And, in spite of what you’ve read, there are no DejaBlue attacks in the offing. https://twitter.com/GossiTheDog/status/1163713950258728960
[See the full post at: Still no DejaBlue exploits generally available]
![]() |
Patch reliability is unclear. Unless you have an immediate, pressing need to install a specific patch, don't do it. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Still no DejaBlue exploits generally available
Home » Forums » Newsletter and Homepage topics » Still no DejaBlue exploits generally available
- This topic has 3 replies, 3 voices, and was last updated 5 years, 9 months ago.
Tags: DejaBlue
AuthorTopicViewing 2 reply threadsAuthorReplies-
ek
AskWoody LoungerAugust 20, 2019 at 3:30 pm #1913337I guess I’m interpreting the blog post you cite very differently. Specifically, the MalwareTech blog post: https://www.malwaretech.com/2019/08/dejablue-analyzing-a-rdp-heap-overflow.html
In the blog post, the author appears to have deliberately crafted test exploits that would just crash the RDP service. It appeared to me that he did so because it was a very quick and simple proof-of-concept that a BlueKeep style exploit could work. He did not go further and craft a RCE exploit. I can imagine why he made that choice.
His sentence in the end of the article is the most important: “This bug is powerful because object instances are stored on the same heap, making it possible to overwrite them.”. The ability to overwrite heap objects is a powerful vector for remote code execution.
I just don’t get the “no need to take this vulnerability seriously because it’s not being seen in the wild yet” mentality. That’s because it communicates what many folks want to hear: “no need to take proactive steps now, just wait until a bunch of poor folks get harmed first.”. That’s all well and good – as long as you are not one of those users initially affected by the security hole.
-
This reply was modified 5 years, 9 months ago by
ek.
2 users thanked author for this post.
-
This reply was modified 5 years, 9 months ago by
-
EstherD
AskWoody LoungerAugust 20, 2019 at 11:41 pm #1913482If MS were supplying a “clean” patch just for the BlueWho family of vulnerabilities, then I would agree with you: Waiting to patch would be foolhardy. However, that is NOT the case; the BlueWho patch is bundled with all manner of unrelated stuff. Consequently, the risk calculation is NOT as simple as you make it out to be. A prudent sysadmin needs to balance the risk of leaving BlueWho unpatched with the risk of patching quickly and then taking one on the chin because of some other so-called “fix” that is buried in the same patch file. And I do mean BURIED, since MS seems loath to tell us EXACTLY what change(s) are present in any given patch. That makes testing VERY difficult, and impossible to do with any degree of confidence, since it becomes a complete guessing game as to what must be tested to feel some assurance that the patch won’t adversely affect production systems. And don’t tell me that unexpected interactions are highly unlikely. What about the recent “Visual Basic” fiasco? Or the early Spectre/Meltdown patches, which actually made the systems on which they were installed LESS secure than if those systems hadn’t been patched at all? If “side-effects” like that were predictable, then why didn’t MS catch (and FIX) them during design, implementation or testing? If not, then my point is proven: Fools rush in whereas prudent sysadmins tread slowly and lightly. QED
1 user thanked author for this post.
-
ek
AskWoody LoungerAugust 21, 2019 at 3:04 am #1913512Well… wow!
I re-read my initial comment and I could find no mention of patching. And… that’s because I was careful in the words I chose. The words I did choose (paraphrased here) were: “…take proactive steps…”.
Heck, as of last month I decided to stop installing updates on my Win 7 systems permanently. And, I actually disable the performance sucking side channel (eg: Spectre/Meltdown/etc) patches on my systems – but I mitigate the risk through other steps (browser & browser security/privacy add-on choices, browsing habits, firewall rules, etc).
There are indeed steps users can take to mitigate the RDP risk without actually installing update(s). Those steps have been mentioned by others in this forum (& me too):
- Disable the RDP service
- Block the RDP protocol at the home router/firewall (both inbound & outbound)
One or both of the above have been mentioned in other related threads here and I’ve taken the steps myself… and not patched.
Yes, for some users RDP is essential, so the above is perhaps impractical (OK, you could fine tune the router/firewall blocking rules to allow RDP to/from specific trusted hosts).
But there are also many users that don’t use RDP at all, so disabling and/or blocking RDP seem reasonable mitigations.
I deliberately did not mention the above steps in my original post, nor did I recommend updating. I left the course of action up to the readers to research & decide for themselves.
But, yes, I did express an opinion about not agreeing with the “no need to take this vulnerability seriously because it’s not being seen in the wild yet” mentality. I worried it would trigger some rebuttals. Regardless, I stand by my opinion on the matter.
I’d also like to point out that I’ve been quite vocal (in this forum and elsewhere) about how utterly awful MS updates have become, as they now often seem like a new category of malware.
Thank goodness for Linux.
-
This reply was modified 5 years, 9 months ago by
ek.
-
This reply was modified 5 years, 9 months ago by
ek.
1 user thanked author for this post.
Viewing 2 reply threads -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
hibernate activation
by
e_belmont
25 minutes ago -
Red Hat Enterprise Linux 10 with AI assistant
by
Alex5723
4 hours, 13 minutes ago -
Windows 11 Insider Preview build 26200.5603 released to DEV
by
joep517
7 hours, 18 minutes ago -
Windows 11 Insider Preview build 26120.4151 (24H2) released to BETA
by
joep517
7 hours, 20 minutes ago -
Fixing Windows 24H2 failed KB5058411 install
by
Alex5723
10 hours, 29 minutes ago -
Out of band for Windows 10
by
Susan Bradley
12 hours, 3 minutes ago -
Giving UniGetUi a test run.
by
RetiredGeek
19 hours ago -
Windows 11 Insider Preview Build 26100.4188 (24H2) released to Release Preview
by
joep517
1 day, 2 hours ago -
Microsoft is now putting quantum encryption in Windows builds
by
Alex5723
1 day ago -
Auto Time Zone Adjustment
by
wadeer
1 day, 7 hours ago -
To download Win 11 Pro 23H2 ISO.
by
Eddieloh
1 day, 4 hours ago -
Manage your browsing experience with Edge
by
Mary Branscombe
9 hours, 22 minutes ago -
Fewer vulnerabilities, larger updates
by
Susan Bradley
20 hours, 18 minutes ago -
Hobbies — There’s free software for that!
by
Deanna McElveen
4 hours, 12 minutes ago -
Apps included with macOS
by
Will Fastie
2 hours, 3 minutes ago -
Xfinity home internet
by
MrJimPhelps
1 day ago -
Convert PowerPoint presentation to Impress
by
RetiredGeek
1 day ago -
Debian 12.11 released
by
Alex5723
2 days, 4 hours ago -
Microsoft: Troubleshoot problems updating Windows
by
Alex5723
2 days, 7 hours ago -
Woman Files for Divorce After ChatGPT “Reads” Husband’s Coffee Cup
by
Alex5723
1 day, 11 hours ago -
Moving fwd, Win 11 Pro,, which is best? Lenovo refurb
by
Deo
3 hours, 59 minutes ago -
DBOS Advanced Network Analysis
by
Kathy Stevens
3 days ago -
Microsoft Edge Launching Automatically?
by
healeyinpa
2 days, 15 hours ago -
Google Chrome to block admin-level browser launches for better security
by
Alex5723
12 hours, 58 minutes ago -
iPhone SE2 Stolen Device Protection
by
Rick Corbett
2 days, 19 hours ago -
Some advice for managing my wireless internet gateway
by
LHiggins
2 days, 3 hours ago -
NO POWER IN KEYBOARD OR MOUSE
by
HE48AEEXX77WEN4Edbtm
1 day, 5 hours ago -
A CVE-MITRE-CISA-CNA Extravaganza
by
Nibbled To Death By Ducks
3 days, 13 hours ago -
Sometimes I wonder about these bots
by
Susan Bradley
1 day, 1 hour ago -
Does windows update component store “self heal”?
by
Mike Cross
2 days, 23 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.