New Zero-Day Vulnerability In Windows 231
Jimmy T writes "Microsoft and Secunia are warning about the discovery of a new 'Zero-day' vulnerability affecting all Microsoft based operating systems except Windows 2003. Both companies states that the vulnerability is currently being exploited by malicious websites. One attack vector is through Internet Explorer 6/7 — so be aware where you surf to."
Just curious (Score:3, Insightful)
Does anyone actually know anyone that has been affected by any of these exploits? Seems to me that the odds of actually visiting a site that "runs" the exploit is incredibly low.
Re: (Score:3, Insightful)
The attack vector is a link to the bogus page. Now, how do you get a link to a user and make him click? Usually this is done either by email (click here for big boobs or fat cash) or on a webpage (same).
In the meantime, you can also have it on a banner, where the one wanting to infect you buys ad space on a
Well, technically, you get free software...
Re: (Score:2)
Re: (Score:2)
Unless their admins are really careless.
Re: (Score:3, Funny)
Re:any web site is a risk! (Score:2)
The thing to keep in mind is that any page could be a risk and you must be security concious or face the consequences.
Re: (Score:2)
As for getting access to web servers, how many run IIS and have IE installed on them? Not to mention how many people admin their web servers from windows workstations, own the admin's workstation and you can keylog your way into the server too.
Re: (Score:2)
Some of this had been fixed by now but I'm not sure something like this couldn't be rigged to be executed.
The best solution (Score:2)
Re: (Score:2)
The computer I had before my current laptop got incredibly bogged down with viruses that entered the system through a variety of means. Eventually I found it to be unusable, and switched it to Linux. My laptop, however,
Re: (Score:2, Insightful)
He isn't. He said that the most certain way of avoiding vulnerabilities is not to be connected to the 'net. That's true, right?
You said:
> The computer I had before my current laptop got incredibly bogged down with
> viruses that entered the system through a variety of means.
> Eventually I found it to be unusable, and switched it to Linux.
and then went on to say:
> Let me reiterate that I have never had a problem with viruses.
Sounds to me like you have had a pro
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Nonsense--I'm a progressive, 1490's man. You're allowed to choose between the two.
Re: (Score:3, Insightful)
Have you seen the 'mitigating factors from the MS advisory? They're hilarious:
Re: (Score:2)
It works - I've seen someone get spyware in Win4lin! Fixing it took around twenty seconds since I just had to rename the directory and copy another one into it's place.
There are also things like deepfreeze (sic?) that keep the system drive read only unless you really want it apply an update or install something - plus the hardware dependent option of dumping disk images somewhere for easy re-installs.
Re: (Score:2)
Re: (Score:2)
Often times people will exploit it via normal advertisers, or find some exploit on some other software used by a website (the myspace flash exploit) or they'll find an exploit in some software the webserver uses such as phpBB, some dashboard software/configuration manager, or some other easily exploited piece of a webserver (as seen in the WMF exploit). They use one exp
Re: (Score:2)
I hadn't realised that this is in fact a very good method. Just buy some add space at Google for office products or computer hardware at attractive but not unreasonably low prices, then create an online store for these products, make a message on the website that the store is offline, et voila! The user is not alarmed, moves on, but the computer is infected.
Exploits (Score:2)
Re: (Score:2)
Re: (Score:2)
Even though nobody RTFA's, many must still click the link (see "slashdot effect") hoping for pictures or something, so this would still work.
The whole slashdot audience could be wiped out overnight! Oh the humanity!
Re: (Score:2)
Two other thin
Re: (Score:2)
Unless the site is compromised by an attacker, or carries ads from an inadequately screened advertiser, or unless the advertiser has been 0wned.
>Also if you're running a mail program that's been updated since Clinton was President you can't be attacked through HTML e-mail since they all block scripting and ActiveX in mail by default.
That still leaves the attack vector of m
Here's the data on odds... (Score:2)
http://12.34.56.78/hacks/exploits/im/a/script/kid
Re: (Score:2)
Many of the people getting infected don't know it. But don't tell me you have never heard of infected Windows machine? Or do you assume they all got ir from e-mail?
> Seems to me that the odds of actually visiting a site that "runs" the exploit is incredibly low.
So, you think only a few people will surf on pornsites or websites that have been hacked?
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
What used to be the professional thing to do if an unknown person gets root access is to pull the plug, install on a new drive and restore from backup and interactive copying of any necessary files on the compromised volume that you can be sure are OK. How do you really know what happened when your computer was owned?
Reinstalling is a
Darn (Score:2, Funny)
Re: (Score:2)
Re: (Score:2)
you're gonna have to wipe a lot of stuff after that "hold", more than just bits'n'bytes
as to weenies a few posts up complaining that there are no sexy geek-chicks out there, yes there are
"Trusted" Websites (Score:3, Insightful)
Re: (Score:3, Insightful)
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Has anyone ever considered the implications of DRM for whistleblowing? Leaked information has more than once been the first and only warning that something is running very wrong. This can be put to an end very efficiently with DRM.
You can in theory even retroactively nullify information.
Re: (Score:2)
Isn't it a bit like disbanding the police force and trying to get guns outlawed?
The web sites aren't the problem. They are doing exactly what you'd expect them to do in a random free society, they are taking advantage of suckers. And in this case, windows is a big dum-dum pop. The problem has to be solved on the computers, not on the web sites.
I suppose another way to look at it would be for you to take all that
Re: (Score:2)
Re: (Score:2)
A best-case scenario would be to allow Administrators to blanket-block All ActiveX controls except for a select few. You can actually do this with the IE Admin Kit and Group Policy, but it is exceptionally difficult
Seriously, Is Firefox susceptible to this too? (Score:2)
What other ways can this exploit be triggered?
Re: (Score:2)
Re: (Score:1)
Re:Seriously, Is Firefox susceptible to this too? (Score:5, Informative)
Re: (Score:2)
Mark of SysInternal's posted an interesting entry on his blog back in March, Running as Limited User - the Easy Way [sysinternals.com] (it's at the bottom of the page, I couldn't find a working direct link), which describes just how easy it is, with the help the SysInternals free psexec utility [sysinternals.com] to drop essentially all Administrator privileges when running IE.
It isn't a complete solution, Protected Mode probabl
Re: (Score:3, Informative)
Prior to IE7, the XMLHTTP object, used to retrieve data from external sources without full-page reloads, was provided by an external ActiveX control. With IE7, Microsoft has implemented XMLHTTP natively in-browser, rendering the ActiveX control unneccesary -- however, it's still possible for older sites which haven't yet been rewritten to take advantage of native XMLHTTP support to load
Re: (Score:2)
Oh good... (Score:1, Troll)
Glad nobody I know is vulnerable to this. Everyone is OSX, Linux, or Win2003 for a long time now.
Re: (Score:2)
Re: (Score:2)
3 years and zero virii, trojans, etc on any of the Win machines.
Re: (Score:2)
Re: (Score:2)
A Web "browser" - implies "just looking" (Score:2, Funny)
Is that so much to ask for, of ANY browser?
Re: (Score:2)
Sandboxie (Score:2)
I don't use it much - but sandboxie impressed me a few months ago for running IE (or anything) in a semi-virtualised environment
Your vs You're (Score:4, Funny)
Re: (Score:2)
Re: (Score:2)
I guess that you don't see any value in bookmarking or in caching for performance.
Actually, there is something close to what you are describing. It is called a Linux live CD with firefox on it such as knoppix.
Separate the cache from the browser? (Score:3, Interesting)
I've always been surprised that Linksys or one of the other network-box companies hasn't put together an easy to use "web accellerator" caching proxy. I suppose it's because it would be too hard to explain to a lot of people (the kind of people who don't grok th
Re: (Score:2)
Re: (Score:2)
That's a reasonably clever idea. It could be applied more generally too. A wide variety of user apps could be restricted to only have write access to specified directories. With judicious use of symbolic links, this could even be made painless for the user.
This is essentially already done with a lot of server software, by running it as a dedica
Re: (Score:2)
If there's one thing that people should have learned from the last 10 years of end-user non-entertainment consumer computer products, it's this:
No significant numbers of people will buy your product unless it will save them money or they think they cannot live without it.
People will pay through the nose for entertainment stuff (games, etc), but for anything el
Re: (Score:2)
Not true. They are cacheable.
Re: (Score:2)
Note: I was the AC for that comment - I had thought I was logged in but evidently I was not.
Please note I explicitly said caching agents which includes caching proxys and your browser amongst other things, but even with respect to only the browser as you seem to have (mis)interpreted the thrust of my point and you're incorrect in your assertion that they should cache everything - browsers too must (and do in my experience, with a few fun bugs) follow the instructions in the headers with regards to caching
Re: (Score:2)
If you are visiting the seedier part of town and want some protection, may I interest you in a live CD?
I've used live CD's while on the road and had to use a hotel internet connection. Who knows what could be in the middle there. I fired up Ubuntu as a live CD and hit the web. Stayed away from e-mail and any finance sites while on the road. It was fine for checking mountain pass conditions for travel and entertainment via youtube and other sites.
At the end
Re: (Score:2)
Is that so much to ask for, of ANY browser?***
Apparently it is. Web site designers are absolutely certain that you need a gazillion goodies and stand ready to deliver them whether YOU (or I) want them or not. With a few exceptions -- The Google home page- renders usably in just about any browser ever written and does not depend on
Re: (Score:2)
Otherwise - rendering libraries have bugs, can be made to overflow etc. So even a look-don't-touch kind of browser would be vulnerable.
I find it pretty convenient to be able to download stuff, including installers. In fact, I couldn't really i
Hello my name is Microsoft... (Score:2)
It may very well be that stupid users or badly configured systems allow these exploits to thrive but FFS Microsoft just admit that you are actually at least partially to blame.
As long as they fail to realise that they are not gods and do actually write buggy software, what hope is there that they will ever succeed in producing something secure?
Re: (Score:2)
That's what they get (Score:2, Funny)
Well that's what they get for not updating and running Internet Explorer 6/7! It's not even version 1.0!
Now for some real news (Score:2)
REDMOND - NOV 23, 2006
Microsoft is proud to announce that for the second day in a row, now 0-day exploits were discovered in its flagship Microsoft Operating System.
Re: (Score:2)
Does not affect Vista (Score:2)
Re: (Score:2)
Firefox is just as susceptible to exploits *like* this one. Bugs happen. Simple as that.
IE 7's protected mode makes bugs like these more or less meaningless, and it's the only browser that takes this fairly novel approach.
IE 7 on Vista is, without a doubt, the most secure way to browse the web.
Silly claim based on limited experience (Score:2)
Perhaps given a sample size of two - the other of which is IE 6 on XP. There are a lot of web browsers out there, from lynx up, on a lot of platforms which do not fall victim to this or many other problems - mostly due to a lack of active-x which even a librarian warned me was a major mistake prior to its introduction. It is easier to point out a shortcoming in the Microsoft product than to advocate absolutely everything else.
What about my Windows 95 box? (Score:2)
So a box running Windows 95 or DOS is at risk then?
I'm not sure which is more irritating - that the summary uses the above phrase that is not in the article, or that they article doesn't explicitly say which OS/browser versions are affected (and you'd have to go digging around to find whether you are using "XMLHTTP 4.0 ActiveX Control, part of Microsoft XML Core Services 4.0".
I suppose the most irritating thing for a Windows user is that this i
Re: (Score:2)
No, you just aren't thinking like Microsoft. Those OSes are no longer supported, so in their eyes, they don't exist.
No 2003? Someone can't read. (Score:3, Informative)
Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Server
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows XP Home Edition
Microsoft Windows XP Professional
Re: (Score:2)
In other words, the admin would have to go out of his or her way to make sure that Win2k3 Server was affected by this, not to mention the fact that they would have to browse the web on a freaking server, which us
It's C again. (Score:2)
On a more serious note, I am using Firefox and Thunderbird, so it is highly unlikely that I am affected by the vulnerability. Open source wins again!
Does it affect XP 64? (Score:2)
"Customers who are running Windows Server 2003 and Windows Server 2003 Service Pack 1 in their default configurations, with the Enhanced Security Configuration turned on, are not affected. Customers would need to visit an attacker's Web site to be at risk. We will continue to investigate these public reports."
I'm on XP 64 SP1, equivalent to 2003 SP1.
Melissa
Re: (Score:2)
Use psexec to protect your system from your browse (Score:2)
http://download.sysinternals.com/Files/PsExec.zip [sysinternals.com]
C:\utl\psexec.exe -dl "C:\Program Files\firefox\firefox.exe"
or
C:\utl\psexec.exe -dl "C:\Program Files\Internet Explorer\iexplore.exe"
Aonther one? (Score:2)
No, really?
Tell me it isn't so.
Wait! (Score:2)
Re: (Score:1)
Re: (Score:2)
Just gimme enough time to grab the popcorn.
Myths... (Score:2)
Nice try :) Let me see you run a windows machine for developing for a month, no crashes, no reboots. Repeat this for month after month. Then let me see you install a windows machine through booting a CD (or DVD if you prefer), seeing everything works as expected, and then initiate the install. The install will automatically accomodate the existing OSs on the computer, and making dual booting between any number of OSs possible. After the install, let me then see you find and install a secure browser, 2 diffe
Re: (Score:2)
Re: (Score:2)
Such nice language you have. Oh well. I have often met people who claim fantastical uptimes for their window boxes, but on inspection it is usually <1 week. Of course, you might be the exception, but then I did list a few more point for the grandparent to do to back up his claim on windows being more usable.
Have fun! Tomorrow I will (again) be wo
Re: (Score:2)
there's no trend here. windows searches are decreasing also.
Re: (Score:2)
In fact, the graph shows Windows searches beginning to increase again.
Re: (Score:2)
Lay off the caffeine, dog. Now you're seeing things. There ain't no such thing as a sexy nerd girl. There are plenty of sexy girls (directly proportional to the amount of beer you've had), and there are some nerd girls. But sexy nerd girls? No way, unless you are really wasted.
Re: (Score:2)
Its funny because the other week I was waiting at the supermarket checkout behind three of the ugliest women I have seen in a long time. Not offensive, just not ... very ... attractive.
Their credit card transaction was going through. One of them appeared to be entranced by the flickering lights of the network gear embedded behind the register. She turned two one of her friends and said I think the hourly transfer is about to run...ah there it is.
Re: (Score:2)
Re: (Score:2)
Like the romans said, you can't argue taste. Ewww. As far as I'm concerned, my point stands. But then again I must concede that yes, at least she LOOKS female.
Re: (Score:2)
You can keep them. Perhaps I'm spoiled, since I live in latin america. Oiga, las mujeres down here are, well, guapissimas
Re: (Score:3, Funny)
Re: (Score:2)
ahhh, I didn't know that but there is so much jargon around these days from people trying to sound sexy and intelligent I do let a lot go over my head. Thanks for the clarification. I've been hearing "zero day zero day" everywhere I thought it must be some kind of clevel attack like Birthday or something. There you go, learn
Re: (Score:2)