TimeTechTalk.com Home

TimeTechTalk.com > Time Tech Talk > OT > Attackers targeting unpatched IE bug

Welcome to 3T! Please take the time to register and join in on the friendly,knowledgeable watch talk.Please note that not all registrations will receive an immediate activation e-mail.Those who do not receive an immediate notification will be activated manually within 48hrs. by an admin. without an e-mail activation url sent to you,you may then sign in using your username and password,if you feel there is a problem please e-mail us at timetechtalk@hotmail.com and include your name and username and we activate your account.Thank You!

 Moderated by: 3T
New Topic Reply Printer Friendly
Attackers targeting unpatched IE bug  Rate Topic 
AuthorPost
 Posted: Thu Dec 1st, 2005 05:34 pm
  PM Quote Reply
1st Post
Johnny P
Advisor


Joined: Thu Nov 3rd, 2005
Location: USA
Posts: 1783
Status: 
Offline
Source:  http://www.pcadvisor.co.uk/news/index.cfm?newsid=5379

 

December 1, 2005

Careful where you surf

Robert McMillan

Microsoft is warning Internet Explorer users to be careful where they browse, because attackers are now targeting a critical unpatched bug in the software. If successful, these attackers could possibly use this bug to seize control of a user's system.

"We have also been made aware of proof of concept code and malicious software targeting the reported vulnerability," Microsoft said in an update to its security advisory on the problem posted to its website on Tuesday.

The problem in question has been a matter of public knowledge since May of this year, but it was not widely considered to be a serious issue until last week, when UK security firm Computer Terrorism published 'proof of concept' code showing how hackers could exploit the problem and possibly take over a Windows system.

The bug concerns the way Internet Explorer processes a function in JavaScript, a popular scripting language used by web developers to make their sites more dynamic.

Microsoft's Windows Live Safety Center (find out more here) is now able to detect and remove the malicious software, the company's advisory states.

The Live Safety Center scans for a program called TrojanDownloader:Win32/Delf.DH, which exploits the bug. "There are no readily apparent indications that your computer is infected by TrojanDownloader:Win32/Delf.DH. However, the presence of a file named KVG.exe or keks.exe in your Startup folder may be a symptom of infection by this Trojan," Microsoft said in a statement on its web site.

The vulnerability affects Internet Explorer users on Windows XP, Windows, 2000 and Windows 98, Microsoft said. "Customers who are running Windows Server 2003 and Windows Server 2003 Service Pack 1 in their default configurations, with the Enhanced Security Configuration turned on, are not affected," the advisory states.

In order to take advantage of this flaw, attackers would first need to trick users into clicking on a web link in order to launch the malicious code. But once that was done, it could set up a chain of events that could ultimately let a hacker gain control of the user's system.

To avoid the problem, the Sans Internet Storm Center has advised users to turn off JavaScript, which can be done by disabling 'Active scripting' in Internet Explorer's Internet Options menu, or to use an alternative browser such as Firefox or Opera.

Microsoft executives were not available for comment on this matter, and a spokeswoman with the company's public relations agency declined to comment further on the malicious software reported in the advisory or to say when the company planned to fix the problem. "Microsoft is still investigating this vulnerability," she wrote in an email.

That response didn't sit well with one security expert. "This issue is a **bleep**ing one for Microsoft's commitment to security," said Russ Cooper, editor of the NTBugtraq newslist and a scientist with security vendor Cybertrust, speaking via instant message. "It has known about the module which contained the flaw since May this year. At the very least, that module should have been fixed, even if not released to the public.

"The result is that we are taught, yet again, that if you want to draw a vendor's attention to a flaw in its product you need to create an exploit and publish it."

Microsoft's security advisory criticises Computer Terrorism for doing just that. "Microsoft is concerned that this new report of a vulnerability in Internet Explorer was not disclosed responsibly, potentially putting computer users at risk," the advisory states. "We believe the commonly accepted practice of reporting vulnerabilities directly to a vendor serves everyone's best interests."

Security vendor Sophos has not yet seen attackers exploiting this code, according to Graham Cluley, senior technology consultant at the firm. This suggests that Microsoft may wait until its next scheduled security update on 13 December to fix the problem, rather than rushing out a patch immediately, he added.

"If someone has just posted something up on a few websites, then it probably wouldn't bother. But if there is something actively spreading, then it probably would do it," Cluley said. "I think it's probably loath to issue an update out of the cycle."

Back To Top PM Quote Reply  

 Posted: Fri Dec 2nd, 2005 06:29 am
  PM Quote Reply
2nd Post
oagaspar
Site Founder


Joined: Sun Sep 4th, 2005
Location: Akron, USA
Posts: 28626
Status: 
Offline
Johnny P wrote:TY,For the Heads Up ,JP  Source:  http://www.pcadvisor.co.uk/news/index.cfm?newsid=5379

 

December 1, 2005

Careful where you surf

Robert McMillan

Microsoft is warning Internet Explorer users to be careful where they browse, because attackers are now targeting a critical unpatched bug in the software. If successful, these attackers could possibly use this bug to seize control of a user's system.

"We have also been made aware of proof of concept code and malicious software targeting the reported vulnerability," Microsoft said in an update to its security advisory on the problem posted to its website on Tuesday.

The problem in question has been a matter of public knowledge since May of this year, but it was not widely considered to be a serious issue until last week, when UK security firm Computer Terrorism published 'proof of concept' code showing how hackers could exploit the problem and possibly take over a Windows system.

The bug concerns the way Internet Explorer processes a function in JavaScript, a popular scripting language used by web developers to make their sites more dynamic.

Microsoft's Windows Live Safety Center (find out more here) is now able to detect and remove the malicious software, the company's advisory states.

The Live Safety Center scans for a program called TrojanDownloader:Win32/Delf.DH, which exploits the bug. "There are no readily apparent indications that your computer is infected by TrojanDownloader:Win32/Delf.DH. However, the presence of a file named KVG.exe or keks.exe in your Startup folder may be a symptom of infection by this Trojan," Microsoft said in a statement on its web site.

The vulnerability affects Internet Explorer users on Windows XP, Windows, 2000 and Windows 98, Microsoft said. "Customers who are running Windows Server 2003 and Windows Server 2003 Service Pack 1 in their default configurations, with the Enhanced Security Configuration turned on, are not affected," the advisory states.

In order to take advantage of this flaw, attackers would first need to trick users into clicking on a web link in order to launch the malicious code. But once that was done, it could set up a chain of events that could ultimately let a hacker gain control of the user's system.

To avoid the problem, the Sans Internet Storm Center has advised users to turn off JavaScript, which can be done by disabling 'Active scripting' in Internet Explorer's Internet Options menu, or to use an alternative browser such as Firefox or Opera.

Microsoft executives were not available for comment on this matter, and a spokeswoman with the company's public relations agency declined to comment further on the malicious software reported in the advisory or to say when the company planned to fix the problem. "Microsoft is still investigating this vulnerability," she wrote in an email.

That response didn't sit well with one security expert. "This issue is a **bleep**ing one for Microsoft's commitment to security," said Russ Cooper, editor of the NTBugtraq newslist and a scientist with security vendor Cybertrust, speaking via instant message. "It has known about the module which contained the flaw since May this year. At the very least, that module should have been fixed, even if not released to the public.

"The result is that we are taught, yet again, that if you want to draw a vendor's attention to a flaw in its product you need to create an exploit and publish it."

Microsoft's security advisory criticises Computer Terrorism for doing just that. "Microsoft is concerned that this new report of a vulnerability in Internet Explorer was not disclosed responsibly, potentially putting computer users at risk," the advisory states. "We believe the commonly accepted practice of reporting vulnerabilities directly to a vendor serves everyone's best interests."

Security vendor Sophos has not yet seen attackers exploiting this code, according to Graham Cluley, senior technology consultant at the firm. This suggests that Microsoft may wait until its next scheduled security update on 13 December to fix the problem, rather than rushing out a patch immediately, he added.

"If someone has just posted something up on a few websites, then it probably wouldn't bother. But if there is something actively spreading, then it probably would do it," Cluley said. "I think it's probably loath to issue an update out of the cycle."

Back To Top PM Quote Reply

Current time is 10:11 am  
TimeTechTalk.com > Time Tech Talk > OT > Attackers targeting unpatched IE bug Top



Lead Theme By: Di @ UltraBB
UltraBB 1.17 Copyright © 2007-2012 Data 1 Systems
Page processed in 0.1268 seconds (52% database + 48% PHP). 27 queries executed.