Security Alerts
Microsoft
to Release Out-Of-Band Patch for Internet Explorer on January 21st
1/20/2010
A
vulnerability in Internet Explorer that was used in attacks called
"Operation Aurora" against Google, Adobe, and over 30 other companies
has been publically released. The attacks are highly
sophisticated. They have been limited and targeted so far,
but
public release of proof-of-concept code on Friday increased the
possibility of widespread attacks using the vulnerability because it
might help cybercriminals write attack code. Microsoft issued
an advance notification
that it intends to release an "out-of-band" patch for the Internet
Explorer vulnerability tomorrow. An out-of-band patch release
is
one not part of Microsoft's monthly patch release cycle and is an
indication that Microsoft considers this a very serious risk.
The
patch will be available on Windows Update as close to 10 AM PST as
possible.
Threat Level
Warning: Vulnerability is being
actively exploited on the Internet.
(A "warning" alert is for a situation that are currently occurring or
conditions are right for the situation to occur soon.)
Severity: High.
Media attention: Yes.
Affected Software
All versions of Internet Explorer 6 or 7 on all versions of Windows.
How
Do I Protect My Computer
The
vulnerability can be stopped using Data Extraction Prevention (DEP),
which is a combination of hardware support in most recent CPUs and
software. To use DEP, (1) the CPU has to support it (Intel XD
or
AMD /NX), (2) it has to be enabled in the BIOS, (3) the OS has to
support, and (4) the application (in this case, Internet Explorer) has
to opt into using it. It is enabled by default in only
IE8.
Microsoft’s Security Research & Defense team has released “Fix
It”
tool to allow users to enable DEP on older versions of Internet
Explorer. For more information about DEP, how to determine
whether or not your hardware supports DEP and configured on your
computer, see Microsoft Security Research & Defense blog post Additional information about DEP and the
Internet Explorer 0day vulnerability.
VUPLEN Security claims to have sample exploit code that bypasses DEP.
Users who run browsers with automatic updates turned on or Windows with
automatic update turned on will be automatically updated after the
patch is released. Once
the patch is applied, customers are protected against the known attacks
that have
been widely publicized.
More Information
Security Advisories
Microsoft Advisory: http://www.microsoft.com/technet/security/advisory/979352.mspx
Microsoft MSRC blog (includes videos with guidance for home users and
an explanation of DEP): http://blogs.technet.com/msrc/archive/2010/01/18/ advisory-979352-update-for-monday-january-18.aspx
Microsoft advance notification of one out-of-band security bulletin: http://www.microsoft.com/technet/security/bulletin/ms10-jan.mspx
McAfee: Attach Now Public: http://siblog.mcafee.com/cto/%E2%80%9Caurora %E2%80%9D-exploit-in-google-attack-now-public//
McAfee: Operation Aurora: http://siblog.mcafee.com/cto/operation- %e2%80%9caurora%e2%80%9d-hit-google-others//
VUPLEN Security: DEP Bypass: http://www.vupen.com/exploits/Microsoft_Internet_Explorer
_Use_after_free_Code_Execution_Exploit_MS_979352_0135286.php
Microsoft Reports of DEP being bypassed: http://blogs.technet.com/srd/archive/2010/01/20/ reports-of-dep-being-bypassed.aspx
Managed Services
Based on the criticality, IT Professional Services
will perform an emergency deployment the patch when it becomes
available to protect all systems under Managed
Care.
Professional Services
If you need assistance installing protection from
this worm or a security assessment, IT Professional Services
can help. Call our
help desk.
Find
out more about our managed care service.
To find out how vulnerable your network is
schedule a free network security analysis today.
We at IT Professional Services (ITPS)
hope that the information in this bulletin is valuable to you. ITPS
believes the information provided herein is reliable. While care has
been taken to ensure accuracy, your use of the information contained in
this bulletin is at your sole risk. All information in this bulletin is
provided "as-is", without any warranty, whether express or implied, of
its accuracy, completeness, fitness for a particular purpose, title or
non-infringement, and none of the third-party products or information
mentioned in the bulletin are authored, recommended, supported or
guaranteed by ITPS. ITPS shall not be liable for any damages you may
sustain by using this information, whether direct, indirect, special,
incidental or consequential, even if it has been advised of the
possibility of such damages.
|
|