Posted on 08/21/2024 1:50:54 AM PDT by Drago
Microsoft warned customers this Tuesday to patch a critical TCP/IP remote code execution (RCE) vulnerability with an increased likelihood of exploitation that impacts all Windows systems using IPv6, which is enabled by default.
Found by Kunlun Lab's XiaoWei and tracked as CVE-2024-38063, this security bug is caused by an Integer Underflow weakness, which attackers could exploit to trigger buffer overflows that can be used to execute arbitrary code on vulnerable Windows 10, Windows 11, and Windows Server systems.
(Excerpt) Read more at bleepingcomputer.com ...
A good “explainer” video on the topic:
https://youtu.be/qhQRSUYnVG4?si=xwMAWHP2Jv-mBm-V
Other recent Windows patches:
https://krebsonsecurity.com/2024/08/six-0-days-lead-microsofts-august-2024-patch-push/
>>Several “zero day”/”no user click required” vulnerabilities patched in the last couple weeks...if on Windows patch now.
Linux: the last Windows security patch you’ll ever need.
ping to you
I’ve installed Linux Mint Cinnamon/Virginia on TWO former Windoze machines (IBM Lenovo Laptop and an INTEL NUC mini) and couldn’t be happier.
Why the trouble?
That crash that took out Win 10/11 machines last month? Also took out Win 7+ on the NUC; I’d already had Linux running on the laptop for about a year just to figure it out.
I’m not missing anything.
“I’m not missing anything.”
Yep, I’m nine years in on Linux now. Should have done it even sooner.
That’s okay. Your particular distro was one of the first compromises in this years Pwn2Own at BlackHat. Windows 11? Fifth. So you can continue living in your belief that Linux is natively secure. If you can’t work in Linux without the CLI, you’re relying on a volunteer community to keep you safe.
Ping!..................
Thanks to kiryandil for the ping!
Unless you are actually using IPv6... it should be shut off.
I was doing this with my clients before this happened. Why leave something set and running if you don’t need it and aren’t using it?
I’ve worked with hundreds of clients and only ONE was actually using IPv6. Then again, they were using ZTN as well, so there’s that.
Good laugh line.
However, what happens when Linux hits a 72% market share - like Windows today - and every hacker in the world starts attacking Linux?
Where is the central certified Linux authority that takes responsibility for fixing a Linux vulnerability?
How would you know an alleged Linux patch is not new demon software designed by brilliant hackers?
Thanks for the ‘heads up’ as I refuse to trust Doze Automatic Updates (after they ruined drives, requiring re-installations). I’d be on Linux but this awesome Dell refurb from Amazon ($260 for a $1,200 computer) came with Win 10 - which has been good so far. Stay safe!
Ok...how do I shut it off?
“Linux: the last Windows security patch you’ll ever need.”
That’s true.
I thought this thread would be more focused on the topic instead of Linux.
Start menu -> Settings -> Network and Internet -> Change Adapter Options
Right-click on which ever adapter you want to adjust.
Properties
“This connection uses the following items:”
Scroll down to Internet Protocol Version 6 (TCP/IPv6)
Uncheck the box and hit Ok.
Not quite...
https://phoenixnap.com/kb/linux-security
https://www.zdnet.com/article/linux-network-security-holes-found-fixed/
Thank YOU
If it helps, glad to be of service. :-)
Yep. Just like Apple products “never had to be patched” ™
that didn’t age well.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.