Microsoft revealed a new bug in the Adobe Type Manager Library, which manages and renders some fonts. The new bug allows hackers to inject malicious codes to your machine by making the targetted person open a document remotely.
Microsoft warns its users the zero-day vulnerability is live and is used for “limited targeted attacks”. As we are going through the pandemic situation now, the patch will be delayed by quite a good number of days.
This malicious code specifically targets a very few numbers of devices. No details regarding where it originated, which users are affected or anything of that sort.
Microsoft officials pointed, “Two remote code execution vulnerabilities exist in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles a specially-crafted multi-master font – Adobe Type 1 PostScript format ” and further added, “There are multiple ways an attacker could exploit the vulnerability, such as convincing a user to open a specially crafted document or viewing it in the Windows Preview pane”.
Microsoft advises Windows users to disable preview and Details panes in Windows Explorer so as to avoid the bug. Microsoft also advises users to disable WebClient services in their OS. Furthermore, you can try a few more workarounds:
- Disabling the Preview Pane and Details Pane in Windows Explorer
- Disabling the WebClient service
- Rename ATMFD.DLL, or alternatively, disable the file from the registry
Windows File Explorer displays the Open Type Fonts and users are suggested to disable the same until the patch is released.
Microsoft team is working to fix this bug as soon as possible. With a limited number of workforce onboard, the patch will be delayed for some time following the Coronavirus outbreak. You can expect a patch to be delivered somewhere around April second week.