Just catching up on the days VML vulnerability news from today…. It looks as though… the exploit is now MUCH more widespread this blog has some video of an infection, what’s notable is that the first take was VERY UNEVENTFUL, it was used to stealthily install a keylogger. (So that they can harvest paypal/bank/etc. passwords…) So, there might not be a big red “you’re owned” sign pop up. Sunbelt reported on a test page to visit to see if you’re vulnerable. The direct link is http://www.isotf.org/zert/testvml.htm (Will crash IE if it’s vulnerable.)
There is an unofficial patch available from a new group known as ZERT (zeroday emergency response team.) (Microsoft is not recommending the unofficial patch of course.) Microsoft DID come out and suggest that an out of cycle patch is a possibility. They don’t seem to see the presense of the exploit as widespread yet. Incidents.org went to yellow as the exploit became more widespread…. Someone, I’m sure will pass that along to Microsoft… It should be noted that email clients are also vulnerable (Outlook 2003 for instance), so be careful with unexpected emails…
And on the “widespread” use of the exploit there’s this from SANS as well..
Ken Dunham from iDefense claims they have seen a significant increase in attacks over the last 24 hours and “[at] least one domain hosts provider has suffered a large-scale attack leading to index file modifications on over 500 domains”. Those domains pointed visitors to a VML exploit. We’re happy to note they join us in recommending “implementing a workaround ASAP” and see the upcoming weekend as a factor in it.
Disturbing to say the least. Watch out for the possibility then of legitimite sites hacked to include very subtle exploit induced keylogger installs. Either unregister the dll affected or think about using the unofficial patch (or an alternative browser) until Microsoft sees the need to go out of cycle and get a patch out the door.
(Editorial note – Still no word on any exploits being used to remove DRM from windows media files…. that would speed things up. Sorry, I couldn’t resist.)
Brian Krebs at the Security fix brings us more details on the hosting provider attack, saying that Host Gator had numerous accounts altered in the attack, they’re cleaning up. There’s also this…
AusCERT, the Australian Computer Emergency Response Team, said it has seen widespread e-mails urging users to click on links to Web sites that exploit the flaw to install malicious software.
Some malicious sites appear to be using the exploit to silently install spyware and adware, while others are seeding visitors’ Windows machines with hard-to-remove keystroke loggers or “form grabbers” designed to steal username, password and financial data when users enter data at bank or e-commerce Web sites.
So confirmation of the email vector and the silent installs. In other words, it may take a while to become aware of the full impact of this (keyloggers may remain undetected on some systems for a LONG time.)
There’s also an investigation of Webattacker which is a tool sold for $20 that has all sorts of ill uses. (Fake sites for identity theft, spyware/adware delivery, etc.)
In many ways, the analysis of Webattacker gives a really bleak view of the current state of the internet/malware/spam…..
Finally, websense has posted a report verifying an increase in activity. Unfortunately, there may be many botnets growing this weekend.
Oh and YES Internet Explorer 7 RC is immune to the vml vulnerability.
Let’s see…. from the weekend the Hostgater crack was due to a cpanel vulnerability.
Also, Sunbelt reminds us, this is not the only zero-day floating around for IE right now.
And there is a FAQ on the VML 0-day for IE here. (I’m trying to think how many other acronyms I could work into the last sentence…. get the FAQ for the IE VML 0D PDQ here…. oh well..)
Related PostsRelated Posts
- Remote Tech Support using VNC (Ultravnc SC and x11vnc+wrapper script) Ok, some time back I'd done a writeup on UltraVNC SC, which is a nice customizable (windows version) VNC server that essentially let's someone doing remote support build their own downloadable .exe that runs and automatically tries to make a direct connection to a "listening" vnc viewer. It's good for......
- Microsoft Update day for September.... AND Flash... AND Apple Yesterday, of course, Microsoft released it's monthly patches. I found the Windows update site to be painfully slow (and in some cases unresponsive.) It wasn't quite a huge update day by recent standards, but here's the summary.... Incidents.org has a nice chart showing the two re-released patches (one is actually......
- Remote Tech Support with x11vnc and wrapper script So, the idea is that I wanted something "like" the Ultranvnc Single Click download, only for linux. The main idea being is that if someone is looking for a bit of desktop tech support on linux, we don't need to be giving instructions for 5 different package managers, or source......
- Rapid Techniques To Produce A Lot More Traffic There are many websites within the net. Level of competition is tough also it can be rather challenging to drive traffic to your internet site. Increasing visitor count is crucial for a e-business strategy. To survive, you should generate more visitors and interest to your website. Listed here are three......
- SAINT 7.9 Product Release From Saint Newletter: Key New Features in SAINT 7.9 Vulnerability Scanner Microsoft Patch Tuesday scan policy - This scan policy checks for the latest published Microsoft Patch Tuesday vulnerabilities (2nd Tuesday of each month) New Vulnerability Check Type Coverage now includes - Blind SQL injection Flash application - Flash application......
- Microsoft Security Bulletin MS10-046 - Critical Microsoft Security Bulletin MS10-046 - Critical Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198) Published: August 02, 2010 | Updated: August 03, 2010 Version: 1.1 General Information Executive Summary This security update resolves a publicly disclosed vulnerability in Windows Shell. The vulnerability could allow remote code execution if the icon......
- Microsoft Internet Explorer patches for unsupported OS versions (Windows 98 and ME)
- WMF vulnerability checker
- WMF patch from Microsoft expected January 10th
- Lotus Notes WMF vulnerability
- Two new Windows exploits in the Wild | Wordpad Text Converter | Internet Explorer 7 XML Parser