Can Microsoft s 17 year old vulnerability be prevented?

Updated on technology 2024-04-05
23 answers
  1. Anonymous users2024-02-07

    This vulnerability affects all currently popular versions of Office, including Office 2007, which is currently discontinued, and once a user opens a malicious document, it will be implanted with a backdoor Trojan without any other operation, and the criminals will take full control of the computer.

    Due to the simple principle and stable exploitation of this vulnerability, it is very likely that it will be exploited on a large scale in the future, and the Tencent Security Joint Laboratory Anti-Virus Lab will continue to follow up on the exploitation of the vulnerability and provide timely feedback to the public on the domestic impact. At the same time, users are reminded to improve their security awareness, use Tencent PC Manager to update system patches in a timely manner, and do not click on unknown email attachment documents to protect computer security.

  2. Anonymous users2024-02-06

    The vulnerability (CVE-2017-11882) was made public, meaning that anyone could exploit this vulnerability to launch an attack, such as tricking people into clicking through phishing emails or network-shared office documents. If you accidentally open a malicious document, your computer can be remotely controlled by hackers. Tencent's Hubble analysis system has since captured a number of exploit samples, but most of the samples during this time period were used for testing, and there is not enough evidence that they were used to launch malicious attacks.

  3. Anonymous users2024-02-05

    Based on the security researchers of Embedi, Tencent PC Manager security experts further studied and analyzed the vulnerability and found that the exploit method is simple and stable, and there are other vulnerabilities in the module, which are very likely to be exploited by criminals. Subsequently, the analysis results will be reported to Microsoft officials as soon as possible, and a security reminder will be issued to remind users to pay attention to the update patch.

  4. Anonymous users2024-02-04

    Has the computer been poisoned? It is better for the landlord to use some security software for antivirus as soon as possible. You can use Tencent PC Manager to try it out, he can effectively scan the software on the computer to check for viruses, and at the same time, it can also intelligently identify phishing** and eliminate malice**.

    When the landlord pays on the computer in the future, he must remember not to click on the unknown link casually to prevent the computer from being poisoned again, which will cause losses.

  5. Anonymous users2024-02-03

    The latency of a vulnerability is also an important factor in assessing the impact of a vulnerability. The large time span means that there are more devices using these vulnerabilities during this period, and the probability of exploitation will be higher.

    Ma Jinsong, a security expert at Tencent PC Manager and head of the Anti-Virus Laboratory of Tencent Security Joint Laboratory, suggested that users should not click on unknown email attachments at will, and use Tencent PC Manager to fix vulnerabilities, or use Tencent PC Manager Office to protect against such vulnerability attacks.

  6. Anonymous users2024-02-02

    Ma Jinsong, a security expert at Tencent PC Manager and head of the Anti-Virus Laboratory of Tencent Security Joint Laboratory, suggested that users should not click on unknown email attachments at will, and use Tencent PC Manager to fix vulnerabilities, or use Tencent PC Manager Office to protect against such vulnerability attacks.

  7. Anonymous users2024-02-01

    The so-called system vulnerability is that the core service software of the system has a defect that can be exploited by bad actors and has not been discovered, unless you don't use the computer, there is no way to prevent it.

    For example, if you walk and you may fall, you won't stop walking because of that, right?

    Financial companies have professional hardware firewalls and professional security experts, even if there are vulnerabilities, there is no need for ordinary people to worry.

  8. Anonymous users2024-01-31

    You need to use some antivirus software for this.

  9. Anonymous users2024-01-30

    I suggest that you should be vigilant when opening documents with Microsoft Office in the future, especially for document attachments in emails. At the same time, the "virus scanning" function of Tencent PC Manager should be kept in an effective state to ensure that similar new vulnerabilities are not maliciously exploited. In addition, turning on Protected View in Office can mitigate the attack.

  10. Anonymous users2024-01-29

    Tools Raw materials.

    Method steps.

    Open the [Toolbox] button of PC Manager, and then click Fix Vulnerability, which will automatically patch Windows vulnerabilities to ensure the security of your computer.

    end precautions.

  11. Anonymous users2024-01-28

    The computer often prompts that there is a vulnerability in the system, and it is best not to go through software updates and patches. Our computers will generally install some security guards, such as 360, Kingsoft, etc., these so-called security guards will often prompt us to fix vulnerabilities, sometimes a dozen, sometimes even more, should we really fix these vulnerabilities? Why can't it be patched?

    Reason: If your computer is a genuine Microsoft system, such as Home Normal, then you may see a lot of bugs on the first day of buying a computer and are busy fixing them. It is important to note here that the vulnerability is being fixed.

    360 Security Guard prompts the vulnerability is to try not to update the vulnerability, it is best to ignore it, otherwise your computer will become more and more stuck! The reason is very simple, these security guards will prompt vulnerabilities when they find conflicts with their own software when they are running, and then carry out the so-called system to refer to early updates. Doing so will only change the good operating environment and compatibility of the computer itself.

    Take Lenovo as an example, the system that Lianwei Zhaiqi wants has been installed for us when it leaves the factory, and the compatibility between the system and computer hardware is very good. If you use 360 and other software, there will be some conflicts with the software, this is the security guard will mention the draft to show you to update the vulnerability, what Trojan virus vulnerability, don't be gullible. Once we update the vulnerability, the original compatibility will change, causing the computer to be very stuck and running slower and slower.

    What do you do: Turn off bug fixes.

    Here take 360 as an example, open Security Guard and select System Repair.

    Click the settings button below – to enter the settings interface.

    Change the scanning prompt method to not scan for high-risk vulnerabilities when the computer is turned on. Click OK.

    Recommendation: Do not update any vulnerabilities via software.

  12. Anonymous users2024-01-27

    High-risk vulnerabilities can directly lead to hackers invading computers on the Internet, obtaining computer administrator permissions, implanting password viruses or peeping into privacy and other illegal behaviors, which are recommended to be fixed.

    Other vulnerabilities and optional patches are generally not likely to cause security risks to the computer and can be left unfixed.

    If you install a patch that does not need to be installed, it will not only waste system resources, but also may cause a system crash, PC Manager Vulnerability Repair will intelligently install the patches that your computer really needs according to your computer environment, save system resources, and ensure computer security.

  13. Anonymous users2024-01-26

    The new vulnerabilities are also worm-like vulnerabilities, meaning that hackers can use them to spread malware from one machine to another without requiring any interaction from the user.

  14. Anonymous users2024-01-25

    That is, if there is important information stored on the computer, but there is such a vulnerability that has not been fixed, then it is easy for hackers to steal important information.

  15. Anonymous users2024-01-24

    It's as if a bug is a worm bug. Malicious software can be transmitted from one computer to another.

  16. Anonymous users2024-01-23

    It feels like the leakage of user information and the insecurity of personal information.

  17. Anonymous users2024-01-22

    The most disturbing thing is that there are a lot of online transactions, and I am afraid that my funds will be stolen.

  18. Anonymous users2024-01-21

    It is easy for users to leak their own information, and it is difficult for their property to be safe.

  19. Anonymous users2024-01-20

    This vulnerability is a worm-type vulnerability, and hackers can spread malware without passing through users, which is really scary.

  20. Anonymous users2024-01-19

    What a terrible loophole, the vast majority of people don't know about it.

  21. Anonymous users2024-01-18

    There are still a lot of vulnerabilities, it is easy to be infected by computer viruses, and a lot of data is stolen.

  22. Anonymous users2024-01-17

    Red Alert! The latest vulnerability of win10 has been discovered, take a look at how your computer is.

  23. Anonymous users2024-01-16

    You can install a PC Manager on your computer.

    Then open the toolbox and find the fix vulnerability feature inside.

    You can use this feature to fix all the high-risk vulnerabilities detected on your computer.

Related questions
9 answers2024-04-05

Don't look at this kind of thing doesn't make much sense, it's enough to choose what you like and suit your own school, and you can't see this kind of thing at all when you look at the rankings. Chinese universities are like this, and many of them are spelled together to move up the rankings.

4 answers2024-04-05

Microsoft has gone through 30 years from the first generation of Windows operating system in 1985 to today's Windows 10, and the changes in between are really innumerable, but it is Microsoft's unchanging pursuit and efforts from the beginning of the period, listening to the voice of users and making modifications, that has achieved the prosperity of the later XP era. >>>More

22 answers2024-04-05

My mother-in-law and I are in a relationship of mutual support and mutual care, and I will never unilaterally ask my mother-in-law to take care of herself, because after all, my mother-in-law is old and needs my care more.

8 answers2024-04-05

I don't know, I'm a Balance.

11 answers2024-04-05

The last one sent everything I was going to post, hey.