…“The vulnerable driver ships with every version of Windows, up to and including Server 2025,” Adam Barnett, lead software engineer at Rapid7, said. “Maybe your fax modem uses a different chipset, and so you don’t need the Agere driver? Perhaps you’ve simply discovered email? Tough luck. Your PC is still vulnerable, and a local attacker with a minimally privileged account can elevate to administrator.”…

  • sourhill@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    17
    arrow-down
    8
    ·
    1 day ago

    Zero-day means the company had 0 days to fix it before the exploits were made public. Maybe the headline is wrong?

    • mic_check_one_two@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      2 hours ago

      Nope, 0-day means it was exploited in the wild before the company knew about it. Basically, the company had to rush to patch it because it was already being exploited. It means black-hat hackers found it and exploited it before the white/grey-hat hackers reported it. If white-hat hackers found it first, they’d have already alerted the company and given time to patch it before they announced the vulnerability. But since the black-hat hackers found it first, it was a 0-day.

      0-day patches are often a bodge, at best. They often consist of “just disable the vulnerable component entirely” to give the company time to work on a more long-term solution. And that’s exactly what happened here. MS didn’t take time to actually fix the driver; They just ripped it out and said “sucks if you needed it. It’s gone now.”

    • MrNesser@lemmy.world
      link
      fedilink
      English
      arrow-up
      75
      arrow-down
      1
      ·
      1 day ago

      Nope 0 days means

      Zero-day vulnerability: A software flaw that attackers discover before the developer does.

      Zero-day exploit: The method hackers use to take advantage of this unknown vulnerability.

      Zero-day attack: An attack that uses a zero-day exploit to damage a system, steal data, or plant malware before a patch is available. This is a serious risk because no defenses are in place for this specific flaw yet.

      The first is the most common one found in the press and is usually reported to the company so they can patch it, before press release.

      • frongt@lemmy.zip
        link
        fedilink
        English
        arrow-up
        26
        arrow-down
        2
        ·
        1 day ago

        But it would be weird to call something a “zero-day” if it wasn’t being exploited. Like if I discover a vuln, it shouldn’t be considered a zero-day, even if I report it, if I’m not exploiting it in the wild.

        • Cethin@lemmy.zip
          link
          fedilink
          English
          arrow-up
          9
          arrow-down
          1
          ·
          18 hours ago

          It was exploited. That’s how they proved it worked. They just didn’t exploit it to do anything nefarious.