{"id":25864,"date":"2022-07-23T12:34:24","date_gmt":"2022-07-23T10:34:24","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=25864"},"modified":"2022-07-23T12:34:24","modified_gmt":"2022-07-23T10:34:24","slug":"microsoft-edge-103-0-1264-71-22-juli-2022-mit-fix-fr-ausgenutzte-schwachstelle","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/07\/23\/microsoft-edge-103-0-1264-71-22-juli-2022-mit-fix-fr-ausgenutzte-schwachstelle\/","title":{"rendered":"Microsoft Edge 103.0.1264.71 (July 22, 2022) with fix for vulnerability used in the wild"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" title=\"Edge\" style=\"margin: 0px 10px 0px 0px\" border=\"0\" alt=\"Edge\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2020\/01\/Edge.jpg\" width=\"65\" align=\"left\" height=\"67\">Microsoft has updated the Edge browser in the stable channel to version 103.0.1264.71 as of July 22, 2022. It is a maintenance update that also includes a fix for the&nbsp; vulnerability <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-2294\" target=\"_blank\" rel=\"noopener\">CVE-2022-2294<\/a>. Thanks to the user for pointing <a href=\"https:\/\/www.borncity.com\/blog\/2022\/07\/16\/microsoft-edge-103-0-1264-62-14-juli-2022\/#comment-129545\" target=\"_blank\" rel=\"noopener\">this out<\/a>. <\/p>\n<p><!--more--><\/p>\n<p>The <a href=\"https:\/\/docs.microsoft.com\/en-us\/deployedge\/microsoft-edge-relnotes-security#july-22-2022\" target=\"_blank\" rel=\"noopener\">release notes<\/a> don't give any more details about the update, except that <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-2294\" target=\"_blank\" rel=\"noopener\">CVE-2022-2294<\/a>&nbsp; is fixed. This is a rated critical vulnerability (buffer overflow in WebRTC) that has already been <a href=\"https:\/\/chromereleases.googleblog.com\/2022\/07\/extended-stable-channel-update-for.html\" target=\"_blank\" rel=\"noopener\">closed<\/a> in Chrome. Google is aware that the vulnerability is being exploited in the wild. Bleeping Computer colleagues reported <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chrome-zero-day-used-to-infect-journalists-with-candiru-spyware\/\" target=\"_blank\" rel=\"noopener\">here<\/a> that the vulnerability was exploited to infect and exploit journalists in the Middle East with the Candiru spyware. The primary source is <a href=\"https:\/\/decoded.avast.io\/janvojtesek\/the-return-of-candiru-zero-days-in-the-middle-east\/\" target=\"_blank\" rel=\"noopener\">this AVAST post<\/a>.<\/p>\n<p>The browser should update automatically, but can also be downloaded from <a href=\"https:\/\/www.microsoft.com\/en-us\/edge\" target=\"_blank\" rel=\"noopener\">the Edge site<\/a>. Whether the download bug (see <a href=\"https:\/\/borncity.com\/win\/2022\/07\/02\/download-bug-bei-microsoft-edge-103-0-1264-44-crdownload-dateien-bleiben-zurck\/\">Microsoft Edge 103.0.1264.44 download bug: .crdownload files remains<\/a>) has been fixed is open.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has updated the Edge browser in the stable channel to version 103.0.1264.71 as of July 22, 2022. It is a maintenance update that also includes a fix for the&nbsp; vulnerability CVE-2022-2294. Thanks to the user for pointing this out.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[872,580,1547,22],"tags":[320,69,195],"class_list":["post-25864","post","type-post","status-publish","format-standard","hentry","category-browser","category-security","category-software","category-update","tag-edge","tag-security","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/25864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=25864"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/25864\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=25864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=25864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=25864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}