Cyber extortion. Podcast-style.

Published: 2005-12-01. Last Updated: 2005-12-01 20:50:04 UTC
by Robert Danford (Version: 1)
0 comment(s)
A reader wrote in with this interesting news story from eWeek.
http://news.yahoo.com/s/zd/20051130/tc_zd/166472

Raises some interesting questions regarding RSS (security, intellectual property, etc).
(Thanks Eric.)

Keywords:
0 comment(s)

Determining Sun Java Vulnerability

Published: 2005-12-01. Last Updated: 2005-12-01 20:43:18 UTC
by Robert Danford (Version: 1)
0 comment(s)
A number of folks in the community have written in describing their experiences determining if they are vulnerable to the Java issue mentioned previously.
It appears that depending on your platform/configuration the sunjavaupdate scheduler may not apply the updates or notify the end-user in a timely manner. It appears to check for updates on the one month anniversary of the original install. So it may not check again for quite some time.
The Sun Java download site will determine if an update is needed if you're using IE and ActiveX:
http://www.java.com/download/index.jsp

Also the JavaTester site details all the different methods for determining what if any JDK/JRE is installed:
http://javatester.org/version.html

Also be aware many systems accumulate Java versions over time so you may have more than one installed.

Keywords:
0 comment(s)

Musings on the Internet Explorer 0-day vulnerability

Published: 2005-12-01. Last Updated: 2005-12-01 02:30:59 UTC
by Scott Fendley (Version: 2)
0 comment(s)
So are any of you like me with regard to the Internet Explorer vulnerability mentioned last week http://isc.sans.org/diary.php?storyid=874? I know that I am watching and waiting to see if Microsoft is going to release an out of cycle patch, or wait for December 13th patch day.  If I were a gambler, I might actually bet on Microsoft releasing it early.

Why do I think this way?  Well.... Glad you asked.

Yesterday, Microsoft updated the advisory located at KB911302 with a couple of tidbits.  First, they made mention of both Proof of Conecept and malicious software which appear to be targeting the reported vulnerability.  Second, they also mention the Windows Live Safety Center where end users can scan and remove any malicious software and variants that may be running around now.

Throwing in that Microsoft has on occasion released out-of-cycle patches (June 2004 is a case in point in my mind), then I think it is a safe bet that Microsoft will take appropriate steps to fix the problem as quickly as possible.  In the meantime there are 2 things I can continue to suggest.

1) Be vigilant.  Know that a patch will be forthcoming hopefully within the next 2 weeks and be ready to deploy quickly.

2) If your organization can operate with one of the workarounds Microsoft has mentioned in KB911302, then I recommend mitigating your risk as much as possible.  We all have at least one person who is a little too...uhm...liberal with browsing the Internet on company time.  Think about it, that very person is probably shopping for Christmas* presents right now on less-than-secure sites.  SO....I would suggest doing those workarounds to that computer first.  :-)


* For those that celebrate other holidays in December than Christmas, this statement is not meant to be offensive in any shape or form, or otherwise slight your holiday of choice.

Update

It was just a question of when will malware authors start exploiting this Internet Explorer vulnerability.
When users visit certain web sites, a file will be dropped on their machine using this exploit. The file being dropped is currently detected as TrojanDownloader:Win32/Delf.DH. When executed, this dropper will download another trojan.

Microsoft published information about this trojan at http://www.microsoft.com/security/encyclopedia/details.aspx?name=TrojanDownloader:Win32/Delf.DH.

Thanks to Juha-Matti!
Keywords:
0 comment(s)

Comments


Diary Archives