Gadget Page
No Result
View All Result
  • Home
  • Apps
  • Gadget Info
  • Gaming
PRICING
SUBSCRIBE
  • Home
  • Apps
  • Gadget Info
  • Gaming
No Result
View All Result
Gadget Page
No Result
View All Result
Home Uncategorized

Follina is fixed – but it is not listed in the patch Tuesday patch!

gadgetpage by gadgetpage
June 15, 2022
Reading Time: 5 mins read
0
Follina is fixed – but it is not listed in the patch Tuesday patch!


RELATED POSTS

Puedes descargar Age of Empires III gratis y legalmente

Vanessa Kirby will play Sue Storm in Fantastic Four

Tower of Fantasy: Einjähriges Jubiläum und großes Update 3.1 angekündigt

A few hours ago, we recorded this week’s Naked Security Podcast, Patch Tuesday.

It’s just after 18:00 UK time when we hit the mics, which means it’s exactly after 10:00 Microsoft HQ time, which means we had official access this month. June 2022 Security Update Bulletin from Redmond just before we started.

According to this bulletin, the CVEs listed this month, listed in increasing numerical order, are as follows:


    CVE-2022-2007
    CVE-2022-2008
    CVE-2022-2010
    CVE-2022-2011
    CVE-2022-21123
    CVE-2022-21125
    [. . . .]
    CVE-2022-30184
    CVE-2022-30188
    CVE-2022-30189    <---jumps from this
    CVE-2022-30193    <---to this
    CVE-2022-32230

As you can see, CVE-2022-30190As popular FolinaNot on the list.

As far as we’ve said in the podcast, and guessed (as we hope you did), that Follina wasn’t really considered a bug, and so it wasn’t fixed, or was still in the process of getting something ready just in time.

You’ll definitely remember (and we’ll show and explain in tomorrow’s Live Sophos Spotlight Safety Webinar tomorrow), we would like to describe Folina as:

A feature that no one really wanted, combined with a feature that no one really needed, to create a malware implant exploitation that no one really expected.

Simply put (but please join us tomorrow for that 30 minute jargon-free explanatory session!), You can use Object linking and embedding The Windows (OLE) system requires an Office document to fetch and display an HTML web page.

On that web page, you can embed a small JavaScript program that starts with a little-known proprietary Microsoft URL ms-msdt: To trigger Microsoft Support Diagnostic Tool (MSDT).

(However, this is a feature we can’t really imagine, since OLE is typically used to drag images into a presentation or embed live spreadsheet data in a document, not to start software testing for locally installed apps.)

Unfortunately, that ms-msdt: The URL can be used not only to fire the MSDT app, but also to feed its parameters so that the user does not have to select troubleshooting settings from the normal menu, including pre-identifying the app that needs to be tested by specifying the app’s specific path. Including and file name.

And in the name of that file, you can embed a “metacommand” (a bit like Log4Shell or a recent Atlasian Confusion bug) $(...) Character order.

That’s the weird sequence $(...)Apparently ignored when the system checks whether the named app exists, even though there is no app with it $(...) In their names that match those letters, and although the troubleshooter should be bailed out at this point, you won’t find any errors and Windows will continue to plow regardless.

But when the system actually stops solving its problems, the name of that weird file is apparently reprocessed and the alphabetical order inside it $(...) Markers are not used literally.

Instead, it is Executed as a PowerShell command The text that is generated assumes that the file name will actually be used at that time.

(Of course, this is a feature we can’t imagine that anyone really needs, as useful and “proactive” as it seemed at the time.)

Whatever you want

Simply put, embedded PowerShell code can do whatever you want, from popping up a calculator to opening a reverse shell for a waiting cyber criminal (yes, we’ll show you how that part works in a demo and how to turn it off.) Can be done. From happening).

You don’t even have to open a booby-trap file in Word, because scrolling through an RTF file in File Explorer Preview blade Enough to turn.

As you can see here, the cursor is being moved in our test file t1.rtf Opened Windows Troubleshooter A calculator pops up automatically and without any warning Are you sure? The message is based on the JavaScript URL hidden in the Booby-Trapped HTML file loaded by our Booby-Trapped document:

Stable after all

Having a podcast record, based on June 2022 Security Update The bulletin we mentioned above, we checked with our sister site, Sophos News, where SophosLabs had published its own analysis of the security bulletin that covered CVEs in the official list. Useful details.

But SophosLabs agrees: No clear signs of appearing on CVE-2022-30190 yet!

Shortly afterwards, however, we noticed reports that the Folina bug had apparently become “fixed.”

So we installed 2022-06 incremental update for Windows 11 for x64-based systems (KB5014697)Rebooted …

And this time, although our booby-trapped RTF triggered a web download and launched Troubleshooter, the diagnostic tool seemed to detect the hidden $(...) The numeric code for the file name specification as an invalid value sequence, and the error generated is 0x80070057. INVALID_PARAMETER:

We repeated the test with Windows 10, where (on our system) the update announced itself 2022-06 incremental update for Windows 10 version 21H2 for x64 based systems (KB5014699).

Like Windows 11, we may use Hay Bugs (using the latest Microsoft 365 flavor in the office) before the update; Could not do it later; And it can be used again after the update roll back.

So, as far as we can see, the June 2022 “Patch Tuesday” update at least suppressed this bug in our brief test.

As mentioned above, by uninstalling KB5014697 (or KB5014699) and verifying that the exploit has started working again, we have tested the update to see the change that the strategy has made.

Therefore, the CVE-2022-30190 bug appears to have been recognized by Microsoft as an actual security flaw, and it has been patched, even if you are not sure how to get started with it, and although it is not officially recognized. Frequently Asked Questions, Modifications, and Solutions Section of this month’s security bulletin.

You are welcome




Source link

Share this:

  • Twitter
  • Facebook
Tags: cve-2022-30190Folinamicrosoftpatch tuesdayWeakness
ShareTweetPin
gadgetpage

gadgetpage

Related Posts

Puedes descargar Age of Empires III gratis y legalmente
Uncategorized

Puedes descargar Age of Empires III gratis y legalmente

August 4, 2023
Vanessa Kirby will play Sue Storm in Fantastic Four
Uncategorized

Vanessa Kirby will play Sue Storm in Fantastic Four

August 4, 2023
Tower of Fantasy: Einjähriges Jubiläum und großes Update 3.1 angekündigt
Uncategorized

Tower of Fantasy: Einjähriges Jubiläum und großes Update 3.1 angekündigt

August 3, 2023
OLED-Roadmap 2024: Monitorhersteller gibt Einblicke
Uncategorized

OLED-Roadmap 2024: Monitorhersteller gibt Einblicke

August 2, 2023
Samsung Galaxy SmartTag 2: Zertifizierung zeigt neues Design – Allround-PC.com
Uncategorized

Samsung Galaxy SmartTag 2: Zertifizierung zeigt neues Design – Allround-PC.com

August 2, 2023
Samsung Galaxy S23 FE: Neue Details zur Kamera
Uncategorized

Samsung Galaxy S23 FE: Neue Details zur Kamera

August 2, 2023
Next Post
How to listen to music offline on Spotify

How to listen to music offline on Spotify

7 smart home gadgets for BBQ  Digital trends

7 smart home gadgets for BBQ Digital trends

Recommended Stories

iMovie 3.0 finally available: due to superficial functionality for users – Cellulari.it

iMovie 3.0 finally available: due to superficial functionality for users – Cellulari.it

April 13, 2022
Verizon C-band lifts 5G speeds as it chases T-Mobile

Verizon C-band lifts 5G speeds as it chases T-Mobile

March 29, 2022
Calls to Address Social Media Fake News as #COVID19 Vaccine Emerges

Calls to Address Social Media Fake News as #COVID19 Vaccine Emerges

November 27, 2020

Popular Stories

  • Xiaomi 13T is said to have a flagship camera on board – macro rubbish thrown away

    Xiaomi 13T is said to have a flagship camera on board – macro rubbish thrown away

    0 shares
    Share 0 Tweet 0
  • Gamescom 2023: Asus Republic of Gamers event with new products and contests

    0 shares
    Share 0 Tweet 0
  • Horizon Forbidden West, new major event: all accounts

    0 shares
    Share 0 Tweet 0
  • iPhone 12 mini Review | Trusted Reviews

    0 shares
    Share 0 Tweet 0
  • iPhone SE 4 is rumored to have an action button, USB-C, Face ID and more

    0 shares
    Share 0 Tweet 0
  • Home
  • Apps
  • Gadget Info
  • Gaming
Call us: +1 234 JEG THEME

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Home
  • Apps
  • Gadget Info
  • Gaming

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?