Tag Archives: microsoft

Cisco Patch, Twitch Breach, and BitWhisper – WSWiR Episode 145

If you want to be the best woodchopper, you need to sometimes sharpen your tools. In information security, this mean keeping track of the latest threats, vulnerabilities, attack methods, and news. Yet, most IT folks barely have the time to go home and sleep. If you struggle to follow security news yourself, my weekly video summarizes the big stuff for you.

In this week’s episode, I cover a new unlikely attack technique, warn you about dangerous documents, and notify you of the latest router patches. See all this and more in the video below, or just follow the links in the Reference section if you prefer.

(Episode Runtime: 11:18)

Direct YouTube Link: https://www.youtube.com/watch?v=ydnP5dZCeGA

EPISODE REFERENCES:

EXTRAS:

— Corey Nachreiner, CISSP (@SecAdept)

Win2003 EoL Danger – Daily Security Byte EP.53

First Windows XP and now Server 2003. A number of articles this week reminded the IT community that Microsoft will discontinue Windows Server 2003 in July. Learn how this affects your security, and what you should do about it in today’s Daily Byte.

 

(Episode Runtime: 2:09)

Direct YouTube Link: https://www.youtube.com/watch?v=YCqn9YPjESA

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Patches and Pwns – WSWiR Episode 143

What do DRAM, Jamie Oliver, Half Life 2, Apple, and Microsoft all have in common? They were all affected by information security issues this week. The amount of information security news coming out each day is off the charts. If you need help keeping up, check out this weekly video summary.

Today’s show covers Apple and Microsoft security updates, a new science fiction-like DRAM hack, some gamer focused ransomware, and much more. Learn about it in the video, or peruse the References section for details if you prefer.

(Episode Runtime: 10:55)

Direct YouTube Link: https://www.youtube.com/watch?v=SG5xRcNMZbc

EPISODE REFERENCES:

EXTRAS:

 

— Corey Nachreiner, CISSP (@SecAdept)

Microsoft March Patch Madness – Daily Security Byte EP.41

Today’s Microsoft Patch Day is huge, with 14 bulletins fixing tens of vulnerabilities (many Critical). If you want to protect your encrypted web connections, and plug a five year old, zero day hole, you should update. See the video for details, or check out our blog post from earlier.

 

(Episode Runtime: 2:28)

Direct YouTube Link: https://www.youtube.com/watch?v=8DR4S6OlxBI

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Microsoft’s March Patch Day Madness

Pull up your bootstraps Microsoft administrators, because you’re in for a long patch slog this month. According to their March Patch Day summary,  Microsoft released 14 security bulletins, many fixing critical issues. I highlight the details below, so get ready to get patching.

By the Numbers:

February Microsoft Patch DayToday, Microsoft released 14 security bulletins, fixing a total of 45 security vulnerabilities in many of their products. The affected products include:

  • all current versions of Windows,
  • Internet Explorer (IE),
  • Office,
  • Exchange server,
  • and VBScript.

They rate five bulletins as Critical and the rest as Important.

Patch Day Highlights:

There are many vulnerabilities worth fixing this month, but two major highlights.

  1. Remember FREAK? It’s that SSL implementation vulnerability that I’ve been talking about in blog posts and multiple videos. Well, it affects Windows too and they fixed it this month. If you’ve been concerned about black hats sniffing your SSL, be sure to get the FREAK update (MS15-031).
  2. Also, remember Stuxnet? I’m sure you do, since it was one of the most sophisticated attacks the industry has ever seen. When it was discovered, it used four different zero day vulnerabilities to help itself spread, including a .LNK file vulnerability that helped it infect others via USB storage devices. Microsoft tried to patch this flaw years ago, but apparently failed. The MS15-020 update completes the botched job, so be sure to get that update. If you want to learn more about the update’s relation to Stuxnet, check out this HP blog post.

While these those two updates are probably the most interesting, this month’s bulletins include many more critical patches. For instance, March’s Internet Explorer (IE) update fixes 12 security flaws that bad guys can leverage in drive-by download attacks. Also, Exchange administrators will probably want to apply its update quickly, even though Microsoft only reports it as Important. If attackers can get your email users to click a link, they can exploit various Exchange flaws to gain access to your users’ OWA accounts. In short, we recommend you apply Microsofts updates quickly, in the order we share them below.

Quick Bulletin Summary:

We summarize the March security bulletins below in order of severity. We recommend you apply the updates in the same order of priority, assuming you use the affected products.

  • MS15-018 – Critical – IE Memory Corruptions Flaws – The Internet Explorer (IE) update mostly fixes a bunch of memory corruption flaws remote attackers could leverage to execute code. These are the types of flaws typically used in drive-by download attacks. If an attacker can get you to visit a site with malicious code, he could exploit these flaws to run code on your machine. If you have local administrator privileges, the attacker gains full control of your PC. Web-based drive-by downloads are pretty popular with attackers right now, so we recommend you apply this update quickly.
  • MS15-019 – Critical- VBScript RCE Flaw – VBScript is a Microsoft specific scripting language that ships with Windows and IE. It suffers from a memory corruption flaw that attackers could leverage to execute code with your privileges. This is actually one of the vulnerabilities corrected by the IE update mentioned above, but Microsoft has to fix it in VBScript as well since it ships independently. Similar to the IE flaws, attackers would likely leverage this vulnerability in drive-by download attacks.
  • MS15-020 – Critical – Two Windows Code Execution Flaws – Remember Stuxnet? This update fixes one of its zero day vulnerabilities… again! Windows suffers from two code execution flaws involving its Windows Text Services (WTS) and the way it loads DLLs. The WTS flaw poses the most obvious risk. If an attacker can trick one of your users into visiting a malicious web site, or opening a specially crafted file, she can exploit the WTS issue to execute code on that user’s computer, with the user’s privileges. If the user was a local admin, the attacker gains full control of your user’s PC. However, the “DLL Planting” vulnerability is pretty bad too, since it’s actually one that the infamous Stuxnet malware exploited years ago. While Microsoft’s alert doesn’t describe it this way, the DLL loading fix is related to the shortcut .LNK vulnerability that was supposedly fixed in 2010. You can read more about it on this blog.
  • MS15-021 – Critical – Multiple Adobe Font Driver Vulnerabilities – Windows ships with an Adobe font driver to handle—as its name suggests—Adobe fonts. This driver suffers from many flaws, including a denial of service (DoS) issue, an information leak flaw, and a number of memory corruption vulnerabilities. Attackers could exploit the memory corruption flaws to execute code on your computer, assuming they can trick you into visiting a booby-trapped web site, or opening a file with maliciously crafted fonts.
  • MS15-022 – Critical – Multiple Office Component Vulnerabilities - Office, and the components that ship with it (such as Word, Excel, and Sharepoint server), suffer from a range of five vulnerabilities. The worst are three code execution flaws that black hats can exploit by luring you into opening malicious office documents. However, Sharepoint also suffers from a few cross-site scripting (XSS) vulnerabilities as well.
  • MS15-026 – Important – Five Exchange Server Vulnerabilities - Exchange, Microsoft’s popular email server, suffers from five vulnerabilities. The four worst flaws are all cross-site scripting (XSS) vulnerabilities in various parts of Outlook Web Access (OWA). While they differ technically, they all have the same affect. If an attacker can lure you into clicking a specially crafted link, or into visiting a web site containing a malicious link, he can exploit any of these four flaws to gain control of your OWA account, and do anything you could (for instance, send and read your email). Since OWA is pretty popular among Exchange administrators, and often exposed publicly, I consider this update a fairly high priority.
  • MS15-023 – Important – Four Kernel-Mode Driver Flaws- The Windows Kernel-Mode Driver suffers from four security vulnerabilities; the most serious being a local elevation of privilege (EoP) flaw. If an attacker can log into your system, and run a specially crafted program, he can leverage this particular EoP flaw to gain complete control of that Windows computer. The remaining three issues are memory disclosure vulnerabilities attackers could use to gain more information about your system than you would like.
  • MS15-024 – Important – PNG Information Disclosure Flaw - Windows doesn’t handle PNG images correctly. If an attacker can get you to open a malicious PNG image, he can leverage this flaw to learn more about your system, which could aid him in further attacks.
  • MS15-025 – Important – Windows Kernel EoP Flaws - The Windows kernel suffers from two vulnerabilities that local attackers can exploit to elevate their privileges. Though the flaws differ technically, they share the same impact. By running a specially crafted program, a local attacker (with valid credentials) can gain full control of a Windows system. However, they can’t exploit these flaws unless they can already log onto your systems.
  • MS15-027 – Important – NETLOGON Spoofing Vulnerability - The Windows NETLOGON component suffers from a flaw that allows local attackers to spoof another legitimate user on your Windows network. However, to exploit this flaw an attacker must already be able to log in to your network using valid domain credentials, which significantly lessens its impact.
  • MS15-028 – Important – Task Scheduler Security Bypass Flaw - The Windows Task Scheduler—a component that allows users to run programs at specified times—suffers from a flaw involving its inability to properly enforce user privileges. In short, an unprivileged user can leverage this issue to run programs they’re not supposed to have access to. That said, they need credentials on your system to exploit this flaw.
  • MS15-029 – Important – JPEG XR Information Disclosure Flaw - The component used to display certain JPG images suffers from memory handling flaw that unintentionally leaks information about your system. If you view a malicious image, the attacker may (or may not) gain access to some information that could aid him further in an attack.
  • MS15-030 – Important – RDP DoS Vulnerability- The Windows Remote Desktop Protocol (RDP) suffers from a denial of service (DoS) vulnerability. In short, by sending specially crafted packets and unauthenticated attacker can take out your RDP server, and prevent legitimate users from connecting. If you allow access to RDP, you’ll want to fix this flaw.
  • MS15-031 – Important – Schannel FREAK Vulnerability- You know that SSL FREAK vulnerability we’ve written about and done multiple videos about over the past week? This Schannel update fixes it for Windows. If you concerned with SSL man-in-the-middle (MitM) attackers, you should apply this patch.

Solution Path:

If you use any of the software mentioned above, you should apply the corresponding updates as soon as you can. I recommend you apply the Critical updates immediately, try to get to the Important ones as a soon as possible, and leave the moderate ones for last.

You can get the updates three ways:

  1. Let Windows Automatic Update do it for you – While patches sometimes introduce new problems, these occasional issues don’t seem to affect clients as often as they do servers. To keep your network secure, I recommend you set Windows clients to update automatically so they get patches as soon as possible.
  2. Manually download and install patches – That said, most businesses strongly rely on production servers and server software. For that reason, I recommend you always test new server updates before applying them manually to production servers. Virtualization can help you build a test environment that mimics your production one for testing.  You can find links to download the various updates in the individual bulletins I’ve linked above.
  3. Download February’s full Security Update ISO –  Finally, Microsoft eventually posts an ISO image that consolidates all the security updates. This ISO conveniently packages the updates in one place for administrators. You’ll eventually find a link to the monthly security ISOs here, but Microsoft may not post it until a few days after Patch Day

For WatchGuard Customers:

Good News! WatchGuard’s Gateway Antivirus (GAV), Intrusion Prevention (IPS), and APT Blocker services can often prevent these sorts of attacks, or the malware they try to distribute. For instance, our IPS signature team has developed signatures that can detect and block many of the attacks described in Microsoft’s alerts:

  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-1634)
  • WEB Cross-site Scripting -11
  • WEB Cross-Site Scripting -7
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-1626)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-1625)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-1624)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-1623)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-1622)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0100)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0099)
  • FILE Vulnerabilities in Adobe Font Driver Could Allow Remote Code Execution
  • SMB NETLOGON Spoofing Vulnerability (CVE-2015-0005)
  • WEB-CLIENT Microsoft Internet Explorer VBScript Memory Corruption Vulnerability (CVE-2015-0032)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0056)
  • WEB-CLIENT Microsoft Internet Explorer Elevation of Privilege Vulnerability (CVE-2015-0072)
  • WEB-CLIENT Microsoft Internet Explorer JPEG XR Parser Information Disclosure Vulnerability (CVE-2015-0076)
  • WEB-CLIENT Microsoft Internet Explorer Malformed PNG Parsing Information Disclosure Vulnerability (CVE-2015-0080)
  • WEB-CLIENT Microsoft Internet Explorer WTS Remote Code Execution Vulnerability (CVE-2015-0081)
  • FILE Microsoft Office Component Use After Free Vulnerability (CVE-2015-0085)
  •  FILE Microsoft Office Memory Corruption Vulnerability (CVE-2015-0086)
  • FILE Microsoft Word Local Zone Remote Code Execution Vulnerability (CVE-2015-0097)
  • FILE Microsoft DLL Planting Remote Code Exectution Vulnerability (CVE-2015-0096)

Your Firebox or XTM appliance should get this new IPS signature update shortly.

Furthermore, our Reputation Enabled Defense (RED) and WebBlocker services can often prevent your users from accidentally visiting malicious (or legitimate but booby-trapped) web sites that contain these sorts of attacks. Nevertheless, we still recommend you install Microsoft’s updates to completely protect yourself from all of these flaws. — Corey Nachreiner, CISSP (@SecAdept)

 

FREAK affects Windows – Daily Security Byte EP.39

I warned you about the FREAK SSL vulnerability on Tuesday. It turns out it affects Windows too. Learn how to mitigate the issue, and get an update on how WatchGuard’s products are affected in the video below.

(Episode Runtime: 1:56)

Direct YouTube Link: https://www.youtube.com/watch?v=JZNdJfMZnik

EPISODE REFERENCES:

— Corey Nachreiner, CISSP (@SecAdept)

Tax Time Security Woes – WSWiR Episode 139

There’s tons of security news each week. If you can’t keep up, I try to summarize the most important stuff for you in my weekly video.

This week’s show covers a researcher leaking 10M credentials, Forbes’ website getting hacked, a TurboTax security scare, and much more. Watch the video for all the details, or check out the Reference section for other interesting stories.

(Episode Runtime: 9:50)

Direct YouTube Link: https://www.youtube.com/watch?v=mTycl-zSbVA

EPISODE REFERENCES:

EXTRAS:

— Corey Nachreiner, CISSP (@SecAdept)

Microsoft Delivers Nine Security Bulletins for February

As the second Tuesday of the month, it’s time for Microsoft administrators to get patchin’. You can find this month’s Patch Day details at Microsoft’s February Patch Day Summary page, but I’ll summarize some of the highlights below.

By the Numbers:

February Microsoft Patch DayToday, Microsoft released nine security bulletins, fixing a total of 60 security vulnerabilities in many of their products. The affected products include:

  • all current versions of Windows,
  • Internet Explorer (IE),
  • Office,
  • and Microsoft System Center Virtual Machine Manager (VMM).

They rate three bulletins as Critical, six as Important.

Patch Day Highlights:

The most interesting vulnerability this month is probably Microsoft’s Group Policy remote code execution flaw. This is a rather complex flaw that requires an attacker successfully pull off a man-in-the-middle (MitM) attack on a computer that is configured to connect to an Active Directory domain. Once the attacker can intercept your traffic, he can trick it into running a malicious login script, which allows him to run anything he wants. Since the flaw relies on a domain login, it primarily affects corporate Windows users. Check out this article to learn more.

Internet Explorer (IE) also got a rather beefy patch, which fixes 41 security flaws. The update mostly fixes memory corruption vulnerabilities that bad guys can leverage in drive-by download attacks. However, this update also includes updates to IE’s SSLv3 handling to mitigate the POODLE flaw. Finally, this update does NOT fix the recent IE11 cross-site scripting (XSS) flaw that Google disclosed. That said, I’d recommend you install the IE update first, as web drive-by download attacks are much more popular and targeted than the Group Policy attack mentioned above.

Quick Bulletin Summary:

We summarize February’s security bulletins below in order of severity. We recommend you apply the updates in the same order of priority, assuming you use the affected products.

  • MS15-009 – Critical – Cumulative Internet Explorer update fixes 41 vulnerabilities – The Internet Explorer (IE) update primarily fixes a bunch of memory corruption flaws remote attackers could leverage to execute code. These are the types of flaws typically used in drive-by download attacks. If an attacker can get you to visit a site with malicious code, he could exploit these flaws to run code on your machine. If you have local administrator privileges, the attacker gains full control of your PC.
  • MS15-010 – Critical- Kernel-mode Driver RCE flaw – The kernel-mode driver that ships with Windows suffers from various elevation of privilege flaws that could allow unprivileged users to execute code with full privileges. However, the attacker needs local system access and credentials to carry out the attack.
  • MS15-011 – Critical – Group Policy Remote Code Execution Flaw – The Windows Active Directory Group Policy Component suffers from complex code execution vulnerability. If an attacker can successfully intercept all the traffic of a Windows computer that connects to a domain, she can exploit this flaw to run arbitrary code on that computer. However, the attacker would most likely have to be on the same network as the victim in order for such a man-in-the-middle attack to succeed.
  • MS15-012 – Important – Office Code Execution Flaws – Various Office components, like Word and Excel, suffer from document handling code execution flaws. If an attacker can get you to open a maliciously crafted document, he could exploit these to gain control of your computer.
  • MS15-013 – Important – Office Security Bypass Flaw - Office doesn’t properly leverage Windows’ Address Space Layout Randomization (ASLR) feature. Since ASLR makes it harder for bad guys to exploit memory corruption issues, this bypass flaw makes it easier for attackers.
  • MS15-014 – Important – Group Policy Security Bypass Flaw - Using a man-in-the-middle attack, an attacker can trick Group Policy into reverting to its less secure, default state. This attack only works against Windows machines that connect to a domain. This flaw can be used in conjunction with MS15-011 to execute code.
  • MS15-015 – Important – Windows Elevation of Privilege Flaw - In short, if a unprivileged user can run code on a Windows machine, he can leverage this flaw to gain system privileges. However, he needs valid credentials and enough access to log in to the computer in the first place.
  • MS15-016 – Important – Windows Graphic Component Information Disclosure Flaw - The Graphics component of Windows suffers from a minor flaw that attackers could leverage to learn about the current memory state of your computer. This flaw serves little purpose alone, but could help attackers exploit other memory corruption vulnerabilities easier. Also, the attacker would have to entice you into viewing a TIFF image in order to exploit this flaw.
  • MS15-017 – Important – VMM Elevation of Privilege Flaw - If an attacker has credentials to login to your Microsoft Virtual Machine Manager (VMM), even as an under-privileged role, that attacker could leverage this flaw to gain full access to VMM and all your virtual machines.

Solution Path:

If you use any of the software mentioned above, you should apply the corresponding updates as soon as you can. I recommend you apply the Critical updates immediately, try to get to the Important ones as a soon as possible, and leave the moderate ones for last.

IMPORTANT NOTE: We have already read rumors about problems with some of today’s Microsoft updates. We highly recommend you test the patches before applying them to production servers.

You can get the updates three ways:

  1. Let Windows Automatic Update do it for you – While patches sometimes introduce new problems, these occasional issues don’t seem to affect clients as often as they do servers. To keep your network secure, I recommend you set Windows clients to update automatically so they get patches as soon as possible.
  2. Manually download and install patches – That said, most businesses strongly rely on production servers and server software. For that reason, I recommend you always test new server updates before applying them manually to production servers. Virtualization can help you build a test environment that mimics your production one for testing.  You can find links to download the various updates in the individual bulletins I’ve linked above.
  3. Download February’s full Security Update ISO –  Finally, Microsoft eventually posts an ISO image that consolidates all the security updates. This ISO conveniently packages the updates in one place for administrators. You’ll eventually find a link to the monthly security ISOs here, but Microsoft may not post it until a few days after Patch Day

For WatchGuard Customers:

Good News! WatchGuard’s Gateway Antivirus (GAV), Intrusion Prevention (IPS), and APT Blocker services can often prevent these sorts of attacks, or the malware they try to distribute. For instance, our IPS signature team has developed signatures that can detect and block many of the attacks described in Microsoft’s alerts:

  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2014-8967)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0017)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0018)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0019)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0020)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0021)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0022)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0023)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0025)
  •  WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0026)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0029)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0030)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0031)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0035)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0036)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0037)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0038)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0039)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0040)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0041)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0042)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0043)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0071)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0070)
  • WEB-CLIENT Microsoft Internet Explorer Information Disclosure Vulnerability (CVE-2015-0069)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0068)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0067)
  • FILE Microsoft Office Word OneTableDocumentStream Remote Code Execution Vulnerability (CVE-2015-0065)
  • FILE Microsoft Office Word Remote Code Execution Vulnerability (CVE-2015-0064)
  • FILE Microsoft Office Excel Remote Code Execution Vulnerability (CVE-2015-0063)
  • FILE Microsoft Office TTF TrueType Font Parsing Remote Code Execution Vulnerability (CVE-2015-0059)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0053)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0052)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0051)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0050)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0049)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0048)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0046)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0045)
  • WEB-CLIENT Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-0044)
  • FILE Adobe Flash Player BitmapFilter Invalid Object Corruption Remote Code Execution (CVE-2015-0314)
  • FILE Adobe Flash Player Video Event Dispatch Use After Free (CVE-2015-0315)
  • FILE Adobe Flash Player OP_ANYBYTE PCRE Library Memory Corruption (CVE-2015-0316)
  • FILE Adobe Flash Player XMLSocket.connect Type Confusion (CVE-2015-0317)
  • FILE Adobe Flash Player PCRE Regex Compilation Memory Corruption (CVE-2015-0318)
  • FILE Adobe Flash Player Multiple Type Confusion (CVE-2015-0319
  • FILE Adobe Flash Player MessageChannel.send() Use After Free (CVE-2015-0320)
  • FILE Adobe Flash Player Parsing Malformed mp4 Video Memory Corruption (CVE-2015-0321)
  • FILE Adobe Flash Player ActionScript Pushscope Opcode Memory Corruption (CVE-2015-0322)
  • FILE Adobe Flash Player Special Regex Character Sets Heap Overflow (CVE-2015-0323)
  • FILE Adobe Flash Player JSON.stringify Integer Heap Overflow (CVE-2015-0324)
  • FILE Adobe Flash Player RemoveFromDeviceGroup() Use After Free (CVE-2015-0325)
  • FILE Adobe Flash Player ActionScript URLRequest.requestHeaders Type Confusion (CVE-2015-0326)
  • FILE Adobe Flash Player Stringifying Proxy Objects Heap Overflow (CVE-2015-0327)
  • FILE Adobe Flash Player NetConnection Request Null Dereference (CVE-2015-0328)
  • FILE Adobe Flash Player Multibyte UTF-8 Characters Regular Expressions Memory Corruption (CVE-2015-0329)
  • FILE Adobe Flash Player PCRE Regex Heap Overflow (CVE-2015-0330)

Your Firebox or XTM appliance should get this new IPS signature update shortly.

Furthermore, our Reputation Enabled Defense (RED) and WebBlocker services can often prevent your users from accidentally visiting malicious (or legitimate but booby-trapped) web sites that contain these sorts of attacks. Nevertheless, we still recommend you install Microsoft’s updates to completely protect yourself from all of these flaws. — Corey Nachreiner, CISSP (@SecAdept)

 

Lizard Stresser- WSWiR Episode 134

Happy New Year everyone!

…Is how I would have started this post had the blog been up when I made this video. You have found the first WatchGuard Security Week in Review video for 2015. This weekly information security (infosec) video summarizes the most important security news every Friday, in hopes of keeping busy network administrators up to date on important security issues and patches. If you don’t have time to follow infosec content on your own, let our quick video keep you in the loop.

This episode, from the first week of January, covers the latest updates on the Sony Pictures breach, some interesting changes to Microsoft’s Trust Worthy Computing group and Patch Day, and a new DDoS tool released by the Lizard Squad. Check out the video below, to see what you missed.

(Episode Runtime: 11:49)

Direct YouTube Link: https://www.youtube.com/watch?v=bGE_IQ77pyQ

EPISODE REFERENCES:

EXTRAS:

— Corey Nachreiner, CISSP (@SecAdept)

Follow

Get every new post delivered to your Inbox.

Join 7,870 other followers

%d bloggers like this: