Go Back   SZONE.US Forums > Do it yourself (DIY) > Computer Tips > Computer Software

Computer Software operating systems, utilities, security, etc

Microsoft Pushes Workarounds to Dodge Zero-Day Attack

Views:2284
Reply
Thread Tools Search this Thread Rate Thread
  #1  
Unread 07.11.08, 09:05 AM
Steve Boren's Avatar
Steve Boren Steve Boren is online now
Administrator
 
Join Date: 02.07
Location: Canoga Park, CA
Posts: 3,507
Blog Entries: 71
Images: 19663
Send a message via AIM to Steve Boren Send a message via MSN to Steve Boren Send a message via Yahoo to Steve Boren Send a message via twitter to Steve Boren
Microsoft Pushes Workarounds to Dodge Zero-Day Attack

Microsoft Pushes Workarounds to Dodge Zero-Day Attack By Brian Prince
2008-07-08




Microsoft's suggested workarounds can help thwart targeted attacks against the ActiveX control for Snapshot Viewer.

While users await a patch for a flaw in the ActiveX control for the Snapshot Viewer for Microsoft Office Access, Microsoft has suggested a number of workarounds to dodge the problem.
Microsoft officials reported July 7 that they are investigating targeted attacks that take advantage of a bug in the ActiveX control for Snapshot Viewer that can be exploited via a maliciously crafted or compromised Web page. When a user views the Web page, the vulnerability could permit the attacker to execute code and gain user rights on a compromised system. The vulnerability only affects the ActiveX control for the Snapshot Viewer for the Microsoft Office Access 2000, 2002 and 2003 versions.
Among the simpler answers is to configure Internet Explorer to generate prompts before running Active Scripting or disable Active Scripting altogether in the Internet zone and the Local intranet zone. Likewise, IE can be configured to prompt before running ActiveX controls. In both cases, users can add sites they trust to a list of known good sites that will not generate the prompts.
"Many Web sites that are on the Internet or on an intranet use Active Scripting to provide additional functionality," Microsoft researchers wrote in the advisory. "For example, an online e-commerce site or banking site may use Active Scripting to provide menus, ordering forms or even account statements. You will be prompted frequently when you enable this workaround."
US-CERT also included instructions on disabling the ActiveX control for Snapshot Viewer by setting the kill bit to certain CLSIDs (class identifiers) in the Microsoft advisory.
Since successful exploitation of the attack would allow the hacker to gain the same user rights as the local user, the impact of an exploit can be limited by minimizing user rights. In addition, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode known as Enhanced Security Configuration that sets the security level for the Internet zone to "High" by default.
"Although these workarounds will not correct the underlying vulnerability, they help block known attack vectors," wrote Microsoft Security Response Communications Manager Bill Sisk in a blog post. "While the attack appears to be targeted, and not widespread, we are monitoring the issue and are working with our MSRA partners to help protect customers."
Microsoft Pushes Workarounds to Dodge Zero-Day Attack
__________________
Boren's Laws of the Bureaucracy: 1. When in doubt, mumble. 2. When in trouble, delegate. 3. When in charge, ponder.
Reply With Quote
Reply

Tags
dodge, microsoft, pushes, workarounds, zeroday

Thread Tools Search this Thread
Search this Thread:

Advanced Search
Rate This Thread
Rate This Thread:


Similar Threads
Thread Thread Starter Forum Replies Last Post
Microsoft Solves Patch Problem By Brian Prince Steve Boren Computer Software 0 06.21.08 03:47 PM
IBM Pushes Federated Identity Management Steve Boren Computer Software 0 05.23.08 10:38 AM
Microsoft Demos Live Mesh Steve Boren Computer Software 0 04.26.08 10:36 AM
Microsoft Windows Vista Service Pack 1 Steve Boren Computer Software 0 02.27.08 12:18 PM
NASA, Microsoft Launch Collaboration With Immersive Photography @NASA N.A.S.A. 0 08.06.07 02:01 PM


All times are GMT -8. The time now is 06:37 AM.


Powered by vBulletin® Version 3.8.5
Copyright ©2000 - 2019, Jelsoft Enterprises Ltd.
Copyright 2007 - 20017 SZONE.US All rights reserved