Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Serious “BatBadBut” Rust vulnerability puts Windows systems at risk
    Cyber Security

    Serious “BatBadBut” Rust vulnerability puts Windows systems at risk

    techempireBy techempire3 Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportApril 10, 2024Editorial DepartmentSoftware security/vulnerabilities

    Rust bugs

    A critical security vulnerability in the Rust standard library could be exploited to target Windows users and launch command injection attacks.

    The vulnerability is tracked as CVE-2024-24576, a CVSS score of 10.0, indicating the highest severity. That is, it only affects scenarios where batch files are called with untrusted parameters on Windows.

    The Rust Security Response Working Group stated in an announcement on April 9, 2024: “When using the Command API to call a batch file (with bat and cmd extensions) on Windows, the Rust standard library is not properly escaped. parameter.”

    “An attacker with control over the arguments passed to the spawner could execute arbitrary shell commands by bypassing escapes.”

    This flaw affects all Rust versions prior to 1.77.2.security researcher fertile land The error has been discovered and reported to the CERT Coordination Center (CERT/CC).

    Internet security

    RyotaK stated that the vulnerability (codenamed BatBadBut) affects multiple programming languages ​​and occurs when “the programming language wraps the CreateProcess function.” [in Windows] And add an escaping mechanism for command parameters. “

    However, since not all programming languages ​​address this issue, developers are advised to exercise caution when executing commands on Windows.

    “To prevent unexpected execution of batch files, you should consider moving the batch files to a directory that is not included in the PATH environment variable,” RyotaK said in advice to users.

    “In this case, the batch file will not be executed unless the full path is specified, thus preventing accidental execution of the batch file.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Pokémon Trading Card Website Making 100k!

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    GTA 6 Release Date

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.