Windows 10: 0Patch publishes micropatch to address Windows Font Parsing vulnerability

Discus and support 0Patch publishes micropatch to address Windows Font Parsing vulnerability in Windows 10 News to solve the problem; Microsoft published an advisory about a new font parsing vulnerability in Windows on March 23, 2020. The company rated the vulnerability as critical... Discussion in 'Windows 10 News' started by GHacks, Mar 27, 2020.

  1. GHacks
    GHacks New Member

    0Patch publishes micropatch to address Windows Font Parsing vulnerability


    Microsoft published an advisory about a new font parsing vulnerability in Windows on March 23, 2020. The company rated the vulnerability as critical and said that it was aware of limited targeted attacks exploiting the vulnerability.

    Microsoft listed several workarounds to mitigate attacks but they all reduced functionality for users in one way or another.

    Microsoft has yet to release a security patch to address the issue for all versions of Windows affected by the vulnerability.

    Security company 0Patch, well-known for its pledge to create and distribute patches for the Windows 7 and Windows Server 2008 R2 operating systems that ran out of official support this year. While business and Enterprise customers may extend support by up to three years, home users cannot officially and 0Patch patches.

    Microsoft already announced that it won't provide the font parsing patch for unsupported versions of Windows 7 while it will provide it to companies and Enterprise organizations that have joined the ESU program to receive extended support updates.

    0Patch announced today that it has created a micro-patch for the font parsing vulnerability that affects all major client and server versions of the Windows operating system.

    A blog post on the official 0Patch blog lists the official information and analyzes the workarounds that Microsoft posted. While all work to a degree, all have disadvantages that 0Patch highlights. Disabling the preview pane, details pane and thumbnails in Windows Explorer for example only blocks attacks when the file manager is used but it won't protect against other attack vectors.

    0Patch publishes micropatch to address Windows Font Parsing vulnerability font-parsing-vulnerability-fixed.png

    The team analyzed the vulnerability -- it had to since Microsoft did not disclose details about it -- and found a solution that it turned into a micro patch.

    Basically, what 0Patch did was put a bouncer in front of font operations if Adobe Type 1 Script fonts are used so that the vulnerability cannot be exploited.


    So we decided to find the common execution point that various Windows applications such as Windows Explorer, Font Viewer, and applications using Windows-integrated font support are using to pass a font to Windows, then place a bouncer there that would keep Adobe Type 1 PostScript fonts out.

    The blog post goes into detail and users interested in additional details may check it out for additional information on the implementation.

    All administrators need to do is install the micro patch on the device to protect it against the vulnerability.


    With this micropatch in place, all applications using Windows GDI for font-related operations will find any Adobe Type 1 PostScript fonts rendered invalid and unable to load. For example, Windows Explorer will start looking like this when viewing a folder with a pair of otherwise valid PFM and PFB files.

    The patch is available for free for Windows 7 64-bit and Windows Server 2008 R2 without Extended Security Updates. 0Patch plans to create patches for ESU versions of Windows 7 and Windows Server 2008 R2, as well as Windows 8.1 and Windows Server 2012 soon as well.

    Windows 10 and Server won't receive the patch as these systems face less of a risk from the vulnerability than previous versions of Windows.

    Here is a video by the company:


    Now You: Do you use 0Patch software to micro-patch vulnerabilities?

    Thank you for being a Ghacks reader. The post 0Patch publishes micropatch to address Windows Font Parsing vulnerability appeared first on gHacks Technology News.

    read more...
     
    GHacks, Mar 27, 2020
    #1
  2. hello10 Win User
    hello10, Mar 27, 2020
    #2
  3. Yukikaze Win User
    WPA2 Vulnerability Found

    A small update with regards to the Microsoft fix. The fix itself is sufficient to solve the issue on Windows, even if your WiFi device has no driver update, with one caveat:

    Does this security update fully address these vulnerabilities on Microsoft Platforms, or do I need to perform any additional steps to be fully protected?
    The provided security updates address the reported vulnerabilities; however, when affected Windows based systems enter a connected standby mode in low power situations, the vulnerable functionality may be offloaded to installed Wi-Fi hardware. To fully address potential vulnerabilities, you are also encouraged to contact your Wi-Fi hardware vendor to obtain updated device drivers. For a listing of affected vendors with links to their documentation, review the ICASI Multi-Vendor Vulnerability Disclosure statement here: http://www.icasi.org/wi-fi-protected-access-wpa-vulnerabilities

    Source: {{windowTitle}}
     
    Yukikaze, Mar 27, 2020
    #3
  4. 0Patch publishes micropatch to address Windows Font Parsing vulnerability

    Fonts not working in Word, but working in Excel and Publisher

    I have a number of installed fonts that are working fine in Excel and Publisher, but are not working at all in Word. The fonts are listed, but when I select them, it displays and prints a generic font instead of the font that is selected.
     
    PortableMold58, Mar 27, 2020
    #4
Thema:

0Patch publishes micropatch to address Windows Font Parsing vulnerability

Loading...
  1. 0Patch publishes micropatch to address Windows Font Parsing vulnerability - Similar Threads - 0Patch publishes micropatch

  2. 0Patch question

    in Windows 10 Gaming
    0Patch question: Can I use 0Patch for Windows 10 after end of support next year?? https://answers.microsoft.com/en-us/windows/forum/all/0patch-question/ad51db81-b1ca-47e7-8e0b-e7a01b8b62ca
  3. 0Patch question

    in Windows 10 Installation and Upgrade
    0Patch question: Can I use 0Patch for Windows 10 after end of support next year?? https://answers.microsoft.com/en-us/windows/forum/all/0patch-question/ad51db81-b1ca-47e7-8e0b-e7a01b8b62ca
  4. Microsoft publishes mitigation instructions for Downfall vulnerability in Windows

    in Windows 10 News
    Microsoft publishes mitigation instructions for Downfall vulnerability in Windows: Microsoft published a support article about the recently disclosed CVE-2022-40982 vulnerability, commonly referred to as Downfall, that affects Windows devices. The vulnerability was disclosed earlier this month. It affects several Intel processor versions and all supported...
  5. Should I install the free patch from 0patch micropatching service for the "CVE-2021-34484...

    in AntiVirus, Firewalls and System Security
    Should I install the free patch from 0patch micropatching service for the "CVE-2021-34484...: Hello,I am very much concerned about the new CVE-2021-34484 Zero-day bug. Is it safe to install the free patch from 0patch micropatching service? Or should I wait for Microsoft to provide one although I don't know how long it might take?Any professional advice would be very...
  6. Should I install the free patch from 0patch micropatching service for the "CVE-2021-34484...

    in Windows 10 Gaming
    Should I install the free patch from 0patch micropatching service for the "CVE-2021-34484...: Hello,I am very much concerned about the new CVE-2021-34484 Zero-day bug. Is it safe to install the free patch from 0patch micropatching service? Or should I wait for Microsoft to provide one although I don't know how long it might take?Any professional advice would be very...
  7. Should I install the free patch from 0patch micropatching service for the "CVE-2021-34484...

    in Windows 10 Software and Apps
    Should I install the free patch from 0patch micropatching service for the "CVE-2021-34484...: Hello,I am very much concerned about the new CVE-2021-34484 Zero-day bug. Is it safe to install the free patch from 0patch micropatching service? Or should I wait for Microsoft to provide one although I don't know how long it might take?Any professional advice would be very...
  8. Critical font parsing issue in Windows revealed (fix inside)

    in Windows 10 News
    Critical font parsing issue in Windows revealed (fix inside): Microsoft published an advisory yesterday concerning a recently detected font parsing issue that affects all supported versions of the company's Windows operating system (including Windows 7). The issue is rated critical, the highest severity rating. Microsoft notes that it...
  9. Type 1 Font Parsing Remote Code Execution Vulnerability for Windows

    in Windows 10 News
    Type 1 Font Parsing Remote Code Execution Vulnerability for Windows: Microsoft is aware of limited targeted attacks that could leverage un-patched vulnerabilities in the Adobe Type Manager Library, and is providing the following guidance to help reduce customer risk until the security update is released. Two remote code execution...
  10. CVE-2020-0601 Windows CryptoAPI Spoofing Vulnerability Security Vulnerability Published:...

    in Windows 10 Installation and Upgrade
    CVE-2020-0601 Windows CryptoAPI Spoofing Vulnerability Security Vulnerability Published:...: Having Windows 10 for some time now, I'm sure along with others, Microsoft continues seemingly monthly, at minimum to post update WARNINGS. WHY is such a company continually putting out updates for their customers with Windows 10 when they themselves don't take the proper...