Criminals Attacking Myspace, Facebook IE Plugins 70
An anonymous reader writes "According to the Washington Post's Security Fix blog, cyber criminals are populating the Internet with Web sites designed to exploit several recently-discovered security holes in a half-dozen widely used ActiveX plug-ins for IE 6 and 7, most notably the one offered by Facebook and MySpace to help users upload photos. The sites, advertised via links in email and instant message spam, also 'probe for other vulnerable IE plug-ins, including two recently discovered from Yahoo! and one for QuickTime (this one attacks a vulnerability Apple patched just last month). The sites also throw in an exploit against a six-month-old IE flaw.' The article notes that the SANS Internet Storm Center has released a GUI tool to help users safely deactivate the vulnerable plug-ins in the Windows registry."
Get rid of ActiveX (Score:5, Insightful)
Re:Get rid of ActiveX (Score:4, Informative)
Re: (Score:2)
Don't most people just use the standalone update tool? Or is that only good for autoupdate?
-matthew
Re:Get rid of ActiveX (Score:4, Informative)
Re: (Score:1)
Re: (Score:3, Insightful)
It's when companies invent custom doodads to do something "fancy" or different and one cannot use that fancy/different service unless they install the given Active-X applet. At work, there is a service that one person needs to do their job, and installing the custom Active-X thing is the only way to get access to the service. It is forced upon them. It is almost like a lawyer saying, "You
Re: (Score:1)
The one place where ActiveX does NOT belong, is on the intarwebs. I _far_ prefer the Firefox plugin system, where everything is Javascript and still runs in a sandbox. The petty little featu
Re: (Score:1)
I don't understand your use of "fine". I did not promote Active-X. I was only describing circumstances where one is sort of forced into using such pluggins.
Re: (Score:2)
Re: (Score:1)
Given what I've seen done with Firefox addons, I'm quite confident that most of the functionality that traditionally used ActiveX can be safely and completely replicated with Javascript and XUL. After all, most of them are simple UI mods.
Re: (Score:2)
Hey, something as simple as accessing files on the machin
Re: (Score:3, Interesting)
Haven't they gotten rid of activeX(ploit) by now? I can't recall the last time I saw it being used for anything useful.
Flash? DivX Web Player? You don't use either?
IE7 running on Vista is also secured against many things these controls could do to a system maliciously, even if they were compromised. System APIs that provide access to the registry and file system are restricted for low integrity processes such that you can only address very specific, usually virtualized locations.
Firefox plug-ins, btw, are DLL files, and I don't see how that's so wildly different?
Final thought: I just used Vista and IE7 to defend Microsoft,
Re: (Score:2)
Also toolbars and other stuff in Firefox dont require any executable code at all and are thus less prone to attack.
Only things like Flash require executable code.
Re:Get rid of ActiveX (Score:5, Informative)
Re: (Score:2)
Firefox handles all the tough code to make a toolbar and the XUL/js just does basic stuff.
Re: (Score:2)
With Firefox you really program most of the extension through JS... XUL just provides the UI that glues it together. But it's a bit like assuming that web pages are safe because you define them mostly through HTML... vulnerabilities through the use o
Re: (Score:2)
Its far harder to make a toolbar with a vulnerability with XUL/JS than making one for IE.
TFA says that they are targeting specific IE toolbars with flaws. You couldnt do that with standard Firefox toolbars.
ActiveX = the IE culprit? (Score:2, Insightful)
Why is it still used so much by commercial actors like Facebook, or not secured by MS?
Re:ActiveX = the IE culprit? (Score:5, Informative)
Re: (Score:2)
Re: (Score:3, Informative)
Re: (Score:1)
In some cases it's the fault of developers (or their bosses) who rely on IE-only technology, but ActiveX is sometimes the only way to get 'standard' behavior out of IE.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2, Informative)
Re:ActiveX = the IE culprit? (Score:5, Insightful)
Plug-ins (including ActiveX) are dangerous. ActiveX is much more ubiquitous than Netscape-style plugins. For example, nearly every windows application comes with ActiveX or COM objects, but it's very rare for them to install Netscape-style plugins. Therefore, using Internet Explorer with ActiveX enabled for all sites on the internet (the default configuration) is dangerous because you're relying on all of these components to be written securely.
Secure your web browser [cert.org] and you'll be much better off.
Re: (Score:2, Insightful)
A problem is that users have dialog fatigue and don't read nor undestand when they get the prompts. Then again, most would trust Yahoo/MySpace/Facebook anyway if they get the prompt.
IE7 does not disable ActiveX in public zones (Score:5, Informative)
Re: (Score:2)
Re: (Score:2)
You totally miss the point, as did the Microsoft middle managers who signed off on this. Running any code coming from a wire is unwise in the extreme. Running it without user intervention is worse.
ActiveX could work fine in a totally trusted environment, like inside an isolated company network. On the Internet it's Just Plain Stupid. It was accepted knowledge decades ago that one should just not run executable anythings (scripts or binaries) coming in over a
Re: (Score:2)
ActiveX is the name for a technology that is used to load plugins (every single browser has a similar technology).
The plugins have vulnerabilities, and the bad guys are exploiting the vulnerabilities in the plugins. There's nothing about ActiveX involved except for the fact that the plugins are written for IE.
The exact same exploits could be written for Firefox or Safari or Opera, because they all contain support for the vulnerable plugins.
Windows Vista runs all browser plugins in a very locked d
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1, Offtopic)
Limited user anyone? (Score:5, Informative)
Instead of getting crap installed, an error in my security log about an Active X control not having required permissions to install
So I must ask, How many are vulnerable merely because they foolishly surf as Owner/ Administrator?
You might that this make no difference, but here, you would be wrong.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
DoS == Denial of Service
Fixed that for you.
Re: (Score:1)
Re: (Score:1)
Re:Limited user anyone? (Score:5, Insightful)
That's kind of the idea there, buddy. Bringing network interfaces up and down is definitely an administrative task. If XP were a real operating system, it'd have some way to temporarily become administrator during a session. Even "run as Administrator" with the proper password doesn't work for tons of programs, QQ and Alibaba Trade Manager being the offenders I'm pissed off with currently.
Re: (Score:2)
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1, Insightful)
I've had any number of people bitch when they try to install their screen saver, or some other PoS bit of crapware doohickey their neice's best-friend got from an pseudo-anonymous myspace poster.
One of such user was my boss, who despised the notion of operating system security as being "crap that makes it hard (or impossible) to do whatever the hell yo
Re: (Score:2)
Apologies, but... (Score:4, Insightful)
Re: (Score:2)
I don't feel sorry for them in the slightest. It's not like IE/ActiveX's security track record is some big secret that would take a great deal of effort to find out about. People are voluntarily using a program with an unusually poor security history and are having security problems -- where is the surprise?
You could argue from the victim mentality and say "but they don't know any better", to which I would ask, do you think
Good reminder for the Mozilla extensions (Score:5, Insightful)
ActiveX is not the problem per se (Score:5, Interesting)
After 15+ years of Internet explosion, you'd expect that we would be doing better in security, and that we wouldn't miss desktop apps. There is a dire need for better web apps that blend better with the local system.
In fact, while many of us might look forward to Web 2.0 using Ajax/JSON et al, there is a bit of a growing movement in non-standards based environments: Flash and Silverlight are emerging as full fledged OS-like environments inside the browser. Instead of re-inventing the OS using the browser with an interpreted (slow) language (like Netscape, and Java -client- tried to do), you have Adobe and MS coming up with a graphics friendly and programming flexible alternatives within their own ActiveX controls (which are blazing fast because the core is in C++, and the content is pre-compiled). As much as Flash is maligned, I wouldn't be surprised if in 10 years it takes over the Internet, and the browser is little more than a tool to deliver flash content.
Re: (Score:1)
For graphics designers, Flash programming comes as a natural extension (and a way to bypass programmers), and it can offer enhanced functionality th
Re: (Score:2)
Not on my computer. Or the browser I use in Windows.
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Interesting)
Re: (Score:3)
ActiveX is a way to extend the browser.... ActiveX gets the bum rap because it is the entry point (a generic API). The real culprits are third party programmers.
I strongly disagree. ActiveX has a bad reputation for a reason: it has a very poor security model for its intended use.
Securitywise, Flash isn't as good as it could be. It seems that the security features have been a gradual add-on features over the years instead of being designed as an integral part of the system from day one. And that approach has never really worked well. For example, as far as I know, you can't digitally sign SWF files.
Re: (Score:1)