Microsoft Critical Security Vulnerability CVE-2019-0708

 In Security

As you may have already heard, there was a severe Windows vulnerability revealed recently.
Microsoft estimated the criticity of this exploit at 9.8 out of 10.
The vulnerability concerns the following version of Windows:

  • Windows 7 for 32-bit Systems Service Pack 1
  • Windows 7 for x64-based Systems Service Pack 1
  • Windows Server 2008 for 32-bit Systems Service Pack 2
  • Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
  • Windows Server 2008 for Itanium-Based Systems Service Pack 2
  • Windows Server 2008 for x64-based Systems Service Pack 2
  • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
  • Windows Server 2008 R2 for Itanium-Based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

It is very important to patch this vulnerability giving.
The exploit allows a remote attacker to execute codes, and install Programs without any user login through the Remote Desktop protocol.
In order to patch the security exploit, you would just need to run and install the Windows Updates.
If you are using a Windows VPS with us running Windows Server 2008 R2 installed before May, 15th 2019 you would need to run the Windows updates.
Or you may also install the following packages onto your VPS to permanentely fix your Windows VPS:
https://www.catalog.update.microsoft.com/Search.aspx?q=KB4499175
For your Windows VPS the package name is Windows Server 2008 R2 (non Itanium version).

Recommended Posts

Leave a Comment

Start typing and press Enter to search