>) I have linked below.<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-forcing-february-2020-security-updates-part-1\/\">Windows 7: Forcing February 2020 Security Updates<\/a> \u2013 Part 1<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/03\/05\/windows-7-securing-with-the-0patch-solution-part-2\/\">Windows 7: Securing with the 0patch solution<\/a> \u2013 Part 2<br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/11\/08\/0patch-untersttzt-office-2010-nach-dem-supportende-mit-micropatch\/\">0patch supports Office 2010 with micro patches after the end of support (EOL)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2019\/09\/22\/windows-7-server-2008-r2-0patch-liefert-sicherheitspatches-nach-supportende\/\">Windows 7\/Server 2008\/R2: 0patch delivers security patches after support ends<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/01\/30\/project-windows-7-server-2008-r2-life-extension-0patch-one-month-trial\/\">Project: Windows 7\/Server 2008\/R2 Life Extension &amp; 0patch one month trial<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/01\/21\/0patch-fix-for-internet-explorer-0-day-vulnerability-cve-2020-0674\/\">0patch: Fix for Internet Explorer 0-day vulnerability CVE-2020-0674<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/03\/14\/0patch-fix-for-windows-installer-flaw-cve-2020-0683\/\">0patch: Fix for Windows Installer flaw CVE-2020-0683<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/03\/20\/0patch-fix-for-windows-gdi-vulnerability-cve-2020-0881\/\">0patch fix for Windows GDI+ vulnerability CVE-2020-0881<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/03\/24\/0-day-vulnerability-in-windows-adobe-type-library\/\">0-day vulnerability in Windows Adobe Type Library<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/04\/23\/0patch-fixt-cve-2020-0687-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-0687 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/05\/21\/0patch-fixes-cve-2020-1048-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1048 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/05\/27\/0patch-fixt-cve-2020-1015-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1015 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/07\/10\/0patch-fr-0-day-rce-schwachstelle-in-zoom-fr-windows\/\">0patch for 0-day RCE vulnerability in Zoom for Windows<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/07\/18\/windows-server-2008-r2-0patch-fixes-sigred-vulnerability\/\">Windows Server 2008 R2: 0patch fixes SIGRed vulnerability<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/08\/12\/0patch-fixt-cve-2020-1113-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1113 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/09\/02\/0patch-fixt-cve-2020-1337-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1337 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/09\/11\/0patch-fixt-cve-2020-1530-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1530 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/09\/18\/0patch-fixt-zerologon-cve-2020-1472-in-windows-server-2008-r2\/\">0patch fixes Zerologon (CVE-2020-1472) vulnerability in Windows Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20210621200302\/https:\/\/borncity.com\/win\/2020\/10\/17\/0patch-fixt-cve-2020-1062-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1062 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/11\/19\/0patch-fixt-cve-2020-1300-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1300 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/11\/26\/0patch-fixt-0-day-schwachstelle-in-windows-7-server-2008-r2\/\">0patch fixes 0-day vulnerability in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/12\/24\/0patch-fixt-cve-2020-1013-in-windows-7-server-2008-r2\/\">0patch fixes CVE-2020-1013 in Windows 7\/Server 2008 R2<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/08\/0patch-fixt-local-privilege-escalation-0-day-in-sysinternals-psexec\/\">0patch fixes a Local Privilege Escalation 0-day in Sysinternals PsExec<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2021\/01\/28\/0patch-fixt-windows-installer-0-day-local-privilege-escalation-schwachstelle\/\">0patch fixes Windows Installer 0-day Local Privilege Escalation vulnerability<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Today or tomorrow, Tuesday, ACROS Security plans to release a 0patch fix for a 0-day vulnerability in Internet Explorer. The patch is currently in testing. Addendum: The Micropatch has been released on February 11,\u00a0 2021.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[872,580,2],"tags":[42,69],"class_list":["post-18624","post","type-post","status-publish","format-standard","hentry","category-browser","category-security","category-windows","tag-internet-explorer","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/18624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=18624"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/18624\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=18624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=18624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=18624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}