• This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn more.

Win32 Trojan - Exploiting Browser vulnerabilities

Messages
1,082
Location
Gladstone
#1
Recently I posted about attacks that involve exploits of the recently discovered vulnerability in Internet Explorer. Based on MMPC stats, since the vulnerability has gone public, roughly 0.2% of users worldwide may have been exposed to websites containing exploits of this latest vulnerability. That percentage may seem low, however it still means that a significant number of users have been affected. The trend for now is going upwards: MPC reports an increase of over 50% in the number of reports each day. The SANS Internet Storm Center, which tracks hacking trends, said that while the exploit does not appear to be widely in use at the moment, that situation is likely to change soon, since instructions showing criminals how to take advantage of this flaw have been posted online. According to knownsec, earlier this year a rumor emerged in the Chinese underground about an IE7 vulnerability and in October it began to be traded privately. In November it got into underground black market and was traded for about $15K. Later in December, it emerged and people sold the exploit second or third hand for about $650. Finally, someone purchased those second hand exploits to develop and deploy a Chinese gaming Trojan.

http://voices.washingtonpost.com/securityfix/2008/12/exploit_for_unpatched_internet.html

MMPC points to the Win32 Trojan as being the principle offender.

However Secunia have a different take

"The exploits contain shellcode that installs the Downloader-AZN, a well-known trojan that hijacks a PC's configuration settings and downloads additional pieces of malware. Anti-virus software from McAfee, and presumably other companies, detects the trojan - though at the time of writing, it appeared they didn't yet detect the zero-day exploit itself. The attacks target a flaw in the way IE handles certain types of data that use the extensible markup language, or XML, format. The bug references already freed memory in the mshtml.dll file. According to IDG News, exploits work about one in three times, and only after a victim has visited a website that serves a malicious piece of javascript.
Microsoft researchers are looking in to the reports, a company spokesman said Tuesday morning. Some eight hours later, the company had not yet issued an update.
The reports came just hours ahead of Patch Tuesday, Microsoft's monthly release of security updates. The patches included a cumulative update for IE that fixed four flaws that were rated critical because they could be used to remotely install malware with little or no action required of the user. Unfortunately, the miscreants are exploiting a separate security hole in IE, so the updates do nothing to protect users against the attacks.
In all, the Microsoft patch batch fixed 28 vulnerabilities, 23 of which carried the critical rating. Other Microsoft products that were updated included the Windows operating system, Office and Windows Media Player."

In-the-wild attacks find hole in (fully-patched) IE 7 • The Register


I have seen several people posting on this forum today who were infected with Trojan virus's that may well be a result of these exploits.

Significantly Secunia say the IE patches DO NOT repair the vulnerabilities


The following info is from the Microsoft Malware Protection Centre

About the Virus


Trojan:Win32/VB.IQ.dr is a trojan that drops other malware in the system.

As of this writing, exploits for the Pointer Reference Memory Corruption Vulnerability in Internet Explorer are known to drop this trojan in vulnerable systems. Microsoft released Security Bulletin MS08-078 on December 17, 2008 that fixes this vulnerability. Microsoft recommends that users apply this update immediately. Users are advised to refer to Microsoft Security Bulletin MS08-078 for more information.​

Upon execution, Trojan:Win32/VB.IQ.dr drops a copy of itself in the Windows folder as ppsap.exe. It then drops the file kimo.exe also in the Windows folder.

It then modifies the system registry so that kimo.exe and another file, bravo.exe, are automatically run when Windows starts:

Adds value: "civic"
With data: "%windir%\kimo.exe"
Adds value: "ppsap"
With data: "%windir%\bravo.exe"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

It then executes kimo.exe and bravo.exe, which are both detected as Trojan:Win32/VB.IQ.

Take note that Trojan:Win32/VB.IQ.dr does not drop bravo.exe but attempts to execute it, as it is assumed that bravo.exe is already in the system and possibly dropped by kimo.exe.

Prevention


This trojan may arrive in the system when you visit a website that contains code that exploits the Pointer Reference Memory Corruption Vulnerability in Internet Explorer discussed in Microsoft Security Bulletin MS08-078. Microsoft recommends that you apply the update immediately. Please refer to Microsoft Security Bulletin MS08-078 for more information.​
Take the following steps to help prevent infection on your system:


  • Enable a firewall on your computer.​
  • Get the latest computer updates for all your installed software.​
  • Use up-to-date antivirus software.​
  • Use caution when opening attachments and accepting file transfers.​
  • Use caution when clicking on links to web pages.​
  • Protect yourself against social engineering attacks.​
Enable a firewall on your computer

Use a third-party firewall product or turn on the Microsoft Windows Internet Connection Firewall.
To turn on the Windows Firewall in Windows Vista

  • Click Start, and click Control Panel.​
  • Click Security.​
  • Click Turn Windows Firewall on or off.​
  • Select On.​
  • Click OK.​

To turn on the Internet Connection Firewall in Windows XP

  • Click Start, and click Control Panel.​
  • Click Network and Internet Connections. If you do not see Network and Internet Connections, click Switch to Category View.​
  • Click Change Windows Firewall Settings.​
  • Select On.​
  • Click OK.​
Get the latest computer updates

Updates help protect your computer from viruses, worms, and other threats as they are discovered. It is important to install updates for all the software that is installed in your computer. These are usually available from vendor websites.

You can use the Automatic Updates feature in Windows to automatically download future Microsoft security updates while your computer is on and connected to the Internet.
To turn on Automatic Updates in Windows Vista

  • Click Start, and click Control Panel.​
  • Click System and Maintainance.​
  • Click Windows Updates.​
  • Select a setting. Microsoft recommends selecting Install updates automatically and choose a time that is convenient for you. If you do not choose Automatic, but you choose to be notified when updates are ready, a notification balloon appears when new downloads are available to install. Click the notification balloon to review and install the updates.​
To turn on Automatic Updates in Windows XP

  • Click Start, and click Control Panel.​
  • Click System.​
  • Click Automatic Updates.​
  • Select a setting. Microsoft recommends selecting Automatic. If you do not choose Automatic, but you choose to be notified when updates are ready, a notification balloon appears when new downloads are available to install. Click the notification balloon to review and install the updates.​
Use up-to-date antivirus software

Most antivirus software can detect and prevent infection by known malicious software. To help protect you from infection, you should always run antivirus software that is updated with the latest signature files. Antivirus software is available from several sources. For more information, see Windows Vista Antivirus Software - Windows Live OneCare - Microsoft.​
Use caution when opening attachments and accepting file transfers

Exercise caution with e-mail and attachments received from unknown sources, or received unexpectedly from known sources. Use extreme caution when accepting file transfers from known or unknown sources.​
Use caution when clicking on links to web pages

Exercise caution with links to web pages that you receive from unknown sources, especially if the links are to a web page that you are not familiar with or are suspicious of. Malicious software may be installed in your system simply by visiting a web page with harmful content.​
Avoid downloading pirated software

Threats may also be bundled with software and files that are available for download on various torrent sites. Downloading "cracked" or "pirated" software from these sites carries not only the risk of being infected with malware, but is also illegal. For more information. please see our article 'The risks of obtaining and using pirated software'.​
Protect yourself from social engineering attacks

While attackers may attempt to exploit vulnerabilities in hardware or software in order to compromise a system, they also attempt to exploit vulnerabilities in human behavior in order to do the same. When an attacker attempts to take advantage of human behavior in order to persuade the affected user to perform an action of the attacker's choice, it is known as 'social engineering'. Essentially, social engineering is an attack against the human interface of the targeted system. For more information, please see our article 'What is social engineering?'.
Recovery Steps

Note:

This trojan may arrive in the system when you visit a website that contains code that exploits the Pointer Reference Memory Corruption Vulnerability in Internet Explorer discussed in Microsoft Security Bulletin MS08-078. Microsoft recommends that you apply the update immediately. Please refer to Microsoft Security Bulletin MS08-078 for more information.​

Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as the Microsoft online scanner (http://safety.live.com). For more information, see Windows Vista Antivirus Software - Windows Live OneCare - Microsoft.



Malware Protection Center - Entry: Trojan:Win32/VB.IQ.dr
 
Last edited:

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics Card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.

Airbot

---------------
Messages
2,010
#2
Yes, very serious problem. Good article Norm.
 

My Computer

System One

  • Manufacturer/Model
    Airbot 2.0
    CPU
    Core i7 920 (D0) @ 4Ghz, 26c idle- 65c full load on air
    Motherboard
    Asus P6X58D Premium -Sata 6Gb/s - USB 3.0
    Memory
    12GB Corsair Dominator -CMD12GX3M6A1600C8
    Graphics Card(s)
    EVGA Nvidia GTX 480 -Fermi
    Sound Card
    ASUS Xonar D2X
    Monitor(s) Displays
    LG 24" Flatron W2453V-PF Full HD 1080p 2ms response time
    Screen Resolution
    1920x1080@60hz
    Hard Drives
    1 OCZ Vertex2 180GB SSD
    1 TB Samsung Spinpoint F1 7200RPM 32MB cache
    2 500GB WD Caviar Blacks 7200RPM 32MB cache (WD5001AALS)

    Pioneer DVD Burner DVR-S18M
    PSU
    Corsair HX1000W
    Case
    Cooler Master HAF 932
    Cooling
    Case Fans -3 230mm, 1 140mm/CPU - Tuniq Tower 120 Extreme
    Mouse
    Logitech Wireless MK700
    Keyboard
    Logitech Wireless MK700
    Internet Speed
    100 MBPS DL 30.17Mbps UL 0.98Mbps
    Other Info
    Windows 7
    Processor-7.7 RAM- 7.9 Graphics-7.9 Gaming Graphics- 7.9 HDD- 7.8

    W.E.I final score= 7.7

    Windows Vista=5.9

Barman58

Staff member
Vista Guru
Gold Member
Messages
1,808
Location
Newport, South Wales, UK
#3
Hi Norm,

Great Post and thanks ...

Correct me if I'm wrong ...

Is this the vulnerability that led to the out of band patch on the 17th or is it another one :eek:

It's just that the article mentions discovery just prior to patch Tuesday :confused:
 

My Computer

System One

  • Operating System
    Windows 10 Pro 1709 Fall Creators Update (16299.192)
    Manufacturer/Model
    Real World Computers (Custom by Me)
    CPU
    AMD FX8350 Vishera 8 Core @4GHz
    Motherboard
    Asus M5A78L-M USB3
    Memory
    32GB [4x8GB] DDR3 1600 MHz
    Graphics Card(s)
    Asus nVidia GTX750TI-OC-2GD5 (2GB DDR5)
    Sound Card
    ASUS Xoner DG + SPDIF to 5.1 System + HDMI
    Monitor(s) Displays
    Acer G276HL 27", (DVi) + Samsung 39" HDTV (HDMI)
    Screen Resolution
    2 x 1920x1080 @50Hz
    Hard Drives
    Internal
    Crucial CT256MX100SSD1 256GB SSD,
    WDC WD30EZRX-00D8PB0 3TB,
    Toshiba HDWD130 3TB
    Seagate ST2000DM001-1CH1 2TB,

    External (USB3)
    Seagate Backup+ Hub BK SCSI Disk 8TB
    2.5/3.5 Hot Swap Cradle, USB3 + eSata (client HDDs)

    NAS 4TB +1TB
    PSU
    Aerocool Templarius Imperator 750W 80+ Silver
    Case
    AeroCool X-Warrior Red Devil Tower
    Cooling
    Hyper103 CPU, Rear 120mm, Front 2x120mm, Side 2x120mm
    Mouse
    Wireless Logitec - MX Master + M570 Trackball
    Keyboard
    Wireless Logitec MK710 + K400+
    Internet Speed
    37.8 MB Down 9.5 MB Up
    Other Info
    Six Sensor Auto / Manual Digital cooling (Fan) control with Touch control Panel
Messages
1,082
Location
Gladstone
#4
Hi Norm,

Great Post and thanks ...

Correct me if I'm wrong ...

Is this the vulnerability that led to the out of band patch on the 17th or is it another one :eek:

It's just that the article mentions discovery just prior to patch Tuesday :confused:
It's the same one but unfortunately there are claims out there that the IE out of band patch has left a hole that is still being exploited:(:(

Of course there are always doom and gloomers who seek to continue the debacle but there are also some serious voices who make the same claims. I'll try to keep this updated if you want.:geek:

Norm
 

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics Card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.

Barman58

Staff member
Vista Guru
Gold Member
Messages
1,808
Location
Newport, South Wales, UK
#5
Hi Norm,

If you can keep this updated I think it would be a good idea, there is as you say a lot of FUD surrounding this issue, Not helped by the fact that it's made the national news.

Am not saying that this is not a serious issue, it is, and I think that its important that we here at the forum provide our members with complete un-biased information from as many sources as possible so that they may make an informed decision.

Keep up the good work, I for one, and I don't think I'm alone, appreciate your efforts
 

My Computer

System One

  • Operating System
    Windows 10 Pro 1709 Fall Creators Update (16299.192)
    Manufacturer/Model
    Real World Computers (Custom by Me)
    CPU
    AMD FX8350 Vishera 8 Core @4GHz
    Motherboard
    Asus M5A78L-M USB3
    Memory
    32GB [4x8GB] DDR3 1600 MHz
    Graphics Card(s)
    Asus nVidia GTX750TI-OC-2GD5 (2GB DDR5)
    Sound Card
    ASUS Xoner DG + SPDIF to 5.1 System + HDMI
    Monitor(s) Displays
    Acer G276HL 27", (DVi) + Samsung 39" HDTV (HDMI)
    Screen Resolution
    2 x 1920x1080 @50Hz
    Hard Drives
    Internal
    Crucial CT256MX100SSD1 256GB SSD,
    WDC WD30EZRX-00D8PB0 3TB,
    Toshiba HDWD130 3TB
    Seagate ST2000DM001-1CH1 2TB,

    External (USB3)
    Seagate Backup+ Hub BK SCSI Disk 8TB
    2.5/3.5 Hot Swap Cradle, USB3 + eSata (client HDDs)

    NAS 4TB +1TB
    PSU
    Aerocool Templarius Imperator 750W 80+ Silver
    Case
    AeroCool X-Warrior Red Devil Tower
    Cooling
    Hyper103 CPU, Rear 120mm, Front 2x120mm, Side 2x120mm
    Mouse
    Wireless Logitec - MX Master + M570 Trackball
    Keyboard
    Wireless Logitec MK710 + K400+
    Internet Speed
    37.8 MB Down 9.5 MB Up
    Other Info
    Six Sensor Auto / Manual Digital cooling (Fan) control with Touch control Panel
Messages
1,082
Location
Gladstone
#6
Hi Norm,

If you can keep this updated I think it would be a good idea, there is as you say a lot of FUD surrounding this issue, Not helped by the fact that it's made the national news.

Am not saying that this is not a serious issue, it is, and I think that its important that we here at the forum provide our members with complete un-biased information from as many sources as possible so that they may make an informed decision.

Keep up the good work, I for one, and I don't think I'm alone, appreciate your efforts
Thanks Nigel. Appreciate your kind words.
 

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics Card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.

Airbot

---------------
Messages
2,010
#7
Yes Norm, your efforts are gladly received. :D
 

My Computer

System One

  • Manufacturer/Model
    Airbot 2.0
    CPU
    Core i7 920 (D0) @ 4Ghz, 26c idle- 65c full load on air
    Motherboard
    Asus P6X58D Premium -Sata 6Gb/s - USB 3.0
    Memory
    12GB Corsair Dominator -CMD12GX3M6A1600C8
    Graphics Card(s)
    EVGA Nvidia GTX 480 -Fermi
    Sound Card
    ASUS Xonar D2X
    Monitor(s) Displays
    LG 24" Flatron W2453V-PF Full HD 1080p 2ms response time
    Screen Resolution
    1920x1080@60hz
    Hard Drives
    1 OCZ Vertex2 180GB SSD
    1 TB Samsung Spinpoint F1 7200RPM 32MB cache
    2 500GB WD Caviar Blacks 7200RPM 32MB cache (WD5001AALS)

    Pioneer DVD Burner DVR-S18M
    PSU
    Corsair HX1000W
    Case
    Cooler Master HAF 932
    Cooling
    Case Fans -3 230mm, 1 140mm/CPU - Tuniq Tower 120 Extreme
    Mouse
    Logitech Wireless MK700
    Keyboard
    Logitech Wireless MK700
    Internet Speed
    100 MBPS DL 30.17Mbps UL 0.98Mbps
    Other Info
    Windows 7
    Processor-7.7 RAM- 7.9 Graphics-7.9 Gaming Graphics- 7.9 HDD- 7.8

    W.E.I final score= 7.7

    Windows Vista=5.9

sassofalco

What bad, bad,habit?
Vista Guru
#8

Recovery Steps

Note:

This trojan may arrive in the system when you visit a website that contains code that exploits the Pointer Reference Memory Corruption Vulnerability in Internet Explorer discussed in Microsoft Security Bulletin MS08-078. Microsoft recommends that you apply the update immediately. Please refer to Microsoft Security Bulletin MS08-078 for more information.​

Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as the Microsoft online scanner (http://safety.live.com). For more information, see Windows Vista Antivirus Software - Windows Live OneCare - Microsoft.



Malware Protection Center - Entry: Trojan:Win32/VB.IQ.dr

Thanks Norm for yet another very informative post.

However, it should be pointed out that Microsoft will not allow use of Mozilla Firefox Browser to run the Windows Live OneCare Safety Scanner for Windows Vista, beta version. It is necessary to use Internet Explorer 7 or higher to run the scan.



  • Extract from Safety Scanner FAQ -
Which browsers will Windows Live OneCare safety scanner, Windows Vista beta edition, work with?
Windows Live OneCare safety scanner, Windows Vista beta edition, is compatible with Windows Internet Explorer 7 or higher, or MSN 9.5.




  • In Firefox, attempt to download Safety Scanner - beta version results in this 'sorry about that' notice -
We're sorry. This version of the Windows Live OneCare safety scanner doesn't work with your Web browser or operating system.

:(
So I'm afraid folks, it's off to IE just to run the Safety Scanner!!
 

My Computer

System One

  • Manufacturer/Model
    Acer Aspire Notebook 5633WLMi.[5630 Series]
    CPU
    Intel Centrino Duo Processor - Intel Core 2 CPU.
    Memory
    4GB DDR2 [3.07GB maximum real available]
    Graphics Card(s)
    nVidia GeForce Go 7300, 128MB
    Sound Card
    Realtek HD Audio, Ver. 6.0.1.5717, 2.08MB
    Monitor(s) Displays
    Acer Aspire Notebook - 15.4"; Acer LCD Monitor X223Wsd - 22".
    Screen Resolution
    1280x800x60Hertz [max.]
    Hard Drives
    Notebook - Samsung HM320JI 320GB HD installed 07 August 2009.
    External HDs [4];Maxtor One Touch4 - 500GB External HD [Drive M:\].Western Digital WDXMS1200TA - 120GB External HD [Drive G:\ - Windows Defender Backup Files only]. Two x LaCie 320GB Mobi
    Mouse
    Logitech Wireless V320 for Notebooks - Model M/N: M-RCD125
    Internet Speed
    Down 20000kb/sec / Up 1000kb/sec [Bigpond-Aus]
    Other Info
    Brother MFC-465CN; PC to Fax/Scan/Copy/Photo MFC. Epson Perfection V300 Photo Scanner. Siemens Speedstream 6520 Router. Wacom 'Bamboo Fun' CTE-650 PC Tablet, Stylus and Mouse. UAC - On;Activated. Browsers; [1] FireFox v3.6[2] IE8. Honorary R.S.M. to the 4th [Assault Pioneer] Troop Pune Sepoys , and 3rd Troop Jodhpur Bengali Lancers.
Messages
1,082
Location
Gladstone
#9

Recovery Steps

Note:

This trojan may arrive in the system when you visit a website that contains code that exploits the Pointer Reference Memory Corruption Vulnerability in Internet Explorer discussed in Microsoft Security Bulletin MS08-078. Microsoft recommends that you apply the update immediately. Please refer to Microsoft Security Bulletin MS08-078 for more information.​

Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as the Microsoft online scanner (http://safety.live.com). For more information, see Windows Vista Antivirus Software - Windows Live OneCare - Microsoft.



Malware Protection Center - Entry: Trojan:Win32/VB.IQ.dr

Thanks Norm for yet another very informative post.

However, it should be pointed out that Microsoft will not allow use of Mozilla Firefox Browser to run the Windows Live OneCare Safety Scanner for Windows Vista, beta version. It is necessary to use Internet Explorer 7 or higher to run the scan.



  • Extract from Safety Scanner FAQ -
Which browsers will Windows Live OneCare safety scanner, Windows Vista beta edition, work with?
Windows Live OneCare safety scanner, Windows Vista beta edition, is compatible with Windows Internet Explorer 7 or higher, or MSN 9.5.




  • In Firefox, attempt to download Safety Scanner - beta version results in this 'sorry about that' notice -
We're sorry. This version of the Windows Live OneCare safety scanner doesn't work with your Web browser or operating system.

:(
So I'm afraid folks, it's off to IE just to run the Safety Scanner!!
If you are using Firefox the post isn't aimed at you. It doesn't have this particular vulnerability. And, the one care scanner is not the bees knees of scanners. There are many other better options. I wouldn't use IE just because of one care. And I don't use, nor would I use One-Care. Nor would I use IE because I couldn't do a manual update without it.

Norm
 

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics Card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.
Messages
1,082
Location
Gladstone
#10
Re: Update. Firefox, Apple and Opera - Get Updates!

A thorough search of the internet suggests the Out of Band Patch was successful in closing the hole in IE. There are no reports of continuing Zero day vulnerabilities on a fully patched IE browser. However there are still plenty of warnings out there about continuing exploits.

An example of the reports circulating is here:-

"Out-of-Band Security Update

The vulnerability was discovered one day after Microsoft's most recent Patch Tuesday, its monthly dispatch of software updates and patches. It took eight days for company engineers to research the vulnerability and decide to release a fix before January's Patch Tuesday.
"Normally, when a vulnerability is exploited, it's a problem, but at least Microsoft has a fix. In this case, the vulnerability was being exploited, but there was no patch from Microsoft [until Wednesday]. Many people will still not have rolled out the fix. Fortunately, some antivirus companies were already able to defend users' computers -- but the Microsoft patch is the ideal way to permanently fix this security hole in Internet Explorer," Cluley told TechNewsWorld.
Microsoft took an relatively unusual step and released a so-called out-of-band security update, the second in two months, because the vulnerability was being so widely exploited by hackers. As Internet Explorer is the world's most-used Internet browser, there was a huge number of potential victims.
"The story of the Internet Explorer bug had hit the mainstream news and was damaging their reputation. Microsoft should actually be congratulated for producing a fix so quickly. Indeed, I suspect that they have done it in less time than it will take many people to install the patch on their own PCs,"


Welcome to TechNewsWorld

Dangerous Times


One of Firefox's strengths to date has been it's limited use. A new report states Firefox useage has now reached 20% and is now, in my opinion, big enough to become a target in it's own right.

"Microsoft's web browsers account for nearly 70% of worldwide web browser use. Firefox recently exceeded 20% for the first time. Safari is third at 7.13% with newcomer Google Chrome at 0.83% already surpassing Opera, which fell to 0.71%."

TG Daily - Microsoft releases emergency update for critical IE patch

"The mounting number of exploits taking advantage of the security hole, including those that hijacked legitimate sites to use them as a means of attacking visitors, only highlights cybercriminals' proclivity to wait for opportunities and strike unwary users.
"I don't think the cybercriminals ever took it easy. They don't take vacations, they don't take time off. One thing you can be sure of is that hackers will be continuing to steal money, data, identities and resources from Internet users throughout the holiday season and into 2009," stated Cluley.
Even if all IE users patch their browsers quickly, there will be other exploits discovered, and criminals will user other tricks -- including social engineering -- to make their fortunes, he said.
"It would also be very shortsighted for people who don't use Internet Explorer to feel smug," Cluely continued.
For example, Apple has just published a whopping 190 MB update to OS X which included numerous important security fixes. Opera updated from version 9.62 to 9.63 on Tuesday, also to close some known security holes. Firefox has just notified users of the release of version 3.0.5, fixing what are referred to as "several security issues," including three considered "critical -- vulnerability can be used to run attacker code and install software, requiring no user interaction beyond normal browsing."
"One mitigating factor for Firefox and Opera users is that we're not yet aware of any active exploitation online of those vulnerabilities. Still, best not take the chance. Get those patches downloaded ASAP," he concluded"


Welcome to TechNewsWorld
 

My Computer

System One

  • Manufacturer/Model
    Scratch Built
    CPU
    Intel Quad Core 6600
    Motherboard
    Asus P5B
    Memory
    4096 MB Xtreme-Dark 800mhz
    Graphics Card(s)
    Zotac Amp Edition 8800GT - 512MB DDR3, O/C 700mhz
    Monitor(s) Displays
    Samsung 206BW
    Screen Resolution
    1680 X 1024
    Hard Drives
    4 X Samsung 500GB 7200rpm Serial ATA-II HDD w. 16MB Cache .
    PSU
    550 w
    Case
    Thermaltake
    Cooling
    3 x octua NF-S12-1200 - 120mm 1200RPM Sound Optimised Fans
    Mouse
    Targus
    Keyboard
    Microsoft
    Internet Speed
    1500kbs
    Other Info
    Self built.

Users Who Are Viewing This Thread (Users: 1, Guests: 0)