Advertisment
A current safety bulletin released via Microsoft as a part of the August 2014 Patch Tuesday can cause a crash on some systems, the company stated in a knowledge base article.
Microsoft launched an research after a huge quantity of users stated getting a so-referred to as "blue display screen of demise" (BSOD) after putting in update KB2982791 (MS14-0.5).
MS14-1/2 fixes three windows kernel-mode driving force vulnerabilities that can be exploited by a nearby authenticated attacker to enhance privileges by way of running a specially crafted software. But, Microsoft says there are 3 known issues with this update: fonts aren't set up in the default directory, fonts do no longer render efficiently, and the machine may want to crash with a 0x50 prevent blunders message (bugcheck).
The system crash and the font rendering difficulty can also arise if the KB2970228 (new Russian Ruble forex symbol), the KB2975719 (August 2014 update rollup for RT 8.1, 8.1, and Server 2012 R2) or the KB2975331 (August 2014 update rollup for RT, eight, and Server 2012) updates had been set up.
"seemingly, the BSoD is because of incorrect coping with of the windows font cache record - and due to the fact that happens at some stage in boot-up, you become caught in a reboot loop," Sophos' Paul Ducklin explained in a weblog post. "The euphemistically-named 'bugcheck' number that you may see if you are affected is: 0x50 PAGE_FAULT_IN_NONPAGED_AREA.
The expert says Microsoft overlooked the computer virus in testing because it's miles precipitated only in specific situations.
"You want to have one or more OpenType Font (OTF) files, installed in non-preferred font directories, that are recorded in the registry with absolutely-certified filenames," Ducklin mentioned.
At the same time as the flaws are being investigated, Microsoft has removed the download hyperlinks to affected updates. The corporation has also published a workaround, but everyday users would possibly find it difficult to use. Individuals who are not positive if the buggy updates were mounted on their structures can use a PowerShell script written through Edward Langley of the naked PowerShell weblog to determine if they should take any steps.
The security announcements launched on August 12 deal with a total of 37 vulnerabilities affecting home windows, net Explorer, .Internet, sq. Server, OneNote, workplace, SharePoint and different software program.
In advance this month, Microsoft announced that with the August 12 updates net Explorer might begin blocking outdated ActiveX controls including Java. But, after receiving comments from customers, the agency decided to push the date to September nine, whilst the safety updates for subsequent month might be launched.
Microsoft launched an research after a huge quantity of users stated getting a so-referred to as "blue display screen of demise" (BSOD) after putting in update KB2982791 (MS14-0.5).
MS14-1/2 fixes three windows kernel-mode driving force vulnerabilities that can be exploited by a nearby authenticated attacker to enhance privileges by way of running a specially crafted software. But, Microsoft says there are 3 known issues with this update: fonts aren't set up in the default directory, fonts do no longer render efficiently, and the machine may want to crash with a 0x50 prevent blunders message (bugcheck).
The system crash and the font rendering difficulty can also arise if the KB2970228 (new Russian Ruble forex symbol), the KB2975719 (August 2014 update rollup for RT 8.1, 8.1, and Server 2012 R2) or the KB2975331 (August 2014 update rollup for RT, eight, and Server 2012) updates had been set up.
"seemingly, the BSoD is because of incorrect coping with of the windows font cache record - and due to the fact that happens at some stage in boot-up, you become caught in a reboot loop," Sophos' Paul Ducklin explained in a weblog post. "The euphemistically-named 'bugcheck' number that you may see if you are affected is: 0x50 PAGE_FAULT_IN_NONPAGED_AREA.
The expert says Microsoft overlooked the computer virus in testing because it's miles precipitated only in specific situations.
"You want to have one or more OpenType Font (OTF) files, installed in non-preferred font directories, that are recorded in the registry with absolutely-certified filenames," Ducklin mentioned.
At the same time as the flaws are being investigated, Microsoft has removed the download hyperlinks to affected updates. The corporation has also published a workaround, but everyday users would possibly find it difficult to use. Individuals who are not positive if the buggy updates were mounted on their structures can use a PowerShell script written through Edward Langley of the naked PowerShell weblog to determine if they should take any steps.
The security announcements launched on August 12 deal with a total of 37 vulnerabilities affecting home windows, net Explorer, .Internet, sq. Server, OneNote, workplace, SharePoint and different software program.
In advance this month, Microsoft announced that with the August 12 updates net Explorer might begin blocking outdated ActiveX controls including Java. But, after receiving comments from customers, the agency decided to push the date to September nine, whilst the safety updates for subsequent month might be launched.