In the words of the immortal Charlie Brown; good grief.
A Windows exploit that’s been around for almost 20 years was finally patched last week.
Apparently every single version of Windows has had this vulnerability. The vulnerability is a part of a legacy protocol called CTF. CTF is a part of the Windows Text Services Framework. CTF is used to control things like keyboard layout, text input methods, etc.
The flaw allows a would-be attacker to compromise an app, like the Notes app for example, and then launch other programs that run CTF. That could potentially include your internet browser.
The flaw was discovered by Tavis Ormandy, a researcher who’s a part of Google’s Project Zero. Ormandy’s been in the news for discovering other major flaws.
Ormandy first reached out to Microsoft regarding the vulnerability in May but the software giant seemed to ignore his findings. After waiting nearly three months for a response Ormandy finally released his findings on his own blog. You can read what he said in depth here.
As I said above, Microsoft did finally release an update that fixes the problem. If you haven’t patched your systems yet we recommend doing so.