{"id":17643,"date":"2019-09-24T11:40:34","date_gmt":"2019-09-24T15:40:34","guid":{"rendered":"http:\/\/www.thundercloud.net\/infoave\/new\/?p=17643"},"modified":"2019-09-24T11:47:55","modified_gmt":"2019-09-24T15:47:55","slug":"microsoft-releases-emergency-patch-for-internet-explorer-vulnerability","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/microsoft-releases-emergency-patch-for-internet-explorer-vulnerability\/","title":{"rendered":"Microsoft Releases Emergency Patch for Internet Explorer Vulnerability"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 26pt;\">Microsoft Releases Emergency Patch for Internet Explorer Vulnerability<\/span><\/strong><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">If you are still using Internet Explorer on Windows 7, Windows 8x or any version of Windows 10, make sure you install the latest cumulative update issued by Microsoft &#8211; or at least download the IE 11 patch for your version of Windows (instructions near the end of this article).<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">According to Microsoft, an attacker could take control of your computer via an unpatched Internet Explorer browser vulnerability. This vulnerability affects everyone who uses Internet Explorer 11 on Windows 10, Windows 8x and Windows 7.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\"><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1367\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"text-decoration: underline;\"><strong>Microsoft says:<\/strong><\/span><\/a><\/span><\/p>\n<blockquote>\n<p class=\"x-hidden-focus\"><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website, for example, by sending an email.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.<\/span><\/p><\/blockquote>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">The update will be distributed as an out-of-band cumulative update or you can download just the IE patch for your version of Windows<a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2019-1367\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"text-decoration: underline;\"><strong> here.<\/strong><\/span><\/a><\/span><\/p>\n<p><span style=\"font-family: helvetica, arial, sans-serif; font-size: 14pt;\">If you decide to download just the patch, you&#8217;ll need to know your Windows 10 version number which you can find by typing WINVER in taskbar search and pressing Enter. And whether you&#8217;re using Windows 10, Windows 8x or Windows 7, you&#8217;ll need to know whether you have a 32-bit or 64-bit system. You can do that by opening a Run dialog (Windows Key + R) and typing MSINFO32 into the Run box and pressing Enter. In the window that opens&#8230; look for &#8220;System type&#8221;. You&#8217;ll see in that dialog if you have a 32-bit or 64-bit system.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Microsoft Releases Emergency Patch for Internet Explorer Vulnerability If you are still using Internet Explorer on Windows 7, Windows 8x or any version of Windows 10, make sure you install the latest cumulative update issued by Microsoft &#8211; or at least download the IE 11 patch for your version of Windows (instructions near the end of\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/microsoft-releases-emergency-patch-for-internet-explorer-vulnerability\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":13950,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1433,1656,10],"tags":[3483,3480,3481,3482,1684,7,2916],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/17643"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=17643"}],"version-history":[{"count":4,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/17643\/revisions"}],"predecessor-version":[{"id":17647,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/17643\/revisions\/17647"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/13950"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=17643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=17643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=17643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}