Forums | Albums | Social Groups

Go Back   UGL - We live the Unreal Life! > Main Forums > How To Fix It

How To Fix It Place to post how to fix

Reply
 
Thread Tools Display Modes
Old 01-30-2011, 05:48 PM   #1
Doz
Maniac Drummer
 
Doz's Avatar
 
Join Date: Feb 2008
Location: Florida
Posts: 3,017
Default Microsoft warns of new Windows zero-day bug

Microsoft warns of new Windows zero-day bug


Microsoft today warned Windows users of a new un-patched vulnerability that attackers could exploit to steal information and dupe people into installing malware.

In a security advisory issued Friday, Microsoft acknowledged that a bug in Windows' MHTML (MIME HTML) protocol handler can be used by attackers to run malicious scripts within Internet Explorer (IE).

"The best way to think of this is to call it a variant of a cross-side scripting vulnerability," said Andrew Storms, director of security operations at nCircle Security.

To continue reading, register here and become an Insider. You'll get free access to premium content from CIO, Computerworld, CSO, Info World, and Network World. See more Insider content or sign in.

Microsoft today warned Windows users of a new un-patched vulnerability that attackers could exploit to steal information and dupe people into installing malware.

In a security advisory issued Friday, Microsoft acknowledged that a bug in Windows' MHTML (MIME HTML) protocol handler can be used by attackers to run malicious scripts within Internet Explorer (IE).

"The best way to think of this is to call it a variant of a cross-side scripting vulnerability," said Andrew Storms, director of security operations at nCircle Security.

Cross-site scripting bugs, often shortened to XSS, can be used to insert malicious script into a Web page that can then take control of the session.

"An attacker could pretend to be the user, and act if as he was you on that specific site," said Storms. "If you were at Gmail.com or Hotmail.com, he could send e-mail as you."

Microsoft elaborated on the threat.

"Such a script might collect user information, for example e-mail, spoof content displayed in the browser or otherwise interfere with the user's experience," said Angela Gunn, a Microsoft security spokeswoman, in a post to the Microsoft Security Response Center (MSRC) blog.

The vulnerability went public last week when the Chinese Web site WooYun.org published proof-of-concept code.

MHTML is a Web page protocol that combines resources of several different formats -- images, Java applets, Flash animations and the like -- into a single file. Only Microsoft's IE and Opera Software's Opera support MHTML natively: Google's Chrome and Apple's Safari do not, and while Mozilla's Firefox can, it requires an add-on to read and write MHTML files.

Wolfgang Kandek, the chief technology officer at Qualys, pointed out that IE users are most at risk.

"While the vulnerability is located in a Windows component, Internet Explorer is the only known attacker vector," said Kandek in an e-mail message. "Firefox and Chrome are not affected in their default configuration, as they do not support MHTML without the installation of specific add-on modules."

All supported versions of Windows, including Windows XP, Vista and Windows 7, contain the flawed protocol handler, one reason why Storms believes it will take Microsoft time to come up with a patch.

"If this was only in IE, I could see them getting a patch out by Feb. 8," he said, referring to Microsoft's next regularly-scheduled day for releasing fixes. "But this is rooted in Windows, and Microsoft won't take any chances."

In lieu of a patch, Microsoft recommended that users lock down the MHTML protocol handler by running a "Fixit" tool it's made available. The tool automates the process of editing the Windows registry, which if done carelessly could cripple a PC, and lets IE users continue to run MHTML files that include scripting by clicking through a warning.

The Fixit tool can be accessed from Microsoft's support site .

Microsoft has had to deal with protocol handler vulnerabilities before, notably in 2007 when Microsoft and Mozilla argued over patching responsibility for similar bugs.

Today's confirmation of another Windows vulnerability adds to an already-long list of not-fixed flaws that Microsoft has acknowledged but not yet addressed. According to Microsoft's tally , there are five outstanding vulnerabilities that require its attention.

One of the five was also disclosed by the same Chinese site that revealed the vulnerability discussed Friday. Microsoft first acknowledged the earlier WooYun.org-revealed bug on Dec. 22, several weeks after French security firm Vupen had issued a bare-bones advisory that said all versions of IE were at risk.

Microsoft has admitted that criminals are already exploiting the December IE vulnerability, and earlier this month shipped a first-of-its-kind workaround for the bug.

Today Microsoft said it has seen no similar activity on the MHTML vulnerability.

"We are working on a security update to address this vulnerability and we are monitoring the threat landscape very closely," said Gunn of Friday's flaw.


Source = http://www.networkworld.com/news/201...s.html?hpg1=bn


More Info = http://blogs.technet.com/b/msrc/arch...y-2501696.aspx
__________________
I am a USAF Veteran and LoveUSA

Doz is offline   Reply With Quote
Reply


Currently Active Users Viewing This Thread: 22 (0 members and 22 guests)
 

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Microsoft Releases Windows 7 SP1 Doz How To Fix It 0 02-24-2011 11:11 AM
Windows XP Blue Screen of Death STOP Codes Doz Computer Help 1 11-28-2010 05:09 AM
Windows 7 Passes Vista in Users, XP Still King Doz General Discussion 2 09-13-2010 01:44 PM
How to Have your XP Cake and Eat Win7 Too Doz Computer Help 0 05-18-2010 04:17 PM
Access the Windows Update Catalog Doz Computer Help 1 12-29-2009 04:53 PM


All times are GMT -5. The time now is 03:59 PM.

Powered by vBulletin® Version 3.8.1
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.