Microsoft fixes another severe vulnerability in Windows Defender
Microsoft pushed out another fix for the virus scanning engine in Windows Defender called the MsMpEng malware protection engine.
The newest flaw in MsMpEng’s emulator
This latest vulnerability was discovered by Google’s Project Zero researcher Tavis Ormandy. This time, he disclosed it to Microsoft in a private manner. This fresh vulnerability allows apps executed in MsMpEng’s emulator to control it in such a way to achieve all kinds of malicious behavior, including remote execution of code when Windows Defender scans an executable file sent via email. This new vulnerability was not as easy to exploit as the one discovered two weeks ago but is still a pretty grave.
The engine is updated regularly to prevent more issues
The emulator’s job is to emulate the user’s CPU but in a very strange way that allows API calls. What’s unclear are the reasons why the company created special instructions for the emulator, according to the Google Project Zero’s researcher.
MsMpEng is not sandboxed, which means that if you can exploit a vulnerability, the result will turn out very negative.
Fortunately, the engine is updated on a regular basis for a greater level of security. In addition, Microsoft is under increased pressure to secure its software and the company is asking governments for as much cooperation as possible to keep users safe.
RELATED STORIES TO CHECK OUT:
- Download Windows Defender KB4022344 to stop WannaCry ransomware
- Windows 10 build 16188 introduces Windows Defender Application Guard
- Microsoft fixed another severe vulnerability in Windows Defender
The symbiosis of the internet and advertising has long been understood. Everyone understands that if you have access to something that is ‘free’, inasmuch as […]
Firefox has announced that it will start to warn users if they visit any breached sites. This is in an attempt to not only make […]