20210911

Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444

【外部リンク】
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444
Microsoft MSHTML Remote Code Execution Vulnerability
CVE-2021-40444
To disable installing ActiveX controls in Internet Explorer in all zones, paste the following into a text file and save it with the .reg file extension:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0]
"1001"=dword:00000003
"1004"=dword:00000003

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1]
"1001"=dword:00000003
"1004"=dword:00000003

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2]
"1001"=dword:00000003
"1004"=dword:00000003

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3]
"1001"=dword:00000003
"1004"=dword:00000003

For Word documents:

HKEY_CLASSES_ROOT.docx\ShellEx{8895b1c6-b41f-4c1c-a562-0d564250836f}
HKEY_CLASSES_ROOT.doc\ShellEx{8895b1c6-b41f-4c1c-a562-0d564250836f}
HKEY_CLASSES_ROOT.docm\ShellEx{8895b1c6-b41f-4c1c-a562-0d564250836f}
For rich text files:

HKEY_CLASSES_ROOT.rtf\ShellEx{8895b1c6-b41f-4c1c-a562-0d564250836f}
Export a copy of the regkey for backup.
Double-click Name and in the Edit String dialog box, delete the Value Data.
Click OK,

--

注目の投稿

softbankshop申し込み履歴

softbankshop申し込み履歴 切り替え専用ダイヤル 【外部リンク】 https://www.softbank.jp/online-shop/guides/buy/confirmation/ ご予約中の機種を選択し、ご確認ください。 https://m.onlin...

人気の投稿