Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

When IE fucks up, it fucks up GOOD.

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » The DU Lounge Donate to DU
 
Commie Pinko Dirtbag Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Dec-01-05 04:26 PM
Original message
When IE fucks up, it fucks up GOOD.
http://www.theregister.co.uk/2005/12/01/ie_exploit_trojan
Trojan exploits unpatched IE flaw
MS mulls emergency patch release
By John Leyden
Published Thursday 1st December 2005 12:05 GMT

The release of a Trojan that exploits an unpatched IE hole has prompted speculation that Microsoft may release an emergency out-of-cycle security patch. The Delf-DH Trojan downloader uses an Internet Explorer vulnerability to infect unprotected Windows users who stray onto maliciously constructed websites. Delf-DH downloads other malware onto infected machines changing settings in order to monitor user activity and redirect surfers onto porn sites.

The attack relies on a flaw in the way IE handles requests to the window() object, highlighted by proof-of-concept code last week and now used in anger by VXers. Even fully patched Windows 2000 and Windows XP systems are vulnerable. Until a patch is available to address this vulnerability, US-CERT strongly encourages Windows users to disable Active Scripting.
Click Here

Security experts at the SANS Institute Internet Storm Centre speculate that the attack, though not widespread, is serious enough for Microsoft to release an out of cycle patch rather than waiting for its scheduled monthly patching day, which this month falls on 13 December. Microsoft isn't commenting on when a patch might be available but the smart money is on Redmond following a June 2004 precedent and releasing an emergency security fix outside its regular Patch Tuesday updates.
Printer Friendly | Permalink |  | Top
RevCheesehead Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Dec-01-05 04:32 PM
Response to Original message
1. Don't even get me started.
fucking microsoft and their fucking software. And fuck their millenium edition and their inability to patch ANYTHING.....

ooops - looks like I started anyways. Sorry.
Printer Friendly | Permalink |  | Top
 
Hugin Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-02-05 12:25 PM
Response to Reply #1
5. There... There.... Rev.
You have my Yuletide sympathy.
Printer Friendly | Permalink |  | Top
 
RoyGBiv Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Dec-01-05 04:50 PM
Response to Original message
2. Out-of-Cycle Patch ...

They make it sound like they're doing people a favor. I've seen OpenSource software patched within 24 hours of a public announcement of the flaw in question.

Kiss my ass, Microsleeze ... This flaw was first reported FIVE MONTHS AGO, but the bastages didn't think it was such a big deal and let it sit untouched until it became big news in the last few days that it was a very big deal.

Printer Friendly | Permalink |  | Top
 
Kellanved Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-02-05 12:14 PM
Response to Original message
3. And another one:
Exploiting an Internet Explorer Vulnerability to Phish User Information

Overview

It was bound to happen. I was recently intrigued by the possibility of utilizing Google Desktop for remote data retrieval of personal user data (such as credit cards and passwords) through the use of a malicious web page. Now, thanks to a severe design flaw in Internet Explorer, I managed to show it's possible to covertly run searches on visitors to a web site by exploiting this vulnerability. In this article I will detail what the vulnerability in IE is and how it is used to exploit Google Desktop. If you have IE 6 and Google Desktop v2 installed you can test it for yourself in my proof of concept page.

Detailed analysis

Normally, browsers impose strong restrictions for cross domain interaction through the web browser. A certain web page can make a user browse to a different domain. However, it may not read the content of the retrieved page nor manipulate any of its DOM objects. This restriction is imposed so one site owner wouldn't be able to spy on a user's surfing habits using Javascript. Also, if a user is already logged on to a certain service (such as Gmail or hotmail) a malicious web page could have executed certain operations in the user's account (such as opening an email and reading it) if the restrictions weren't in place. In IE these restrictions are kept thoroughly but they are broken when it comes to CSS imports. I call this attack CSSXSS or Cascading Style Sheets Cross Site Scripting.

...
http://www.hacker.co.il/security/ie/css_import.html
Printer Friendly | Permalink |  | Top
 
Hugin Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-02-05 12:23 PM
Response to Original message
4. I won't be holding my breath...
"Slowly the whale turns". I've been thinking of writing a book
by that title.
Printer Friendly | Permalink |  | Top
 
mainegreen Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-02-05 12:34 PM
Response to Original message
6. Why anyone still has active scripting enabled though defies logic.
Deadly stuff.
Printer Friendly | Permalink |  | Top
 
Commie Pinko Dirtbag Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-02-05 02:19 PM
Response to Reply #6
8. That entire architecture is a train wreck.
Web pages pumping OS-native code for the client to execute? No thanks.

Java and Javascript at least run in a credibly boxed environment.
Printer Friendly | Permalink |  | Top
 
kick-ass-bob Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Dec-02-05 12:49 PM
Response to Original message
7. jesus fucking christ.
I would start, but I see the good Rev already has. :D


I love being M$ free at home.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Mon May 13th 2024, 04:54 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » The DU Lounge Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC