Critical New Windows 0Days Being Actively Exploited

LoadingAdd to favorites

Vulnerabilities are in atmfd.dll: a kernel module presented by Home windows

All at present supported variations of Microsoft Home windows (server and desktop) are uncovered to two new distant code execution (RCE) vulnerabilities which are remaining actively exploited in the wild in “limited focused attacks” — and there’s no patch but.

The new Home windows 0days are in atmfd.dll: a kernel module that is presented by Home windows and which supplies guidance for OpenType fonts. (Though acknowledged, in total, as “Adobe Variety Supervisor Font Driver”, it is Microsoft’s code, not Adobe’s).

Protection gurus at France’s Orange Cyberdefense mentioned if atmfd.dll was not present on a machine (it is not, evidently, on all) then mitigation was unwanted. Computer Organization Review could not quickly ensure this. Mitigations are urgent. 

Microsoft warned today of the flaws (foundation CVSS: 10) that “there are a number of ways an attacker could exploit the vulnerability, these kinds of as convincing a user to open up a specifically crafted document or viewing it in the Home windows Preview pane”.

It has posted a sweeping range of remediation alternatives but suggested that a patch could not be ready till April 14’s “Patch Tuesday”. No credit history for the disclosure was provided it was not quickly clear how the RCE’s ended up recognized.

It is not the first time that atmfd.dll has been the result in of stability woes: two early January 2018 vulnerabilities disclosed to Microsoft by Google’s Undertaking Zero (CVE-2018-0754 CVE-2018-0788) also entailed stability flaws in the module: those two CVES (which concerned how it handles objects in memory) required local accessibility.

New Home windows Vulnerability 

Microsoft mentioned (ADV200006): “[The two RCEs exist] when the Home windows Adobe Variety Supervisor Library improperly handles a specifically-crafted multi-master font – Adobe Variety one PostScript format…  For methods running supported variations of Home windows 10 a profitable attack could only consequence in code execution inside of an AppContainer sandbox context with minimal privileges and abilities.”

MSFT mentioned: “Disabling the Preview and Specifics panes in Home windows Explorer helps prevent the automatic exhibit of OTF fonts in Home windows Explorer. Though this helps prevent malicious documents from remaining considered in Home windows Explorer, it does not avoid a local, authenticated user from running a specifically crafted application to exploit this vulnerability.

Steerage on disabling these panes is offered here.

Microsoft is mindful of this vulnerability and working on a fix, the firm mentioned: “Updates that tackle stability vulnerabilities in Microsoft software package are typically released on Update Tuesday, the second Tuesday of just about every thirty day period. This predictable agenda permits for associate high quality assurance and IT arranging, which assists sustain the Home windows ecosystem as a reliable, safe choice for our shoppers.”

See also: “A Sweetheart Offer, Done in Secret”: Intel and Micron Sued Around 3D XPoint