IE exploits now seen worldwide!

Hi malware fighters,

The number of exploits for a recent hole in Internet Explorer is growing rapidly, and now also hits Internet Explorer 6 and the beta version of IE 8. Through the hole attackers install password stealers together with key-loggers. Microsoft warns that “surfing in a secure matter” alone won’t help, because the exploits could also land on legit websites. “During previous months we have seen an increase in SQL-injection attacks”, according to Microsoft’s av-analyst Tareq Saade. His advice is to update all security software. The Microsoft av scanners is detecting the exploits recently detected (Does avast do also?) http://blogs.technet.com/mmpc/archive/2008/12/11/limited-exploitation-of-microsoft-security-advisory-961051.aspx

Exploits have been seen to appear all over the world, like is shown in the picture I have attached, but attackers use Chinese domains as a rule. Following webpages could have exploits: 7.hxm, I7.hxm, ie07.hxm, msxml.hxm en ss.hxm. (hxm=htm),

polonus

Hi malware fighters,

This I saw from the Secunia discussion of the recent exploits for IE6, IE7, IE8 beta:

To clarify three common incorrect assumptions about this vulnerability:

Assumption: Only Internet Explorer 7 is vulnerable.
Correction: No, at least Internet Explorer 6 is also affected, but not by the public exploits that are currently available. According to Microsoft’s updated advisory, IE 5.01 is also affected. We have not confirmed this yet, but it seems plausible.

Assumption: The core problem is related to XML processing.
Correction: No, it’s related to data binding. Working exploits can be created nicely without using XML.

Assumption: Setting the security level to “High” for the “Internet” security zone or disabling “Active Scripting” support protects me against attacks.
Correction: Technically no. It is still possible to trigger the vulnerability. However, it does make exploitation trickier as it protects against attacks using scripting.

polonus

;D Hi polonus

better to throw or don t use internet explorer because a lot of people don t care what kind of web browser they are using. A lot of them as long they connect to internet they are satisfied. not knowing they are using a more vulnerable browser.They don t heed with this kind of warning!!!By the way thanks to your info warning :smiley:

Thanks for the heads-up polonus.

Given other rather emotional threads in the browser wars … let me just say (however futile the effort may be) that the vast majority of IE users who are going to their everyday websites will be just fine using IE. It is those who venture down dark alleyways of the Internet (as well as real life) who need to be much more concerned about the risks of doing so.

Agreed alanrf, Since hearing about this I and my Wife have been staying on sites we know we can trust.

Before anyone tells us that the the well-known and respected sites are not infallible. We know. We use the tools we have, we do our best to be careful. Beyond that you might as well say that the Internet should not be used … if you do … well, be prepared to be trampled into the dust by the hordes who ignore you.

Polonus already did, in the article, but apparently you two missed it. :wink:

Microsoft warns that "surfing in a secure matter" alone won't help, because the exploits could also land on legit websites.

Frank,

I do not wish to appear pushy. However you have been asked this question before and you have not responded except with the circuitous response you just gave.

WHAT IS YOUR SUGGESTION TO THE PROBLEM? You criticized Bob for trying to be above it all … are you trying to fly beneath it all?

I didn’t miss it, One of my tools: http://www.sandboxie.com/

“Secure Web Browsing: Running your Web browser under the protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox and can be discarded trivially”

Well, I thought everybody knew my position, because I’ve repeated it often enough, but I’ve added a post to make it absolutely clear in the thread you mention.

More on the IE hole here:

http://voices.washingtonpost.com/securityfix/2008/12/microsoft_big_security_hole_in.html

Seems AV detection is not so good. :-\

Hi FwF and others,

What a gaping hole inside all versions of the IE browsers has to do with “browser wars” is beyond me!

Why users don’t care a hoot is just demonstrating that they are just following the line and consensus. “I have blue e so I should click it, no matter what. Didn’t know or care that anything else existed.” Well such an attitude I can fully understand, if you never heard anything else. A little discussion can just change all these insights. What I cannot understand is that when something apparently is wrong with Internet Explorer’s security and it has not been fully patched and there are only semi-work-arounds, “some” react as being stung by a wasp, yes and reactions are sometimes “irrational” even.

A browser is a browser, be it IE, Opera, SRWareIron, Flock, whatever. What do you do when you have a serious vulnerability in a program like a MediaPlayer? You change it for another less vulnerable kind of player, wait until a new version comes out and/or upgrade or wait until it is patched, or go on about your business and take the risks for granted. It is your choice- it is a free world.
Why all of a sudden this gets different when a browser should be involved?

polonus

P.S. Where you should not go using IE: http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20081210
Snort-rules to detect the exploit: http://www.emergingthreats.net/cgi-bin/cvsweb.cgi/sigs/CURRENT_EVENTS/CURRENT_IE_0Day

Unfortunately FWF has been bashing IE and Microsoft for so long that he has lost sight of the fact:
It is the most widely used browser and operating system in the world.

Bashing the browser and the operating system or any one who uses one or both doesn’t cure anything.

Looks like everyone will be forced to buy a Mac. Apple has yet to win again.

On Second thought, these exploits can also infiltrate the stock markets globally, causing the global economy to crash instantly.

For those who have Firefox with NoScript, what if these exploits manage to bypass NoScript?

Hi forum friends,

@bob3160
What you say is very true, 80% of the users use IE on Windows, probably because it is the only way they know how and experienced, and because it came with their computer and “it is the way you go onto the Internet”, isn’t it? So it is even worse the IE browser cannot be trusted for some lapse of time, because all the users that do not know about an alternative (or not interested even/ or not bother) are put at risk, and so this needs to be addressed as soon as possible by the developers of IE.
Read here: https://forums.symantec.com/t5/blogs/blogarticlepage/blog-id/vulnerabilities_exploits/article-id/180#M180
This has nothing to do with bashing browsers or being an IE fan-boy or an alternate browser fan-boy. Why is it so difficult for users of IE to admit there can be some lapse of time (until it is fully patched off-course) that they better not use their beloved browser, but use an alternate one (as long as it is not vulnerable to that specific vulnerability - DHTML Data Binding handling - heap spray?)
If MS itself comes up with the advice to only run IE in protected mode in Vista, I would know what I do, stay away from IE until they have found a cure for this. Funny why with some people there are always emotions drawn into a discussion when browsers are concerned!?!
Well this time it has come to the browser that has almost the absolute monopoly built into the platform that has almost the absolute monopoly globally. So what? The more reason I think to do something about it. I am almost sure there are already third party patches out there…or they are being developed.

@Jtaylor83 …NoScript has not been passed by any vulnerability as far as known, so that would be a novum.
On the other hand if NoScript is such a successful security extension why those that decide on browser security won’t have it by default inside Flock or Firefox, and why Giorgio Maone was never asked to come up with a similar extension for Blue E? Just let this line of mine sink in, ponder over it some time, and then you are certainly having some questions on your mind, haven’t you?

polonus

http://forum.avast.com/index.php?topic=40869.msg343103#msg343103

Looks like the browser wars will rage on for…

The Next Hundred Yeeears…

Still, I am glad there are people like bob3160 to introduce balance and shed some light on the true situation at this very moment.

And not the fanboyish one.

No browser war necessary. The standard prudent advice is to use another browser until MS fixes IE.

http://blogs.zdnet.com/security/?p=2301

Until Microsoft can issue a patch — out-of-cycle or otherwise — you should consider using an alternative browser like Mozilla Firefox or Opera.

http://voices.washingtonpost.com/securityfix/2008/12/exploit_for_unpatched_internet.html

I would strongly advise readers to avoid surfing the Web with IE at least until Microsoft has patched this flaw. If Microsoft sticks to its regular schedule of issuing updates to fix security flaws on the second Tuesday of each month, that means that unless Redmond deviates from that schedule, the earliest we can expect a patch for this flaw is Jan. 13, 2009.

http://www.theregister.co.uk/2008/12/11/sql_server_vuln/

The best way to protect yourself against the IE attack is to stop using the browser until it's been patched.

It’s under consideration. From Ryan Naraine’s Talking Firefox security with Mozilla’s Window Snyder:

There are discussions happening internally at Mozilla around adding NoScript functionality into the core browser. “It’s a conversation we’re having. I’d love to see it in there."

MS didn’t bother asking. From NoScript’s Anti-XSS Filters Partially Ported to IE8:

Polonus,
Right now I’m not using IE or FF but:

http://img.photobucket.com/albums/v190/bob3160/ShellFTP/Iron.png

Let the wars continue… ;D ;D ;D

Get it here:
http://mysharedfiles.no-ip.org/Browsers/srware_iron.exe