The Windows kernel in Windows 7 SP1 and Windows Server 2008 R2 SP1 allows an elevation of privilege vulnerability due to the way it handles objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows 7 - |
||
microsoft windows server 2008 r2 |
If at first, er, second, ah, third, no, fourth, you fail, sadly, you're probably Redmond
Updated Days after Microsoft released its third attempt at a fix for the Meltdown security vulnerability in Intel's modern processors, system administrators say many of their 64-bit Windows 7 and Server 2008 R2 boxes are still unable to be properly patched. Pseudo-anonymous Reg reader Lawrence Birdman, who administers around 120 Windows 7 x64 PCs, says all but four of his machines haven't been able to get the most recent update – the software tweak appearing as "not applicable" for the compute...
If at first you don't succeed, you're Redmond
Microsoft today issued an emergency security update to correct a security update it issued earlier this month to correct a security update it issued in January and February. In January and February, Redmond emitted fixes for Windows 7 and Server 2008 R2 machines to counter the Meltdown chip-level vulnerability in modern Intel x64 processors. Unfortunately, those patches blew a gaping hole in the operating systems: normal applications and logged-in users could now access and modify any part of ph...