Just In
- 3 hrs ago Apple Confirms Special Event for May 7: iPad Air, iPad Pro 2024 Models Expected
- 12 hrs ago Xiaomi Robot Vacuum Cleaner S10, Handheld Garment Steamer, and Redmi Buds 5A Launched in India
- 12 hrs ago Lenovo Unveils IdeaPad Pro 5i Laptop With Intel Core Ultra 9 Processor – Check Price, Specs
- 12 hrs ago Lava ProWatch Zn, ProWatch Vn Smartwatches Launched in India: Check Price, Specs, Availability
Don't Miss
- Finance Indian Railway Finance Corp IRFC: Top NBFC Railway Stock Advised To BUY; Short-To-Long Term Target Prices
- Sports Most Sixes in IPL 2024 After CSK vs LSG Match: Top 10 Players And Teams To Hit Most Sixes As Of April 24
- News Senator Lambie Calls For Elon Musk's Imprisonment Over Wakeley Church Stabbing Posts
- Movies Mirzapur 3 OTT Release Date, Platform: When Will Mirzapur Season 3 Premiere On Amazon Prime Video?
- Education Telangana Inter Manabadi 1st and 2nd Year Results 2024 to be Declared Tomorrow
- Automobiles Chrysler Pacifica Marks Seven Years As Most Awarded Minivan With New Campaign
- Lifestyle Anant Ambani-Radhika Merchant's Wedding Function Details Are Out, Check out Ambani Bahu-To-Be's Chic Fashion!
- Travel Kurnool's Hidden Gems: A Guide To Exploring India's Lesser-Known Treasures
Windows 7 Meltdown patch makes users prone to vulnerability
Microsoft Windows latest vulnerability allows processes to access all data in the memory and also allow them to read or write anywhere in the Kernel memory.
Almost all the devices were affected by the Meltdown and Spectre security flaws. However, all the companies rolled out various updates and patches for the security of their user base. Microsoft was also not left behind, with its user base being attacked by the Meltdown and Spectre flaws the company was quick enough to roll out patches for the same. Microsoft took the situation quite seriously like the other tech giants tried to provide quick resolution of the situation to its users. The patch for Windows 7, Windows 8.1, and Windows 10 devices was out following the security flaws, however as per some reports from the web the new patch which Microsoft is rolling out for the Meltdown security flaw is leaving the users vulnerable to data theft.
As per some reports from The Beebom, the patch which was rolled out for Meltdown on Windows 7 (64-bit) and Windows Server 2008 R2 doesn't improve the situation rather it marks a big question mark on the security of the users. The latest vulnerability allows processes to access all data in the memory and also allow them to read or write anywhere in the Kernel memory.
The flaw was first noticed by Ulf Frisk who is a security researcher. According to Frisk, "Windows 7 already did the hard work of mapping in the required memory into every running process. Exploitation was just a matter of reading and write to already mapped in-process virtual memory," "Once read/write access has been gained to the page tables it will be trivially easy to gain access to the complete physical memory unless it is additionally protected by Extended Page Tables (EPTs) used for Virtualization. All one [has] to do is to write [one's] own Page Table Entries (PTEs) into the page tables to access arbitrary physical memory" he further adds.
Frisk has also advised all the admins and the users of Windows 7 and Windows 2008R2 to install Microsoft's March patch to resolve it. Windows 10 and Windows 8.1 are however unaffected which brings a breath of relief for the users.
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
14,999
-
26,634
-
18,800
-
62,425
-
1,15,909
-
93,635
-
75,804
-
9,999
-
11,999
-
3,999