20210911

Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444

【外部リンク】
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444
Microsoft MSHTML Remote Code Execution Vulnerability
CVE-2021-40444
To disable installing ActiveX controls in Internet Explorer in all zones, paste the following into a text file and save it with the .reg file extension:
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\0]
"1001"=dword:00000003
"1004"=dword:00000003

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1]
"1001"=dword:00000003
"1004"=dword:00000003

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\2]
"1001"=dword:00000003
"1004"=dword:00000003

[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3]
"1001"=dword:00000003
"1004"=dword:00000003

For Word documents:

HKEY_CLASSES_ROOT.docx\ShellEx{8895b1c6-b41f-4c1c-a562-0d564250836f}
HKEY_CLASSES_ROOT.doc\ShellEx{8895b1c6-b41f-4c1c-a562-0d564250836f}
HKEY_CLASSES_ROOT.docm\ShellEx{8895b1c6-b41f-4c1c-a562-0d564250836f}
For rich text files:

HKEY_CLASSES_ROOT.rtf\ShellEx{8895b1c6-b41f-4c1c-a562-0d564250836f}
Export a copy of the regkey for backup.
Double-click Name and in the Edit String dialog box, delete the Value Data.
Click OK,

--

注目の投稿

Crowdstrike障害

デバイスに問題が発生したため、再起動する必要があります エラー情報を収集しています Crowdstrike障害 . 「C:\Windows\System32\drivers\CrowdStrike directory」 「C-00000291*.sys」を削除 ドライバー「csa...

人気の投稿