MICROSOFT HAS PATCHED a vulnerability in its anti-malware engine, over seven months after it was reported.
The Redmond firm released an advisory today that talks of a "specially crafted file" that could cause a denial of service. The file would prevent the users anti-malware software from working unless manually removed.
While it's not explicitly malcious in itself, if used it could leave the user's machine open to non-detection of less benign files such as Trojans.
The bug affects almost all iterations of Microsoft's anti-malware software, from Windows Defender, which is built into most versions of Windows, to enterprise level services such as Endpoint. Also affected is Microsoft's free anti-virus product, Microsoft Security Essentials.
Microsoft said that no one has exploited the vulnerability and that the update will in most cases roll out silently and automatically, but recommended that users and administrators check to ensure that the patch is installed.
It is not expected that Windows XP users will get another reprieve in the form of another special patch. Just weeks after the 13-year-old PC operating system reached end of life in April, Microsoft surprised the world by releasing a patch for a zero-day vulnerability for Internet Explorer, including Windows XP. This was, however, a one-off, the company said. µ
Scam was hiding in plain sight
Microsoft sticks fingers in ears and shouts 'la la la la la we can't hear you'
78 per cent of Q1 profits from gaming as tech behemoth continues slide
Firm hopes his expertise with QNX will provide direction