01-15-2010, 02:51 PM | #1 |
ahat
1080
Rep 2,592
Posts |
Dont get pwned - Vulnerability in IE6-8 on all Windows OSs
This vulnerability is being exploited in IE versions 6-8 and on all Windows Operating Systems.
Please follow the recommended procedures. RECOMMENDATIONS: We recommend the following actions be taken: Consider applying appropriate workarounds recommended by Microsoft to vulnerable systems immediately after appropriate testing: · Set Internet and Local intranet security zone settings to "High" to prompt before running ActiveX Controls and Active Scripting in these zones · Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone · Enable DEP for Internet Explorer 6 Service Pack 2 or Internet Explorer 7 Consider using an alternate web browser until a patch is available. Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack. Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources. Ensure that all anti-virus software is up to date with the latest signatures. Inform and educate users regarding the threats posed by attachments and hypertext links contained in emails especially from un-trusted sources. Deploy network intrusion detection systems to monitor network traffic for malicious activity. If you believe you have been affected by attacks exploiting this vulnerability, please contact us immediately. Current details available from - http://secunia.com/advisories/38209/ Description: A vulnerability has been reported in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an unspecified error and can be exploited to trigger the use of a freed object via a specially crafted web page. Successful exploitation allows execution of arbitrary code. NOTE: This vulnerability is currently being actively exploited. Solution: Do not browse untrusted websites or follow untrusted links. Provided and/or discovered by: Reported as a 0-day. Original Advisory: Microsoft (KB979352): http://www.microsoft.com/technet/sec...ry/979352.mspx http://blogs.technet.com/msrc/archiv...ry-979352.aspx Other References: US-CERT VU#492515: http://www.kb.cert.org/vuls/id/492515
__________________
'13 335IS N54 (1 of 373 LeMans Blue out of 3597 total production e92)- Grey interior (1 of 24 in LMB with any trans- 1 of 14 with DCT)-MODS -MFactory LSD/MHD-BQ custom Tune/ATM-IC/AFE Momentum GT Intake/Konis/Mfront&HeimJoint Rear rods&arms/Brembos. https://photos.app.goo.gl/Lo6aHZRo7XqtPkhL8 Last edited by 335e92tx; 01-15-2010 at 03:17 PM.. |
01-15-2010, 05:13 PM | #2 |
Faster in the Corners
58
Rep 1,062
Posts |
Better recommendation:
Get out of the 1990's and stop using Internet Explorer.
__________________
'91 M42 E30 - All sorts of goodies.
|
Appreciate
0
|
01-15-2010, 05:23 PM | #3 |
Nigerian Prince
400
Rep 2,180
Posts
Drives: '11 F25
Join Date: Apr 2008
Location: San Diego, CA
|
OMG! Security hole in IE??? No fucking way! This has never happened before! Ever!
Chrome and the huge memory hog Firefox are there to save the internets. Use them.
__________________
|
Appreciate
0
|
01-16-2010, 05:58 AM | #6 | |
ahat
1080
Rep 2,592
Posts |
And its also been identified as having a flawed security model for storing credentials.
Quote:
You realize some of the vulnerabilities that have been identified in OS-X are very glaring and slow to be patched right?
__________________
'13 335IS N54 (1 of 373 LeMans Blue out of 3597 total production e92)- Grey interior (1 of 24 in LMB with any trans- 1 of 14 with DCT)-MODS -MFactory LSD/MHD-BQ custom Tune/ATM-IC/AFE Momentum GT Intake/Konis/Mfront&HeimJoint Rear rods&arms/Brembos. https://photos.app.goo.gl/Lo6aHZRo7XqtPkhL8 |
|
Appreciate
0
|
01-17-2010, 12:41 AM | #8 | |
ahat
1080
Rep 2,592
Posts |
Quote:
http://www.computerworld.com/s/artic...ps_OS_X_10.5.8 Apple patches 18 Mac vulnerabilities, ships OS X 10.5.8 Fixes flaws in six critical image file bugs hackers could use to snatch Macs Its not that PCs don't have vulnerabilities. Its that they have a regular patch process. Not so for Apples releases of patches for OS-X.
__________________
'13 335IS N54 (1 of 373 LeMans Blue out of 3597 total production e92)- Grey interior (1 of 24 in LMB with any trans- 1 of 14 with DCT)-MODS -MFactory LSD/MHD-BQ custom Tune/ATM-IC/AFE Momentum GT Intake/Konis/Mfront&HeimJoint Rear rods&arms/Brembos. https://photos.app.goo.gl/Lo6aHZRo7XqtPkhL8 Last edited by 335e92tx; 01-17-2010 at 12:29 PM.. |
|
Appreciate
0
|
01-17-2010, 02:40 AM | #9 | |
Major
25
Rep 1,033
Posts |
Quote:
That will get her to use FF. |
|
Appreciate
0
|
01-26-2010, 10:43 AM | #11 |
ahat
1080
Rep 2,592
Posts |
http://secunia.com/advisories/37769/
Google Chrome Multiple Vulnerabilities Critical: Highly critical Impact: Security Bypass Exposure of sensitive information DoS System access Where: From remote Solution Status: Unpatched Description: Some vulnerabilities and weaknesses have been reported in Google Chrome, where some have unknown impacts and others can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, or compromise a user's system. 1) A use-after-free error when handling pop-up windows and navigating away from the current site can be exploited to corrupt memory via a specially crafted web page. Successful exploitation may allow execution of arbitrary code. The vulnerability is confirmed in version 3.0.195.38. Other versions may also be affected. 2) An unspecified error can be exploited to bypass the pop-up blocker. 3) A design error in the handling of CSS stylesheets can be exploited to potentially disclose sensitive information from other domains. 4) An unspecified error allows XMLHttpRequests to directories. 5) An unspecified error exists related to escaping characters in shortcuts. 6) Unspecified errors exist related to drawing on canvases, which can corrupt memory. 7) An unspecified error exists during image decoding, which can corrupt memory. 8) An unspecified error exists, which may result in failure to strip "Referer". 9) An unspecified error affects cross-domain access. 10) An unspecified error exists in the deserialisation of bitmaps.
__________________
'13 335IS N54 (1 of 373 LeMans Blue out of 3597 total production e92)- Grey interior (1 of 24 in LMB with any trans- 1 of 14 with DCT)-MODS -MFactory LSD/MHD-BQ custom Tune/ATM-IC/AFE Momentum GT Intake/Konis/Mfront&HeimJoint Rear rods&arms/Brembos. https://photos.app.goo.gl/Lo6aHZRo7XqtPkhL8 |
Appreciate
0
|
01-26-2010, 11:42 AM | #14 | |
ahat
1080
Rep 2,592
Posts |
Quote:
You obviously don't have to use a computer for business. My concern for computer security is I am an information security officer(for about 5K customers). And I have a pretty good grasp of where vulnerabilities lie and the processes to minimize the exposure. Not to mention that this discussion had evolved to the fact that Apple and obviously others, don't have a consistent patch methodology in place. And thats what leaves users hanging and its also why MS has an advantage - regardless of what vulnerabilities are identified. MS generally tends to patch them before they go public and are exploited.
__________________
'13 335IS N54 (1 of 373 LeMans Blue out of 3597 total production e92)- Grey interior (1 of 24 in LMB with any trans- 1 of 14 with DCT)-MODS -MFactory LSD/MHD-BQ custom Tune/ATM-IC/AFE Momentum GT Intake/Konis/Mfront&HeimJoint Rear rods&arms/Brembos. https://photos.app.goo.gl/Lo6aHZRo7XqtPkhL8 Last edited by 335e92tx; 01-26-2010 at 11:50 AM.. |
|
Appreciate
0
|
Post Reply |
Bookmarks |
|
|