Your company's ad could live here and reach over 50,000 people a month!

Share This Post

Patch Management / Patch Tuesday

Extra Steps Required to Protect Against Microsoft Zero-day

Did you know there are extra steps required to protect against a zero-day flaw that Microsoft patched this month? Not many do. Microsoft inconveniently stuck the extra steps far down on the information page.

The flaw in question is labeled as CVE-2017-8529. Here’s the extra bits…

After I install the updates for CVE-2017-8529, is there anything else I need to do to be protected from this vulnerability?

Yes. With the rerelease of CVE-2017-8529 Microsoft has addressed previously known print issues related to this vulnerability; however, to prevent the potential for any further print regressions, the solution for CVE-2017-8529 is turned off by default in your registry. To be fully protected from this vulnerability, you need to do the following after installing the update: 

For 32-bit and 64-bit systems:

  1. Click Start, click Run, type regedt32 or type regedit, and then click OK.
  2. In Registry Editor, locate the following registry folder: KEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_PRINT_INFO_DISCLOSURE_FIX
  3. Double-click the value named iexplore.exe and change the Value data field to 1.
  4. Click OK to close.

For 64-bit systems only:

  1. Click Start, click Run, type regedt32 or type regedit, and then click OK.
  2. In Registry Editor, locate the following registry folder: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ENABLE_PRINT_INFO_DISCLOSURE_FIX
  3. Double-click the value named iexplore.exe and change the Value data field to 1.
  4. Click OK to close.

Looking for an awesome, no-nonsense technical conference for IT Pros, Developers, and DevOps? IT/Dev Connections kicks off in San Francisco in 2017!

IT/Dev Connections

Share This Post

Leave a Reply