Team OS : Your Only Destination To Custom OS !!

Welcome to TeamOS Community, Register or Login to the Community to Download Torrents, Get Access to Shoutbox, Post Replies, Use Search Engine and many more features. Register Today!

  • Attention!

    Increase Your Ratio! Global Freeleech Days Begins. This is your Last Chance to improve your Ratio

Global Freeleech Days Ending Soon

Global Freeleech Days are ending Soon, Be Sure to get Your Ratio and Seedbonus into a proper point, this is your last chance, we won't help you out anymore if you have ratio below the required ratio after this Global Freeleech Days of 1 Month
Global Freeleech Days are Over! We Hope you have got enough ratio and seedbonus.

Tech News Microsoft Finds Major Bug in Older Windows, Releases Emergency Update


Verified Member
46.1 GB
48.6 GB

Patch now available from the Microsoft Update Catalog

Microsoft discovered a Remote Code Execution vulnerability in Remote Desktop Services in older versions of Windows, and the company shipped an emergency update to resolve it.

Documented in CVE-2019-0708, the vulnerability happens in the pre-authentication stage, and Microsoft says user interaction isn’t even required.

What’s more worrying, however, is that a potential exploit is wormable, which means that it can spread from one device to another, much like WannaCry malware.

The affected Windows versions are Windows XP, Windows Server 2003, Windows 7, and Windows Server 2008. Both Windows 8 and Windows 10 are protected.

Supported versions of Windows, like Windows 7, get this update automatically from Windows Update, while those on retired releases, as it’s the case of Windows XP, need to install the patch manually from the Microsoft Update Catalog.

Microsoft says it’s not aware of any exploitations of the vulnerability, albeit the firm warns that cybercriminals are very likely to reverse engineer the patch and develop malware that compromise unpatched computers.

"Second emergency update for Windows XP"

Microsoft explains that on devices where patching isn’t possible, IT admins can turn to partial mitigation.

“There is partial mitigation on affected systems that have Network Level Authentication (NLA) enabled. The affected systems are mitigated against ‘wormable’ malware or advanced malware threats that could exploit the vulnerability, as NLA requires authentication before the vulnerability can be triggered,” Simon Pope, Director of Incident Response, Microsoft Security Response Center (MSRC), says.

“However, affected systems are still vulnerable to Remote Code Execution (RCE) exploitation if the attacker has valid credentials that can be used to successfully authenticate.”

This is the second emergency update for Windows XP that Microsoft releases after the OS reached the end of support. Retired in April 2014, Windows XP received a similar patch in 2017 when the WannaCry malware was discovered.

Needless to say, users are recommended to patch their devices as soon as possible to block any potential exploit.

Please go to Microsoft Update Catalog and Search 4500331 then download needed patch

Last edited: