On Tuesday, Microsoft warned that 64-bit Windows 7 and Windows Server 2008 R2 could lead to malware attacks.
The problem lies in the display driver of Windows Canonical. This vulnerability can cause the machine to restart after being attacked, and may also lead to the installation of malware. However, it is not easy to install the software. The attacker needs to bypass several security protections for RAM. can do it.
The vulnerability stems from a typical driver failure. The vulnerability occurs during the execution of Windows Graphics Device Interface (GDI) and DirectX. The program simulates the interaction of early Windows graphics engines. Users only need to disable Windows Aero before the patch is released. To thwart the attack, you can use Basic and High Contrast themes to circumvent this vulnerability.