What is it?

Microsoft Windows (versions 7, 8 and Server versions 2008-2012) HTTP.sys file could allow remote code execution if an attacker sends a specially crafted HTTP request to an affected Windows system.

The Microsoft link below provides a description and a list of specific Windows versions effected by this vulnerability.

Why is it a risk?

An attacker who successfully exploited this vulnerability could execute arbitrary code in the context of the System account.

This is considered a CRITICAL vulnerability.

How can you mitigate the risk?

Patch your Microsoft Windows and/or Exchange Server to the latest version.

There is a link below to the “One-Click Microsoft Exchange On-Premises Mitigation Tool”; as of March 2021, this is the recommended method for patching your on-premises MS Exchange Server.

The Microsoft Safety Scanner Download link below provides a useful tool for testing your Exchange Server for a variety of security related risks.

Resources:

Microsoft – Microsoft Security Bulletin MS15-034 – Critical

https://learn.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-034

Microsoft One-Click Microsoft Exchange On-Premises Mitigation Tool

https://msrc-blog.microsoft.com/2021/03/15/one-click-microsoft-exchange-on-premises-mitigation-tool-march-2021/

Microsoft Safety Scanner Download

https://docs.microsoft.com/en-us/microsoft-365/security/intelligence/safety-scanner-download?view=o365-worldwide

Share →