Code Posted For New IE Exploit 123
PC World is reporting that two days ago hackers posted code for a new vulnerability in Internet Explorer that could allow drive-by takeover of a vulnerable PC. Security companies say that no exploits using the "daxctle" vulnerability have yet been found in the wild, but they are taking the new threat seriously. Symantec calls the bug "critical" and Secunia rates it highly critical, the most severe rating. The hackers who posted the sample code, xsec.org, refer to it as a "0day" exploit. The article quotes another security expert who calls this label "a stretch."
Update: 09/17 18:00 GMT by C :Fixed link to XSec. Thanks for pointing that one out, folks.
Wrong Link in Subject (Score:5, Informative)
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
Dupe! (Score:2)
Moo (Score:4, Insightful)
If you want to be safe in IE, turn off ActiveX from untrusted sites. Hasn't this been known since day one?
News would be if ActiveX was tested and found to be safe.
Re: (Score:1, Insightful)
Ah yes. PC Magazine. Where Macs don't exist and "power-hungry" appears in every third headline.
Re: (Score:1)
how to detect an untrusted site .. (Score:1, Insightful)
How do you know what is or is not an untrusted site.
How in any way is that comment "insightful".
Re:how to detect an untrusted site .. (Score:5, Insightful)
Re: (Score:2)
That's easy. If you have to ask yourself "do I trust this site?" then the answer is no.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2, Informative)
Switch to Linux and watch all my applications which I need to do my job fail. Yes, that sounds like a plan. For the record I'm a .NET developer who needs Visual Studio and SQL Server to do my work.
You may find it hard to believe but Windows is a pretty damn secure OS, given that the one using it knows what he's doing. I'm not using MSIE, I'm not using Windows Media Player. And I have yet to have my machine BSOD, get infected with spyware/virus nor have to reinstall it periodically because it's unrespons
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Sorry... I got carried away there. Everyone else on Slashdot misuses that term. I didn't want to feel left out.
Re: (Score:2)
That's great. But what if you want to use it on day two?
Moderators on crack (Score:2)
Me saying that Windows, the worlds most used, sold and deployed user-focused OS, can be used relatively securely, and that people should choose the tool/OS that does the job that needs doing best, I get modded troll, while a Linux fanboy claiming that Linux solves all problems in the world, regardless of what the actual job at hand is (without any actual backing ofcourse) doesn't.
Great job, mods! Now you can mod this offtopic, trolling flamebait. I'm sure that the burning karma will fit right into your
Re: (Score:3, Interesting)
I know most users just don't care, or don't know better. But what about developers and companies? These should be treating IE like a plague, and using it only when there's no other suitable alternatives, on a sandboxed environment.
I used to care about IE compatibility when I designed my pages... but not anymore. I realized that most business already expect some kind of requirements for the software you sell or build for them, mine is a modern browser, with dec
Re: (Score:1)
Perhaps you mean ActiveX on untrusted sites. On an intranet especially, or certain trusted sites, it can be invaluable.
Re: (Score:2)
Re: (Score:1)
Re: (Score:3, Informative)
Re: (Score:1)
Since /.'s already turned into bugtraq... (Score:2, Funny)
Linux Kernel SMBFS CHRoot Security Restriction Bypass [securityfocus.com]
Linux Kernel SCTP Multiple Remote Denial of Service [securityfocus.com]
Apple Mac OS X KExtLoad Format String Weakness [securityfocus.com]
Mozilla Firefox JavaScript Handler Race Condition Memory Corruption Vulnerability [securityfocus.com]
Re:Since /.'s already turned into bugtraq... (Score:4, Informative)
The second bug is only a DOS, it won't give an attacker sweet r00t permissions. And it's also 4 months old news.
The third bug doesn't result in any privilege escalation because the kextload program isn't setuid, you'd need to find some other vulnerability in a program which uses kextload.
And the fourth bug is a month old already, hasn't been proven to be exploitable (more likely to simply crash firefox), and is easily resolved by upgrading firefox.
Re: (Score:1, Offtopic)
Re: (Score:1)
People: check on 'No Karma Bonus' when posting side comments. Your every word does NOT warrant being made at +2.
Re: (Score:2)
Re: (Score:1)
(and you thought you were gonna bait me into using the +1 to reply to your troll, huh?)
September 13, not September 15 (Score:2, Informative)
Check the date on the xsec.org page referred to, daxctle2.c [xsec.org]. milw0rm 2358 [milw0rm.org] was a re-publication of this, also posted up on 09/13/2006. Republication happened at other exploit advisory sites as well, such as the SecuriTeam(TM) site, where, for some strange reason, the exploit was published twice, redundantly.
The formal vulnerability advisories SA21910 [secunia.com] and FrSIRT/ADV-2006-3593 [frsirt.com], from Secunia and FrSIRT respectively, posted on 09/14/2006
Re: (Score:2)
And you are repeating yourself, twice, redundantly, saying the same thing multiple times without adding new information.
Re: (Score:2)
Many of us cube inmates use IE as required internaly as required. On break, we re-boot into a live Linex CD and are unable to log into the corp domain, but happly point firefox at the corp autoproxy and surf away.
It is safe for the corp as nothing is saved to disk. I love Ubuntu for this.
Firefox 1.5.07? (Score:1, Interesting)
Re: (Score:3, Interesting)
Key word: fixing. As far as I can tell, this security hole is currently unpatched.
Re: (Score:2)
Re:Firefox 1.5.07? (Score:4, Insightful)
Re: (Score:3, Insightful)
Security companies say that no exploits using the "daxctle" vulnerability have yet been found in the wild
You can make an exploit if you want to (Score:2)
But code that could be used to create an exploit has been posted, which is what I think GP was referring to.
Re: (Score:1)
So you are saying that just to avoid people like you to call slashdot a ms-hate central, slashdot should avoid to publish an story about a new IE exploit even though it is news for nerds and stuff that matters?
Boy , you must accept that this news item wasn't biased, it didn't come with the standard "It seems that MS screwed it again" nor any other POV , and the exploit does exist. So why get so offended?"
Re: (Score:2)
However, I would suggest that the lack of news items regarding security flaws in Firefox does show bias.
Re: (Score:1)
I don't agree that this is the only reason the articles are published (for one thing, Slashdot is stacked with people who claim to be OSS-advocates who are probably browsing the site on their Mom's computer running Win Me and they get sent to their room if they install anything they downloaded on it).
winpologists out in force (Score:3, Informative)
Slashdot | 611 Defects, 71 Vulnerabilities Found In Firefox [slashdot.org]
Firefox Analyzed for Bugs by Software [slashdot.org]
Spyware Disguises Itself as Firefox Extension [slashdot.org]
I'v also noticed how the same kind of comments from the Winpologists get modded up very quickly.
was Re:Firefox 1.5.07?
Re: (Score:2)
Re: (Score:2)
That RSA exploit probably appears elsewhere... (Score:2)
If you are interested in the work on RSA signatures, check out this OpenPGP posting [imc.org]. The chances are that there are other RSA signature implementations out there that are vulnerable to this sort of subversion and it will be interesting to see what other products actually publish fixes an
Re:Firefox 1.5.07? (Score:5, Insightful)
OK, smarty, I will explain the difference to you. On one hand we have Firefox, which is a piece of software that is free in both senses, and you can use it, or not use it, or delete from your system, or whatever you want. On the other hand we have Internet Explorer, which is forced upon you via "leveraging," you cannot remove, and you must use because of contrived tie-ins to fundamental system functions.
If there is an exploit for Firefox, I can shrug my shoulders and use any of a dozen other browsers to look at web pages until it gets fixed. Or I can choose to continue using Firefox anyway, despite the risk. It's my choice. However, if there is an exploit in Internet Explorer, I am just plain screwed. I can't switch the goddamn thing off or remove it. Hell, there are plenty of applications and services that will gleefully launch IE of their own accord and start loading internets from God knows where, and there's no way for me to stop it. Because of Microsoft's predatory practices, I have no choice in the matter (except to abandon Windows altogether, which is also not an option -- see how all my choices have been removed?). You're damn right people are a lot more upset when exploits turn up in IE. We are required to suffer the fallout from them.
Re: (Score:2)
Sure, you can talk all you like about Firefox and other browsers being optional, etc., but that's not the issue being raised.
Re: (Score:2)
This bug is with a required piece of system software that you can't turn off, *and* it's not fixed yet, *and* there is a working exploit available. If you can think of other similar situations that aren't reported, please, feel free to submit them. Otherwise, your apples don't belong in this orange tree.
Re: (Score:2)
Slashdot covers IE security issues more often than Firefox security issues because IE gets new exploits much more often than Firefox, and since IE is used in a lot more machines than Firefox, IE security issues have far more potential for destruction than Firefox security issues, making them more ne
Re: (Score:2)
I'm getting tired of explainint this, but here we go again: do you notice the shiny E on your desktop? This is IE. Now, if you're thinking of double clicking
Re: (Score:1)
Re: (Score:1, Informative)
IE cant be removed.
IE is not only used for web browsing purposes, but started and used for and by quite a many applications.
How's the Windows Update doing without IE ?
Re: (Score:1)
Re: (Score:1)
I don't know, perhaps because they were fixed??
Re: (Score:2)
Re: (Score:1)
Because the first I, and many or most firefox users, heard about the bugs, was when Firefox told me that a bug fix was waiting to be installed. By the time I got to slashdot, it wasn't news, or a threat.
"not a 0day exploit" (Score:5, Insightful)
I'm sorry, what's the definition of 0day exploit these days? If not exploit code for which there is no patch available, then what?
Can we now use "responsible disclosure" to argue away the fact that actual computer systems are at risk of being exploited right here and now, by saying "yeah, well, you got rooted and all, but we knew about that bug, so it doesn't count, even though we don't have a patch yet."?
Can we now take comments that the programmers left in the code ("// does this work?" "/* coded while druk */" "//BUGBUG") as an excuse to completely ignore actual vulnerabilities?
And hey, if TWO researches come up with this vulnerability seemingly independently, what are the chances of the exploit already circulating in the black hat community? Close to 100%?
By my definition you've got your negative-day and your zero-day exploits. Negative-day exploits; no patch yet. Zero-day; the patch has just been issued, so might as well give your exploit to scriptkiddies and botnet operators to use on the systems that don't patch early/often enough. Obviously, a negative-day exploit usually isn't going to be used on a large scale, because your average blackhatter wants to keep it in his toolkit to attack well-patched systems; after all, it's what gives him (and his leet skillz) an edge. Once patchday arrives, you might as well give it to some noobs, because they might be interested in unpatched targets, while a leet blackhatter is not.
So no, it's not a "stretch" to call it 0day. It's negative day, even.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Security disclosure in general is a pretty complicated ga
Re: (Score:1)
In this case, it seems like disclosure isn't working - particularly "responsible" disclosure. Otherwise no one would be reporting vulnerabilities that others *claim* are already known (by whom? not the guy claiming the 0da
Re: (Score:1)
What would really be a lot of fun is a Blaster-type zero day worm.
(If you remember blaster only required the user to connect to the internet to be infected)
Re: (Score:2, Informative)
Does not affect IE7 (Score:4, Interesting)
http://blogs.msdn.com/ie/archive/2006/09/15/75673
(Just for edification.
Re: (Score:2)
Re: (Score:2)
Re:Yes, this affects IE7 but you are prompted (Score:4, Insightful)
Throwing a constant barrage of OS/browser security pop-ups on the screen does not make it secure. Making it so that at exploitable control can be completely removed and not just "effectively removed" from the system helps make the system more secure but this is just a workaround. If the control was designed to be able to grant system level privileges to a web page than it's time to go back to the proverbial drawing board.
If it wasn't designed that way, then patch it when you first hear about it over a month ago [securityfocus.com] and stop complaining about people releasing it to the public. I would rather have everyone know about it than have just Microsoft, a few security people, and several black hats knowing.
vulnerability?? (Score:1)
Re: (Score:1)
Re: (Score:1)
As for your comment... No, users don't care as long as it works. Most people I know with ie as their main browser have all kinds of crap installed. Those annoying toolbars, flashing smileys, and popups all over the place. There is no educating these people, as they don't care to be educated. They see the windows box as a magic device that "should just work" regardless of how reckless they are with their browsing ha
IE Vulnerability Attack by '0day' (Score:1)
Re: (Score:1)
In case you don't know, there's a Preview Button and 'Plain Old Text' if you don't happen to know HTML.
Real Damage (Score:5, Funny)
All this whimy-ass 'botnet' garbage needs to end. We need something that totally kills windows when you get infected. Get the people pissed off enough to force microsoft into doing something.
Re: (Score:2)
3. Profit. Folks found there was money to be made off of a bot net under your control. Not uncommon to see an infected system patch itself so others can't infect the system.
Profit (Score:2)
Re: (Score:2)
Re:kills windows (Score:2)
All this whimy-ass 'botnet' garbage needs to end. We need something that totally kills windows when you get infected. Get the people pissed off enough to force microsoft into doing something.
I for one am actually surprised this hasn't happened yet. Say a worm that infects 20 others then formats the hard drive. Or perhaps break into a botnet (they are not that secure) and wipe some millions of Windows PCs at once. It would not be hard to do, let your Windows get infected, figure out how they control it
Re: (Score:2)
I for one am actually surprised this hasn't happened yet. Say a worm that infects 20 others then formats the hard drive. Or perhaps break into a botnet (they are not that secure) and wipe some millions of Windows PCs at once. It would not be hard to do, let your Windows get infected, figure out how they control it and go off and get control. Time will tell, but I suspect sooner or later someone is going to do it.
Yeah but who will notice? Windows is hosed and won't boot? Well, time for a re-install. Honey
Re: (Score:2)
Stop nagging and start typing.
Re: (Score:2)
Since when is 0-day open to interpretation? (Score:3, Informative)
One thing I don't understant... (Score:1)
...Is why these exploits and vulnerabilities are labelled "new".
They aren't new. Maybe they have just been found, but on a product that's been out so long, the exploits have been too (unless of course they were introduced by a fix or update recently). I know it's just improper usage of the English language - kinda like the "new" planets we've found (that have been around for billions of years).
The problem is, this creates a misconception in the casual user's mind as they think the exploit is new instead o
Re: (Score:2)
There's several other definitions for new on the same page.
Re: (Score:1)
True - but those are all context based. By definition (whichever you choose) the proper wording would be new(ly) found exploits, et al - as in the definitions you cited, there are modifiers such as "new crop " for the area" and "visit new places" is based off the perspective of who it is targeted towards (visiting New York might be visiting a new place to you, but not to me). The same with "a steady flow of new money" which is also based off the perspective of who the new money is flowing to/from.
We all kn
Check out Microsoft's other screwups (Score:1)
Gangsta h4xx0rz (Score:1)
Yeah homies let's go pop them unsuspecting computer users with da intratubes! Show 'em what bangin' is about.
Critical and Highly Critical? (Score:1)
The real difference between Firefox and MSIE (Score:5, Interesting)
When Microsoft finds a security hole themselves, they don't tell anyone, and they don't release a patch. They fix it in the tree for the next release of the OS. The only time they release a patch is when someone else finds the bug. The reason they do this is because if they release a patch, people will "bindiff" it against the previous version and find what is changed so that they can make exploits to use against unpatched users. You can't realistically "bindiff" XP vs. Vista, so they can obscure their security updates inside Vista.
Firefox instead will issue patches no matter who finds them. This is why Firefox appears to have more bugs - you always see them get fixed.
Melissa
Plugin for IE (Score:3, Interesting)
Why do people use IE? Mostly because of Intranet sites which server up IE only content and work badly or not-at-all with other browsers. How 'bout an IE plugin which opens only Intranet/trusted sites in IE and opens all else in an external safe browser? Or is this unlikely to be useful?
Re: (Score:1)
Safety first... (Score:1)
why hacker were borned in this world?
why they do not do anything else than hack?
Re:Eh? (Score:5, Insightful)
If you are a sys admin, or a web admin, Deal.
Re: (Score:2, Funny)