• Recent
    • Unsolved
    • Tags
    • Popular
    • Users
    • Groups
    • Search
    • Register
    • Login

    ATTENTION: Avoid Internet Explorer, Major Exploit Found

    Scheduled Pinned Locked Moved
    General
    1
    2
    3.6k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • Jaymes DriverJ
      Jaymes Driver Developer
      last edited by

      [url]http://www.symantec.com/connect/blogs/emerging-threat-microsoft-internet-explorer-zero-day-cve-2014-1776-remote-code-execution-vulne[/url]

      On April 26th 2014, Microsoft released a security advisory (2963983) for a zero-day vulnerability in Internet Explorer (CVE-2014-1776). Exploitation of the vulnerability is reportedly being used in limited, targeted attacks. The vulnerability exists in Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11. There is currently no patch available for this vulnerability and Microsoft did not provide a release date for a patch.

      Windows users running vulnerable versions of Internet Explorer are at risk, when visiting compromised websites containing malicious code to exploit this vulnerability.

      AFFECTED SOFTWARE:

      Microsoft Internet Explorer 6
      Microsoft Internet Explorer 7
      Microsoft Internet Explorer 8
      Microsoft Internet Explorer 9
      Microsoft Internet Explorer 10
      Microsoft Internet Explorer 11

      No Fix has been determined at this time, please disable Adobe Flash and USE ANOTHER WEB BROWSER!!!

      Microsoft Suggested Workarounds:

      Workaround details: [url]https://technet.microsoft.com/library/security/2963983[/url]
      Deploy the Enhanced Mitigation Experience Toolkit 4.1 (EMET). Note: EMET 3.0 does not mitigate this issue.
      Set Internet and Local intranet security zone settings to “High” to block ActiveX Controls and Active Scripting in these zones.
      Configure Internet Explorer to prompt before running Active Scripting or to disable Active Scripting in the Internet and Local intranet security zone.
      Unregister VGX.DLL.
      Modify the Access Control List on VGX.DLL to be more restrictive.
      Enable Enhanced Protected Mode For Internet Explorer 11 and Enable 64-bit Processes for Enhanced Protected Mode.

      WARNING TO USERS: My comments are written completely devoid of emotion, do not mistake my concise to the point manner as a personal insult or attack.

      1 Reply Last reply Reply Quote 0
      • Jaymes DriverJ
        Jaymes Driver Developer
        last edited by

        Mitigation for vulnerabilities, includes Windows XP.

        [url]http://steve.grc.com/2014/04/28/a-quick-mitigation-for-internet-explorers-new-0-day-vulnerability/[/url]

        WARNING TO USERS: My comments are written completely devoid of emotion, do not mistake my concise to the point manner as a personal insult or attack.

        1 Reply Last reply Reply Quote 0
        • 1 / 1
        • First post
          Last post

        187

        Online

        12.0k

        Users

        17.3k

        Topics

        155.2k

        Posts
        Copyright © 2012-2024 FOG Project