Pelles C forum
General => Chit-Chat => Topic started by: John Z on June 01, 2022, 12:48:55 PM
-
This one seems fairly severe so I'm hoping the link and information is useful to forum members.
From arstechnica
https://arstechnica.com/information-technology/2022/05/code-execution-0day-in-windows-has-been-under-active-exploit-for-7-weeks/
From the article:
"
Run Command Prompt as Administrator.
To back up the registry key, execute the command "reg export HKEY_CLASSES_ROOT\ms-msdt filename"
Execute the command "reg delete HKEY_CLASSES_ROOT\ms-msdt /f"
"
as in
C:\reg export HKEY_CLASSES_ROOT\ms-msdt c:\temp\ms_mdt_reg.reg
then
C:\reg delete HKEY_CLASSES_ROOT\ms-msdt /f
OR (my suggestion instead of delete ONLY if you know how is to just rename ms-msdt
(obligatory warning DOING something WRONG in regedt can totally disable your system)
as in
HKEY_CLASSES_ROOT\ZZZms-msdt
John Z
-
This is Follina? Office exploit? It already patched.
-
Yes, just patched last week as I recall. I undid the temporary 'fix'.
Still have not seen or heard a 'fix' for the Print Spooler hack.
I keep mine disabled unless I am going to print.
John Z