PoC for Windows VCF zero-day published online

    PoC for Windows VCF zero-day published online

    PoC for Windows VCF zero-day published online


    Posted: 15 Jan 2019

    A security researcher has published details and proof-of-concept (PoC) code for an unpatched Windows vulnerability that affects the way Windows handles vCard files (VCFs).

    The vulnerability was discovered last year by security researcher John Page (@hyp3rlinx) and reported to Microsoft via Trend Micro's Zero Day Initiative (ZDI) vulnerability disclosure program.

    While initially Microsoft said in October that it would address the VCF vulnerability in this month's Patch Tuesday security updates train, the OS maker changed its mind at the last moment and deferred to fix to Windows v.Next (the codename of the next major version of the Windows OS, known currently as 19H1, set for release in April 2019)...



    Read more: PoC for Windows VCF zero-day published online | ZDNet
    Brink's Avatar Posted By: Brink
    15 Jan 2019


  1. Posts : 26,441
    Windows 11 Pro 22631.3447
       #1

    What about those that are not going to upgrade to 19H1?
      My Computer


  2. Posts : 750
    Windows 10 Pro 64-bits
       #2

    Josey Wales said:
    What about those that are not going to upgrade to 19H1?

    and in addition...

    How about people, who do want to update in April; MS just going to leave them hanging until April? That's not right, even, if the referenced article states:

    The good news is that this vulnerability can lead to remote code execution, but is not remotely exploitable, as it requires user interaction first.

    ZDNet reached out to a few malware researchers about this zero-day today, and they explained that the vulnerability can be weaponized in a way that can be used for mass malware distribution campaigns.

    Ok, which is it then?
    Oh yes, blaming the end user for the security vulnerability not fixed by the vendor is always a good option...
      My Computer


  3. Posts : 1
    Windows10
       #3

    Workaround to Microsoft Windows VCF [ZDI-19-013 ZDI-CAN-6920].


    Hello,

    Related to "Microsoft Windows VCF Remote Code Execution [ZDI-19-013 ZDI-CAN-6920]" see below a Workaround.

    Everyone has understood this topic relayed from everywhere, but, the fact of setting up a temporary solution or a workaround would be interesting because the '0day' definition that means that too I think.

    Related to this vulnerability, see below a possible workaroud:
    - on your computer or virtual machine create an 'http' directory in the root of system volume 'c:\' and update the access control list of the 'http' folder 'everyone: none' (no access to everyone).
    - on your computer or or virtual machine create an 'http' directory in the root of profile volume 'C:\Users\<username>\Contacts' and update the access control list of the 'http' folder 'everyone: none' (no access to everyone).

    Done.

    << Everyone is right from his own standpoint but it is not impossible that everyone is wrong. >> [Mahatma Gandhi]
    I agree, but from this basic concept, who is everyone?
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 10:48.
Find Us




Windows 10 Forums