Microsoft Pushes Out Emergency Fix to Block Duqu Zero-Day Exploit

Microsoft offers a workaround, but it will cause fonts to be displayed improperly.

Ars Technica: Microsoft is offering a workaround that will prevent systems from being infected by Duqu, the Stuxnet-like malware discovered last month. Earlier this week, researchers revealed that Duqu exploits a vulnerability in the Windows kernel. In order to avoid infection, Microsoft recommends that users who are concerned about infection with Duqu shut off access to T2EMBED.DLL, which allows applications to display TrueType fonts. However, this step will also cause same applications to display fonts improperly.

Microsoft will issue several other security fixes on next week's regularly scheduled "Patch Tuesday."

Tags: Duqu

0 Comments (click to add your comment)
Comment and Contribute


(Maximum characters: 1200). You have characters left.



IT Management Daily
Don't miss an article. Subscribe to our newsletter below.

By submitting your information, you agree that datamation.com may send you Datamation offers via email, phone and text message, as well as email offers about other products and services that Datamation believes may be of interest to you. Datamation will process your information in accordance with the Quinstreet Privacy Policy.