| 

Internet Explorer 8 0-Day Update CVE-2013-1347

  • Post author: Omid Farhang
  • Post published: May 6, 2013
  • Reading Time: 2 min
  • Word Count: 225 words

Microsoft has confirmed a bug in Internet Explorer 8, CVE-2013-1347, which exposes user machines to remote code execution. In an advisory, Microsoft says the vulnerability ā€œexists in the way that Internet Explorer [accesses] an object in memory that has been deleted or has not been properly allocated.ā€ That, in turn, opens the door to memory corruption and remote code execution in the current user context. According to this blog post by Eric Roman: ā€œA use-after-free condition occurs when a CGenericElement object is freed, but a reference is kept on the document and used again during rendering, an invalid memory thatā€™s controllable is used, and allows arbitrary code execution under the context of the user.ā€ ...

Continue Reading Internet Explorer 8 0-Day Update CVE-2013-1347

Duqu exploits previously unknown vulnerability in Windows kernel

  • Post author: Omid Farhang
  • Post published: November 3, 2011
  • Reading Time: 2 min
  • Word Count: 393 words

The H-Online Security: Microsoft has confirmed a report from Budapest-based Laboratory of Cryptography and System Security (CrySyS), which claimed that the Duqu bot spreads by exploiting a zero day vulnerability in the Windows kernel. How it spreads had previously been unknown. CrySyS discovered the Windows vulnerability whilst analysing the installer. The bot, which anti-virus software firm Symantec believes is related to Stuxnet, infects target systems using a specially crafted Word file which injects the malware into the system using a kernel exploit. Microsoft is already working on a patch. ...

Continue Reading Duqu exploits previously unknown vulnerability in Windows kernel

Zero-Day Vulnerability in Adobe Flash Player, Reader and Acrobat

  • Post author: Omid Farhang
  • Post published: April 12, 2011
  • Reading Time: 1 min
  • Word Count: 156 words

Avira TechBlog: Adobe released a security advisory in which it warns from a zero-day vulnerability within current version of Adobe Flash Player, Reader and Acrobat. Affected are Flash Player 10.2.153.1 and earlier versions for Windows, Mac, Linux and Solaris, the current version integrated in the Chrome web browser, and 10.2.156.12 and earlier versions for Android. The authplay.dll component of current and older version of Adobe Acrobat and Reader are also affected; according to Adobe, the sandbox of Acrobat Reader X prevents from execution of malicious payloads though. ...

Continue Reading Zero-Day Vulnerability in Adobe Flash Player, Reader and Acrobat

Adobe update spam scam

  • Post author: Omid Farhang
  • Post published: December 6, 2010
  • Reading Time: 2 min
  • Word Count: 304 words

Hereā€™s the latest twist in the ā€œmembershipā€ site scam: spam emails that tell potential victims to update their Adobe Reader include links to a web site intended to look like something related to Adobe products, but is selling ā€œmemberships.ā€ The REAL way to update your Adobe software is on the help menu: help | check for updates (see the end of this blog piece for details). The spam email: ...

Continue Reading Adobe update spam scam

Windows Vista & Windows 7 Kernel Bug Can Bypass UAC

  • Post author: Omid Farhang
  • Post published: November 30, 2010
  • Reading Time: 4 min
  • Word Count: 744 words

Now this is not the first time Windows UAC has hit the news for being flawed, back in February 2009 it was discovered that Windows 7 UAC Vulnerable ā€“ User Mode Program Can Disable User Access Control and after that in November 2009 it was demonstrated that Windows 7 UAC (User Access Control) Ineffective Against Malware. A zero-day for Windows 7 back in July of this year also bypassed Windows UAC. ...

Continue Reading Windows Vista & Windows 7 Kernel Bug Can Bypass UAC

Comment on Stuxnet and more Windows 0-days

  • Post author: Omid Farhang
  • Post published: November 28, 2010
  • Reading Time: 2 min
  • Word Count: 331 words

Over the last few days, some news organizations have been saying that Stuxnet source code is available on the black market, and that clearly therefor there is an impending Internet Armageddon. This is patently silly, on a number of levels, but silly none-the-less. First thing is that I flat-out donā€™t believe Stuxnet source is available for sale on the black market or anywhere. Remember how often I say that if something sounds too good to be true, itā€™s not true? Well, the opposite applies too. If something sounds too bad to be true, itā€™s not true either. We really donā€™t know who built Stuxnet, or who the intended target was, be we may rest assured that whoever put that much work into it, isnā€™t selling it, at any price. Itā€™s actually more probable that some no-honor-among-thieves bad guy is scamming fellow bad guys. ā€œSure, this is Stuxnet source code. Prove otherwise.ā€ ...

Continue Reading Comment on Stuxnet and more Windows 0-days

Patchday ahead

  • Post author: Omid Farhang
  • Post published: November 6, 2010
  • Reading Time: 2 min
  • Word Count: 269 words

The Redmond company today published its announcement for the upcoming November Patch Tuesday. Microsoft wants to release 3 security bulletins which deal with 11 security vulnerabilities within Office and PowerPoint (up to the brand new Office 2011 for Mac) and Forefront Unified Access Gateway. A patch for the just recently detected 0-day vulnerability in Internet Explorer is not in the list. Adobe meanwhile ships an update for the Flash Player to version 10.1.102.64 today and plans one for the Reader and Acrobat next week. The Flash update is available via the Download Center and fixes theā€œauthplayā€ vulnerability which got public last week. But the company has to deal with a new security vulnerability as well. Itā€™s not yet exploited and it remains currently unknown whether it is exploitable to infect PCs with malware, but Adobe investigates the flaw. On a public security list a so-called Proof-of-Concept (PoC) has been published which just shows a Denial-of-Service attack. ...

Continue Reading Patchday ahead

Stuxnet Questions and Answers

  • Post author: Omid Farhang
  • Post published: October 6, 2010
  • Reading Time: 6 min
  • Word Count: 1157 words

Stuxnet continues to be a hot topic. Here are answers to some of the questions weā€™ve received. Q: What is Stuxnet? A: Itā€™s a Windows worm, spreading via USB sticks. Once inside an organization, it can also spread by copying itself to network shares if they have weak passwords. Q: Can it spread via other USB devices? A: Sure, it can spread anything that you can mount as a drive. Like a USB hard drive, mobile phone, picture frame and so on. ...

Continue Reading Stuxnet Questions and Answers

Flash Player Updates fix 0-day-vulnerability

  • Post author: Omid Farhang
  • Post published: September 21, 2010
  • Reading Time: 1 min
  • Word Count: 105 words

Adobe fixed the vulnerability in Flash Player in a record time again. Just one week after the 0-day became public and started to get exploited, an update is available to close the security hole. Even though Adobe Reader and Acrobat are affected (which are supposed to get an update in 2 weeks), until now weā€™ve only seen exploits against the Windows Flash Player. Users and administrators should update their Flash Player as soon as possible! The version 10.1.85.3 fixes the issue for Windows, Unix, Solaris and is available through Adobeā€™s download center. Android users can get the update to 10.1.95.1 on the Android Market Place. ...

Continue Reading Flash Player Updates fix 0-day-vulnerability

New 0-day Exploit for Adobe Reader

  • Post author: Omid Farhang
  • Post published: September 9, 2010
  • Reading Time: 2 min
  • Word Count: 344 words

A malicious PDF file has turned up which exploits a new security vulnerability in Adobe Reader and Acrobat ā€“ even in the most current version 9.3.4 and 8.2.4, on all supported platforms. There is currently no update available from Adobe which fixes the vulnerability. The company is aware of the problem though. The weakness is a buffer overflow within the CoolType.dll of the Adobe Reader and Acrobat installation. While parsing a PDF document with specially prepared SING (Smart INdependent Glyphlets) fonts it is possible to abuse the vulnerability to execute malware. ...

Continue Reading New 0-day Exploit for Adobe Reader