Bitcoin Forum
November 17, 2024, 06:36:42 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Be advised! Hackers exploit new IE zero-day vulnerability  (Read 1291 times)
RyanRed (OP)
Full Member
***
Offline Offline

Activity: 126
Merit: 100



View Profile
September 18, 2012, 07:30:18 AM
 #1

Attackers are exploiting a "zero-day" vulnerability in Microsoft's Internet Explorer (IE) and hijacking Windows PCs that cruise to malicious or compromised websites, security experts said today.

Microsoft confirmed the IE bug, saying, "We're aware of targeted attacks potentially affecting some versions of Internet Explorer," but did not set a timetable for fixing the flaw.

The unpatched bug in IE7, IE8 and IE9 can be leveraged in Windows XP, Vista and Windows 7, according to Rapid7, the security firm that also maintains the open-source Metasploit penetration-testing toolkit.

Read more here:

http://www.computerworld.com/s/article/9231367/Update_Hackers_exploit_new_IE_zero_day_vulnerability?taxonomyId=125

I just felt this should be brought to everyones attention. I strive for security, and wanted to pass this along. I hope was able to help someone Smiley

finway
Hero Member
*****
Offline Offline

Activity: 714
Merit: 500


View Profile
September 18, 2012, 07:58:44 AM
 #2

Thanks for sharing.

flatfly
Legendary
*
Offline Offline

Activity: 1092
Merit: 1016

760930


View Profile
September 18, 2012, 08:19:34 AM
 #3

How can anyone still be running IE these days?

99% of common security issues (zero-days, drive-by downloads, etc) on Windows can actually be avoided pretty easily by running ANY other browser than IE and not using an admin account by default.

Also be very careful keeping up-to-date with (or outright disabling) Flash and Java
runtimes as these are the most common attack vectors.
Gareth Nelson
Hero Member
*****
Offline Offline

Activity: 721
Merit: 503


View Profile
September 18, 2012, 08:31:39 AM
 #4

Windows is famous for bad security, so is IE - why on earth would anyone use the combination on a machine storing anything of value?
RyanRed (OP)
Full Member
***
Offline Offline

Activity: 126
Merit: 100



View Profile
September 18, 2012, 08:51:06 AM
 #5

Im with you guys Smiley IE is crap. But Im sure some still use it, so I just wanted to bring this to peoples attention is all.
WITRcenter
Member
**
Offline Offline

Activity: 88
Merit: 10

W Investment Technology Research Center


View Profile
September 18, 2012, 04:04:53 PM
 #6

Thanks for your information.

WIT-2, a new equity investment opportunity offered by W Investment Technology Research Center.
https://bitcointalk.org/index.php?topic=132035.msg1414857#msg1414857
rate5
Member
**
Offline Offline

Activity: 104
Merit: 100



View Profile
September 18, 2012, 04:10:17 PM
 #7

Im with you guys Smiley IE is crap. But Im sure some still use it, so I just wanted to bring this to peoples attention is all.

Without IE how are we going to use ActiveX technology?  Tongue
niko
Hero Member
*****
Offline Offline

Activity: 756
Merit: 501


There is more to Bitcoin than bitcoins.


View Profile
September 18, 2012, 04:18:50 PM
 #8

Here is an interesting counter-point: IE iswas not vulnerable to CRIME attack; Firefox and Chrome arewere vulnerable until recently.

Quote
"Basically, the attacker is running a script on Evil.com," Rizzo explained to Kaspersky Labs' Threatpost. "He forces the browser to open requests to Bank.com by, for example, adding <img alt=""> tags with the src pointing to Bank.com. Each of those requests contains data from mixed sources."

Each encrypted request includes an image file name - a constantly changing detail that is generated by the malicious script; the browser's identification headers, which don't change; and the login cookie, the target of the attack. When the file name matches part of the login cookie, the size of the message drops because the compression algorithm removes this redundancy.

"The problem is that compression combines all those sources together," Rizzo added. "The attacker can sniff the packets and get the size of the requests that are sent. By changing the [file name] path, he could attempt to minimise the request size, ie: when the file name matches the cookie."

I don't use IE, but things are not black-and-white, especially not today. Don't base your views on years-old information.

They're there, in their room.
Your mining rig is on fire, yet you're very calm.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!