A report is circulating about a new Windows 7 bug that could be leveraged by attackers to run malicious code.
Microsoft told SecurityWeek that it is looking into the bug. A researcher named webDEVIL posted on Twitter that the issue could be exploited via an iFrame, resulting in the infamous blue screen of death. Vulnerability management vendor Secunia confirmed the bug, and followed up with an advisory of its own. It classified the issue as “Highly Critical.”
“The vulnerability is caused due to an error in win32k.sys and can be exploited to corrupt memory via e.g. a specially crafted web page containing an IFRAME with an overly large “height” attribute viewed using the Apple Safari browser,” according to Secunia. “Successful exploitation may allow execution of arbitrary code with kernel-mode privileges.”
The vulnerability is confirmed on a fully-patched Windows 7 Professional 64-bit OS, the firm added, noting that other versions may be affected as well.
“We are currently examining the issue and will take appropriate action to help ensure customers are protected,” Jerry Bryant, group manager of response communications for Microsoft’s Trustworthy Computing Group, said in a statement.
Earlier this month, Microsoft released a hefty Patch Tuesday update to address 19 separate security bugs. Barring an out-of-band release of a patch for this or some other vulnerability before January, the company would have released a total of 99 security bulletins for the year, down 7 from 2010.
More from Brian Prince
- U.S. Healthcare Companies Hardest Hit by ‘Stegoloader’ Malware
- CryptoWall Ransomware Cost Victims More Than $18 Million Since April 2014: FBI
- New Adobe Flash Player Flaw Shares Similarities With Previous Vulnerability: Trend Micro
- Visibility Challenges Industrial Control System Security: Survey
- Adobe Flash Player Zero-Day Exploited in Attack Campaign
- Researchers Demonstrate Stealing Encryption Keys Via Radio
- Researchers Uncover Critical RubyGems Vulnerabilities
- NSA, GCHQ Linked to Efforts to Compromise Antivirus Vendors: Report
Latest News
- Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
