Microsoft fixes critical bug that corrupts NTFS file system

Microsoft fixed a bug in Windows 10 that could cause NTFS volumes to be corrupted simply by accessing a specific path or viewing a specially crafted file.

Attackers can take advantage of this and use a trick to gain access to the entire system. But now there is a positive addendum to Patch Day: With the updates from April Patch Day, Microsoft now also provides a solution for a security vulnerability. Since Microsoft changed the publication of the release notes in the Knowledge Base, information about the individual contents of the security updates can only be found following publications - this is also the case now. According to a test by the online magazine Bleeping Computer. The NTFS corruption bug no longer appears after installing the latest cumulative updates, the error messages have disappeared.

In February, the Windows team started testing a fix for the vulnerability in the Windows Insider builds.

The Windows bug can mean that any user, even if he has only limited rights, can damage an NTFS volume. As soon as Windows tries to access the path, it reports: "The file in the directory is damaged and unreadable" and then marks the drive as damaged and in need of repair. Windows will then ask the user to restart the computer and run chkdsk to fix the corruption. In March, however, there was no indication with the patch day that Microsoft was addressing the problem in one of the changes.

Windows NTFS Denial of Service Vulnerability

With the April patch, it worked now. The update is therefore strongly recommended to all Windows 10 users. Microsoft had classified this bug as a DoS vulnerability and documented it as CVE-2021-28312 entitled "Windows NTFS Denial of Service Vulnerability". If you try to access it, you only get the message that the directory name is invalid. Access to the path no longer marks a drive as damaged.

Post a Comment