Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: dimmortal
« on: 05. August 2009., 03:21:03 »

microsoft has and allways will have probs with attacks
its a simple matter of there are more people out to get em....lol
Posted by: Darksat
« on: 30. July 2009., 16:45:58 »

Seems somewhat related to what we were talking about in another thread. Looks like microsoft are being secrative over releasing info and its a very critical patch, cant remember any firefox patches that are this serious.

Posted by: Samker
« on: 28. July 2009., 08:17:38 »



Microsoft has been forced to issue emergency patches for its Windows operating system after researchers discovered a way to bypass a critical security mechanism in the Internet Explorer browser.

During a Wednesday talk at this week's Black Hat conference in Las Vegas, researchers Mark Dowd, Ryan Smith and David Dewey will show a way of bypassing the 'kill-bit' mechanism used to disable buggy ActiveX controls. A video demonstration posted by Smith shows how the researchers were able to bypass the mechanism, which checks for ActiveX controls that are not allowed to run on Windows: http://www.hustlelabs.com/bh2009preview/
They were able to then exploit a buggy ActiveX control in order to run an unauthorized program on a victim's computer.

Although the researchers have not revealed the technical details behind their work, this bug could be a big deal, giving hackers a way of exploiting ActiveX problems that were previously thought to have been mitigated via kill-bits.

"It's huge because then you can execute controls on the box that weren't intended to be executed," said Eric Schultze, chief technology officer with Shavlik Technologies. "So by visiting an evil Web site [criminals] can do anything they want even though I've applied the patch. "

Microsoft commonly issues these kill-bit instructions as a quick way of securing Internet Explorer from attacks that exploit buggy ActiveX software. The Windows Registry assigns ActiveX controls unique numbers, called GUIDs (globally unique identifiers). The kill-bit mechanism blacklists certain GUIDs in the Windows registry so that the components cannot be run.

According to sources familiar with the matter, Microsoft is taking the unusual step of releasing an emergency patch for the bug on Tuesday. Microsoft typically only releases these "out-of-cycle" patches when hackers are exploiting the flaw in real-world attacks. But in this case the details of the flaw are still secret and Microsoft said that the attack is not being used in attacks.

"This must have really scared Microsoft," said Schultze said, speculating on why Microsoft might have issued the out-of-cycle patches.

It may also reflect an awkward public relations problem for Microsoft, which has been working more closely with security researchers in recent years. If Microsoft had asked the researchers to hold off on their talk until the company's next set of regularly scheduled patches -- due August 11 -- the company might have faced backlash for having suppressed the Black Hat research.

Microsoft itself has provided few details on the emergency patches, which are set to be released on Tuesday at 10:00 a.m. West coast time.

Late last Friday, the company said it planned to release a critical fix for Internet Explorer as well as a related Visual Studio patch rated "moderate."

However, the problem that lets the researchers bypass the kill-bit mechanism may lie in a widely used Windows component called the Active Template Library (ATL). According to security researcher Halvar Flake, this flaw is also to blame for an ActiveX bug that Microsoft identified earlier this month. Microsoft issued a kill-bit patch for the problem on July 14, but after looking into the bug, Flake determined that the patch didn't fix the underlying vulnerability: http://www.microsoft.com/technet/security/bulletin/ms09-032.mspx

One of the researchers presenting at Black Hat, Ryan Smith, reported this flaw to Microsoft more than a year ago and this flaw will be discussed during the Black Hat talk, sources confirmed Monday.

A Microsoft spokesman declined to say how many ActiveX controls are secured via the kill-bit mechanism explaining that the company "doesn't have additional information to share about this issue," until the patches are released. But Schutze said that there are enough that the Tuesday patch should be applied as soon as possible. "If you don't apply this, it's like you've uninstalled 30 earlier patches," he said.

Smith declined to comment for this story, saying he was not allowed to discuss the matter ahead of his Black Hat talk. The other two researchers involved in the presentation work for IBM. And while IBM declined to make them available for comment Monday, company spokeswoman Jennifer Knecht confirmed that the Wednesday Black Hat talk is related to Microsoft's Tuesday patches.

(Network World)
Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising