dslreports logo
site
 
    All Forums Hot Topics Gallery
spc

spacer




how-to block ads


Search Topic:
uniqs
4943
share rss forum feed


siljaline
I'm lovin' that double wide
Premium
join:2002-10-12
Montreal, QC
kudos:17
reply to StuartMW

Re: IE Zero-Day

Some slight duplication of effort never hurt anybody. Better than no information • voila



StuartMW
Who Is John Galt?
Premium
join:2000-08-06
Galt's Gulch
kudos:2

1 recommendation

reply to siljaline

Well I only know 'cause I clicked on both, That's where I got my quote from.
--
Don't feed trolls--it only makes them grow!



siljaline
I'm lovin' that double wide
Premium
join:2002-10-12
Montreal, QC
kudos:17
reply to StuartMW

Noted



StuartMW
Who Is John Galt?
Premium
join:2000-08-06
Galt's Gulch
kudos:2

2 recommendations

reply to siljaline

That's the same link that chachazz See Profile posted

(Look in the "quoted" part)
--
Don't feed trolls--it only makes them grow!



siljaline
I'm lovin' that double wide
Premium
join:2002-10-12
Montreal, QC
kudos:17
reply to redwolfe_98

Also see:
»blogs.technet.com/b/srd/archive/···ers.aspx
Hat Tip to Wilders



StuartMW
Who Is John Galt?
Premium
join:2000-08-06
Galt's Gulch
kudos:2

2 recommendations

reply to chachazz

quote:
Another alternative - one likely to have less impact on your browsing experience - is to install EMET and enable it to protect Internet Explorer.

Already doing that
--
Don't feed trolls--it only makes them grow!


chachazz
Premium
join:2003-12-14
kudos:9
Reviews:
·TELUS
reply to redwolfe_98

Microsoft Research & Defense: New vulnerability affecting Internet Explorer 8 users

quote:
In this particular vulnerability, IE attempts to reference and use an object that had previously been freed. The components of an exploit for such a vulnerability are typically the following:
• Javascript to trigger the Internet Explorer vulnerability
• Heap spray or similar memory preparation to ensure the memory being accessed after it has been freed is useful
• A way around the ASLR platform-level mitigation
• A way around the DEP platform-level mitigation

Internet Explorer 9 or 10 do not include the vulnerable code. And the IE team is working around the clock to develop a security update to address this vulnerability for earlier versions of the product. ...read full article

Microsoft Security Advisory (2794220)
Vulnerability in Internet Explorer Could Allow Remote Code Execution
»technet.microsoft.com/en-us/secu···/2794220


StuartMW
Who Is John Galt?
Premium
join:2000-08-06
Galt's Gulch
kudos:2

3 recommendations

reply to Dustyn

said by Dustyn:

Who the hell cares if IE6 is vulnerable?

Dude111 See Profile ?

I rather like using IE 3.01 on my Windows 3.1 system
--
Don't feed trolls--it only makes them grow!


La Luna
RIP Lisa
Premium
join:2001-07-12
Warwick, NY
kudos:3

2 recommendations

reply to Dustyn

said by Dustyn:

Who the hell cares if IE6 is vulnerable?
Microsoft has to stop patching IE6 or people will continue to use it.
»www.ie6countdown.com/

^^^ This. Why anyone would use such an old, outdated, insecure browser is beyond me. I'd like to say they deserve whatever happens, but that would be mean.
--
The Alien in the White House

20,085 DEADLY TERROR ATTACKS SINCE 9/11


Dustyn
Premium
join:2003-02-26
Ontario, CAN
kudos:11

1 recommendation

reply to redwolfe_98

said by Dustin Childs :

“We are actively investigating reports of a small, targeted issue affecting Internet Explorer 6-8,” Childs said in an emailed statement.

Who the hell cares if IE6 is vulnerable?
Microsoft has to stop patching IE6 or people will continue to use it.
»www.ie6countdown.com/
--
Remember that cool hidden "Graffiti Wall" here on BBR? After the name change I became the "owner", so to speak as it became: Dustyn's Wall »[Serious] RIP

redwolfe_98
Premium
join:2001-06-11
kudos:1
Reviews:
·Time Warner Cable

1 edit

1 recommendation

i appreciate the interesting articles that others have posted in the forum and i have been thinking that i myself should try to contribute, so..

note that, according to "microsoft", only IE 6 - IE 8 are affected.. IE 9 and IE 10 are not affected.. also, the exploit relies on "flash player"..

»krebsonsecurity.com/2012/12/atta···ay-flaw/

"Attackers Target Internet Explorer Zero-Day Flaw"

Attackers are breaking into Microsoft Windows computers using a newly discovered vulnerability in Internet Explorer, security experts warn. While the flaw appears to have been used mainly in targeted attacks so far, this vulnerability could become more widely exploited if incorporated into commercial crimeware kits sold in the underground.

IEwarningIn a blog posting Friday evening, Milpitas, Calif. based security vendor FireEye said it found that the Web site for the Council on Foreign Relations was compromised and rigged to exploit a previously undocumented flaw in IE8 to install malicious software on vulnerable PCs used to browse the site.

According to FireEye, the attack uses Adobe Flash to exploit a vulnerability in the latest (fully-patched) version of IE8. Dustin Childs, group manager for response communications at Microsoft, said the vulnerability appears to exist in previous versions of IE.

“We are actively investigating reports of a small, targeted issue affecting Internet Explorer 6-8,” Childs said in an emailed statement. “We will take appropriate action to help keep customers protected once our analysis is complete. People using Internet Explorer 9-10 are not impacted.”

As FireEye notes, this is another example of a “watering hole” attack, which involves the targeted compromise of legitimate websites thought to be of interest to or frequented by end users who belong to organizations that attackers wish to infiltrate. Earlier this year, I wrote about similar zero-day attacks against visitors to the Web sites of the National Democratic Institute, The Carter Center, and Radio Free Europe.

related: »blog.fireeye.com/research/2012/1···ils.html