For the second month in a row, Microsoft’s Patch Tuesday updates landed with warnings that a half-dozen Windows security defects have already been exploited in the wild.
Redmond’s security response team slapped “exploitation detected” tags on six of the 57 security vulnerabilities patched this month and pushed Windows admins to prioritize another large batch of code execution flaws.
The latest exploited zero-days were addressed in the Microsoft Management Console, Windows NTFS, the Fast FAT File System Driver, and the Win32 Kernel Subsystem.
According to Microsoft documentation, the exploited bugs allow security features bypass, remote code execution, privilege escalate via memory corruption issues.
https://www.securityweek.com/patch-tuesday-microsoft-patches-57-flaws-flags-six
-active-zero-days/
... TCOB1:
https://binkd.rima.ie telnet: binkd.rima.ie
--- GoldED+/LNX 1.1.5-b20240309
* Origin: <-Sean's Pointless Point-> (2:263/1.1)