Microsoft Offers New Tool For DLL Bug
Microsoft has issued an automated Windows tool designed to limit the effects of a recent DLL bug. The company has also noted it is only classing the problem as an "important" rather than "critical" risk.
Windows Dynamic Link Library (DLL) Bug
As noted previously, the problem involves dynamic link libraries (DLLs), a type of shortcut that allows multiple applications to access the same code in Windows.
Many applications are set to automatically open any DLLs stored within their program folders. It's now emerged that it is easier than previously thought to create bogus files that can exploit this process, and that such files can even be placed on a machine without physical access.
In releasing a workaround, Microsoft has revealed some more specifics about how the exploit works. It involves applications that attempt to load a DLL without specifying exactly where it is located on a machine.
When this happens, Windows checks a particular set of directories in a particular order. Those exploiting the process have found ways to make sure that the bogus DLL is located in a place where Windows will find it before the legitimate file. (Source: technet.com)
Microsoft Solution Made Easier
Microsoft has detailed a series of changes that users can make to the Windows Registry (effectively the index to all the software on the computer) to change the locations and order that Windows looks for DLLs in a way that will minimize risks.
However, as many users will either not be confident altering registry settings, or will be confused about how best to change the DLL process, Microsoft has also issued an automated "Fix it" tool.
To use the tool, users must first download a software update to Windows using the link below. Install the update, then click on the "Fix it" logo on the same page. This will switch on the protection that is made possible by the update but is switched off by default.
http://support.microsoft.com/kb/2264107
Microsoft: Problem Not Critical
Microsoft has also attempted to reassure customers that, though notable because of the sheer number of applications it affects, the problem is not serious enough to be considered "critical".
It says it's not possible for the bug to be exploited simply by a user visiting an infected website (a so-called "drive-by attack"), but instead would have to go through several steps, including double-clicking on a file icon. (Source: pcmag.com)
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.