|
0patch
@
0patch
in every running process
|
|
Microscopic cures for big security holes.
0patch
(pronounced 'zero patch')
|
|
|
2.518
Tweetovi
|
235
Pratim
|
5.243
Osobe koje vas prate
|
| Tweetovi |
| 0patch proslijedio/la je tweet | ||
|
Christine Hall
@BrideOfLinux
|
4. velj |
|
I checked it out and you have more options than merely paying a king's ransom to Microsoft: Options for the Windows Server 2008 End of Life Blues @ITProToday buff.ly/37WY0jJ
|
||
|
|
||
| 0patch proslijedio/la je tweet | ||
|
Christine Hall
@BrideOfLinux
|
3. velj |
|
Using Windows Server 2008 without support? Here are the ways I've found to protect yourself: Options for the Windows Server 2008 End of Life Blues buff.ly/37WY0jJ
|
||
|
|
||
| 0patch proslijedio/la je tweet | ||
|
Mitja Kolsek
@mkolsek
|
3. velj |
|
We tested it and KB4532695 does NOT modify jscript.dll. It does modify mshtml.dll (which we micropatched) but not in a way that would prevent jscript.dll from getting loaded. So it's really unlikely that this KB does anything for CVE-2020-0674.
|
||
|
|
||
|
0patch
@0patch
|
3. velj |
|
Paging 24 million instances of now-unsupported Windows Server 2008! 0patch will have security micropatches to keep you patched for three more years, along with Windows 7. Contact sales@0patch.com for details on enterprise deployment and central management. networkworld.com/article/351398…
|
||
|
|
||
|
0patch
@0patch
|
31. sij |
|
How will our users running Windows 7 and Windows Server 2008 R2 learn about the status of our monthly security micropatches? 0patch.zendesk.com/hc/en-us/artic…
|
||
|
|
||
|
0patch
@0patch
|
30. sij |
|
Upon popular demand, we have just ported our "CVE-2020-0674 workaround" micropatch to both 32-bit and 64-bit:
Windows 10 v1903
Windows 10 v1909
Both are included in 0patch FREE
|
||
|
|
||
| 0patch proslijedio/la je tweet | ||
|
Mitja Kolsek
@mkolsek
|
30. sij |
|
Malicious RTF files exploiting Equation Editor vulnerabilities are being detected across the globe.
Everyone: 0patch FREE includes free micropatches for all known Equation Editor vulnerabilities and will block these attacks.
Did I mention it was FREE? Use it. twitter.com/nao_sec/status…
|
||
|
|
||
| 0patch proslijedio/la je tweet | ||
|
Günter Born
@etguenni
|
29. sij |
|
Project: Windows 7/Server 2008/R2 Life Extension & 0patch one month trial borncity.com/win/?p=12892
|
||
|
|
||
| 0patch proslijedio/la je tweet | ||
|
Günter Born
@etguenni
|
29. sij |
|
Windows 7/Server 2008/R2 Life Extension-Projekt & 0patch Probemonat borncity.com/blog/2020/01/3… #0patch #Sicherheit #Updates Borns IT- & Windows-Blog
|
||
|
|
||
|
0patch
@0patch
|
30. sij |
|
Uninstall can be done at any time, without rebooting.
|
||
|
|
||
|
0patch
@0patch
|
29. sij |
|
0patch Central has notifications about agents that haven't synced in more than 30 days.
|
||
|
|
||
|
0patch
@0patch
|
29. sij |
|
Correct.
|
||
|
|
||
|
0patch
@0patch
|
29. sij |
|
Deciding between 0patch and Extended Security Updates for your Windows 7 and Server 2008 R2 computers? We'll give you a one-month free trial for your entire Windows fleet so you can test us.
If you don't like what you get, you can still go with ESU.
Email sales@0patch.com pic.twitter.com/nDTCAOFrHp
|
||
|
|
||
|
0patch
@0patch
|
28. sij |
|
Thanks. Based on what you wrote it's likely that you had a very old 0patch Agent, which indeed was generating huge log files. This hasn't been the case in a long time now.
|
||
|
|
||
|
0patch
@0patch
|
28. sij |
|
We're going to test that. Most modules we've seen are identical between Office 2016 and Office 365 so if that's the case here, the micropatch applies to O365 too. Otherwise we'd have to port it but in either case, it would prevent the bypass. Thanks for pointing this out.
|
||
|
|
||
|
0patch
@0patch
|
28. sij |
|
Note that this micropatch only breaks WebView in Outlook, and only when it tries to show the Home Page and when it decides to show the Home Page tab in folder options.
|
||
|
|
||
|
0patch
@0patch
|
28. sij |
|
A good article on recent exploitation of CVE-2017-11774 by Iran-nexus threat actors from @FireEye: fireeye.com/blog/products-…
|
||
|
|
||
|
0patch
@0patch
|
28. sij |
|
The micropatch is currently written for the last vulnerable version of Outlook 2016 but it will be trivial to port it to any other affected Outlook version. Anyone interested is welcome to contact us at sales@0patch.com
|
||
|
|
||
|
0patch
@0patch
|
28. sij |
|
The micropatch simply overrides Outlook's reading of WebView settings for determining whether Home Page is enabled, and makes Outlook believe the answer is "disabled" regardless of what the Registry says. This prevents the bypass. Source code contains just one instruction: pic.twitter.com/1G4OjnaqhJ
|
||
|
|
||
|
0patch
@0patch
|
28. sij |
|
We issued a micropatch for CVE-2017-11774, a remote code execution vulnerability in Outlook that has been widely exploited and remains popular with attackers. In contrast to official patch which could be reverted by non-admins, micropatch will reliably disable Outlook Home Page. pic.twitter.com/3MW0l0PvuV
|
||
|
|
||