Microsoft will release the fix on July Patch Tuesday
It seems that Microsoft will not send out these patches when they are ready, and the company is just waiting for the next Patch Tuesday to deliver them. This is scheduled for July 10. The company explains in its advisory that the bug is enabled by default in Windows and unfortunately this flaw cannot be disabled. The vulnerability also affects the kernel, virtual machines, and processes. The good news is that users running virtual machines in Microsoft Azure are protected.
Here’s how the flaw works
In its advisory, Microsoft explains that a hacker is able to cause data stored in the Floating Point, MMX and SSE register state to be leaked across security boundaries on Intel Core family CPUs via a speculative execution. In order to exploit this flaw, the hacker must be able to execute code locally on a system. This is quite similar to the other speculative execution vulnerabilities. Microsoft continues and explains that the data leaked in the register state depends on the code execution and on whether any code stores sensitive data in the FP register state.
Recommended actions
The tech giant also provides steps that have to be taken in order to prevent disaster:
Register for security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications. Go to Intel’s website Apply security updates when they become available in a future Update Tuesday.
Head over to Microsoft’s advisory and read all the details on the Lazy FP State Restore flaw. RELATED STORIES TO CHECK OUT:
EFAIL is a critical email security flaw that breaks Outlook encryption Windows 10 gets new security updates to fight off Spectre attacks Windows Security is the new antivirus center in Windows 10 Redstone 5
Name *
Email *
Commenting as . Not you?
Save information for future comments
Comment
Δ