Security News #0x55
- Microsoft has issued the patch MS13-080 to correct CVE 2013-3893, which is a vulnerability in Internet Explorer. Metasploit has a module that targets IE 9 on Windows 7 SP1, provided the target also has Office 2007 or Office 2010. The latter are needed to provide an appropriate ROP chain. Because the Metasploit module was posted prior to the patch being issued, folks raised the question of responsible disclosure. You may want to read the take from the folks at Metasploit on the subject.
- One thing about Internet Explorer attacks, is that you need to keep them straight. There is another (slightly more recent) attack making the rounds this one is based on CVE 2013-3897. The problem here is in the CDisplayPointer class, rather than in the SetMouseCapture method. Like the previous, this was also fixed in MS130-080.
- There is a new privilege escalation exploit for FreeBSD systems on Intel processors. The underlying vulnerability (CVE 2012-0217) is somewhat older. For a technical analysis of the underlying issue, you can head over to fail0verflow.
- If you want to learn more about how email works, and how phishing does (and does not) work, you might want to head over and learn from Mudge.
- Mubix shows some ways to enumerate a Windows DNS server as a user on that system.
- Adobe suffered a major attack, losing source code and customer account data.
- The folks at Rapid7 were attacked when their upstream registrar acted upon a spoofed change request via fax. Threatpost has the details.